WorldWideScience

Sample records for flying saucer attack

  1. Flying Saucer? Aliens?

    Science.gov (United States)

    1961-01-01

    No, it's not a flying saucer, it is the domed top to a 70 foot long vacuum tank at the Lewis Research Center's Electric Propulsion Laboratory, Cleveland, Ohio. The three technicians shown here in protective clothing had just emerged from within the tank where they had been cleaning in the toxic mercury atmosphere, left after ion engine testing in the tank. Lewis has since been renamed the John H. Glenn Research Center.

  2. Avrocar: a real flying saucer

    CERN Document Server

    Fedrigo, Desire Francine G; Gobato, Alekssander

    2015-01-01

    One of the most unusual military aircraft programs V / STOL was the Avro VZ-9 "Avrocar". Designed to be a real flying saucer, the Avrocar was one of the few V / STOL to be developed in complete secrecy. Despite significant changes in the design, during flight tests, the Avrocar was unable to achieve its objectives, and the program was eventually canceled after an expenditure of 10 million US dollars between 1954 and 1961. But the concept of a lift fan, driven by a turbojet engine is not dead, and lives today as a key component of Lockheed X-35 Joint Strike Fighter contender. Was held in a data research and information related to Avrocar project carried out during the Second World War, which was directly linked to advances in aircraft that were built after it, and correlate them with the turbo fan engines used today.

  3. The shadow of the Flying Saucer: A very low temperature for large dust grains

    CERN Document Server

    Guilloteau, S; Chapillon, E; Di Folco, E; Dutrey, A; Henning, T; Semenov, D; Birnstiel, T; Grosso, N

    2016-01-01

    Dust determines the temperature structure of protoplanetary disks. However, dust temperature determinations almost invariably rely on a complex modeling of the Spectral Energy Distribution. We attempt a direct determination of the temperature of large grains emitting at mm wavelengths.} We observe the edge-on dust disk of the Flying Saucer, which appears in silhouette against the CO J=2-1 emission from a background molecular cloud in $\\rho$ Oph. The combination of velocity gradients due to the Keplerian rotation of the disk and intensity variations in the CO background as a function of velocity allows us to directly measure the %absorbing dust temperature. The dust opacity can then be derived from the emitted continuum radiation. The dust disk absorbs the radiation from the CO clouds at several velocities. We derive very low dust temperatures, 5 to 7 K at radii around 100 au, which is much lower than most model predictions. The dust optical depth is $> 0.2$ at 230 GHz, and the scale height at 100 au is at lea...

  4. Interaction between sulfate and chloride solution attack of concretes with and without fly ash

    Energy Technology Data Exchange (ETDEWEB)

    Jin Zuquan; Sun Wei; Zhang Yunsheng; Jiang Jinyang; Lai Jianzhong [Qingdao Technological University, Qingdao (China). Department of Civil Engineering

    2007-08-15

    Two sets of concretes under attack of erosion solution of sulfate and chloride salt were investigated. One set was plain concrete without fly ash addition the other set is the concrete with 20% and 30% of fly ash addition. The corrosion solution includes three types: 3.5% NaCl, 5% Na{sub 2}SO{sub 4}, and a composite solution of 3.5% NaCl and 5% Na{sub 2}SO{sub 4}. Two corrosion regimes were employed in this study: naturally immersion. The experimental results showed that a presence of sulfate in the composite solution increased the resistance to chloride ingress into concretes at early exposure period, but the opposite was observed at latter exposure period. A presence of chloride in the composite solution reduces the damage of concrete caused by sulfate. Addition of fly ash may significantly improve the resistance to chloride ingress into concretes and the resistance to sulfate erosion when a suitable amount of fly ash addition and low water-to-binder (W/B) was employed. Studies of the different corrosion regimes indicate that concretes stored in corrosion solution for about 850 days, the changes in relatively dynamic modulus of elastically (RDME) could be described by three stages: linearly increasing period, steady period, and declining period. For drying-immersion cycles, an accelerated trend could be found. The changes in RDME included an accelerated decreased stage, linearly increased stage, and then a slowly decreased stage, finally accelerating failure stage. The mechanism was also investigated by the modern microanalysis techniques.

  5. Cuticular Hydrocarbon Cues Are Used for Host Acceptance by Pseudacteon spp. Phorid Flies that Attack Azteca sericeasur Ants.

    Science.gov (United States)

    Mathis, Kaitlyn A; Tsutsui, Neil D

    2016-04-01

    Parasitoids often use complex cues to identify suitable hosts in their environment. Phorid fly parasitoids that develop on one or a few host species often use multiple cues, ranging from general to highly specific, to home in on an appropriate host. Here, we describe the hierarchy of cues that Pseudacteon phorid flies use to identify Azteca ant hosts. We show, through behavioral observations in the field, that phorid flies are attracted to two cryptic Azteca species, but only attack Azteca sericeasur (Hymenoptera: Formicidae: Dolichoderinae). To test whether the phorid flies use cuticular hydrocarbons (CHCs) to distinguish between the two Azteca taxa, we first documented and compared cuticular hydrocarbons of the two Azteca taxa using gas chromatography/mass spectrometry. Then, using cuticular hydrocarbon-transfer experiments with live ants, we characterized the cuticular hydrocarbons of A. sericeasur as a short-range, host location cue used by P. lasciniosus (Diptera: Phoridae) to locate the ants.

  6. Resistance of class C fly ash belite cement to simulated sodium sulphate radioactive liquid waste attack.

    Science.gov (United States)

    Guerrero, A; Goñi, S; Allegro, V R

    2009-01-30

    The resistance of class C fly ash belite cement (FABC-2-W) to concentrated sodium sulphate salts associated with low level wastes (LLW) and medium level wastes (MLW) is discussed. This study was carried out according to the Koch and Steinegger methodology by testing the flexural strength of mortars immersed in simulated radioactive liquid waste rich in sulphate (48,000 ppm) and demineralised water (used as a reference), at 20 degrees C and 40 degrees C over a period of 180 days. The reaction mechanisms of sulphate ion with the mortar was carried out through a microstructure study, which included the use of Scanning electron microscopy (SEM), porosity and pore-size distribution and X-ray diffraction (XRD). The results showed that the FABC mortar was stable against simulated sulphate radioactive liquid waste (SSRLW) attack at the two chosen temperatures. The enhancement of mechanical properties was a result of the formation of non-expansive ettringite inside the pores and an alkaline activation of the hydraulic activity of cement promoted by the ingress of sulphate. Accordingly, the microstructure was strongly refined.

  7. Degradation of self-compacting concrete (SCC) due to sulfuric acid attack: Experiment investigation on the effect of high volume fly ash content

    Science.gov (United States)

    Kristiawan, S. A.; Sunarmasto; Tyas, G. P.

    2016-02-01

    Concrete is susceptible to a variety of chemical attacks. In the sulfuric acid environment, concrete is subjected to a combination of sulfuric and acid attack. This research is aimed to investigate the degradation of self-compacting concrete (SCC) due to sulfuric acid attack based on measurement of compressive strength loss and diameter change. Since the proportion of SCC contains higher cement than that of normal concrete, the vulnerability of this concrete to sulfuric acid attack could be reduced by partial replacement of cement with fly ash at high volume level. The effect of high volume fly ash at 50-70% cement replacement levels on the extent of degradation owing to sulfuric acid will be assessed in this study. It can be shown that an increase in the utilization of fly ash to partially replace cement tends to reduce the degradation as confirmed by less compressive strength loss and diameter change. The effect of fly ash to reduce the degradation of SCC is more pronounced at a later age.

  8. Investigations into Outbreaks of Black Fly Attacks and Subsequent Avian Haemosporidians in Backyard-Type Poultry and Other Exposed Avian Species.

    Science.gov (United States)

    Jones, Kelli; Johnson, Nora; Yang, Sharon; Stokes, John; Smith, Whitney; Wills, Robert; Goddard, Jerome; Varela-Stokes, Andrea

    2015-03-01

    In late spring of 2009 and 2010, there were reports of severe black fly (Simulium spp., shown in Fig. 1) outbreaks in various counties in Mississippi, especially those in and around the Mississippi River Delta. Complaints were of black flies attacking multiple species of backyard poultry and causing high morbidity and mortality in affected flocks. At several affected locations, black flies were readily observed swarming around and feeding on birds. A large number of these parasites were easily trapped on fly strips (Fig. 2). Multifocal to coalescing cutaneous hemorrhagic lesions, consistent with fly bites, were seen on the birds. Upon necropsy examination, a large number of black flies were also observed in the digestive tract (Fig. 3). Although black flies may cause disease directly, such as cardiopulmonary collapse and anaphylactoid reactions, detection of Leucocytozoon in blood smears (Fig. 4) of affected birds prompted further investigations of this protozoan as a cause of disease. Leucocytozoon spp. are known to be transmitted by black flies and may be associated with morbidity and mortality in birds such as poultry. From June 2009 through July 2012, the investigation included a total collection of 1068 individual blood samples, representing 371 individual premises in 89 counties/parishes across Mississippi (59), Alabama (10), Louisiana (4), and Tennessee (16). Of the 371 premises where blood samples were collected, 96 (26%) were either positive or highly suspected to be positive for Leucocytozoon spp. by blood smear analysis, and 5 (1.2%) were positive for Haemoproteus spp. by blood smear analysis. Attempts to diagnose Leucocytozoon spp. by PCR analysis and sequencing were complicated by coinfections with two closely related haemosporidians (Haemoproteus spp. and Plasmodium spp.). A novel technique involving flow cytometry was also explored. This study discusses the black fly field outbreak, the involvement of haemosporidians, molecular methods for detection

  9. The 3D geometry of regional-scale dolerite saucer complexes and their feeders in the Secunda Complex, Karoo Basin

    Science.gov (United States)

    Coetzee, André; Kisters, Alexander

    2016-05-01

    Dolerites in the Karoo Basin of South Africa commonly represent kilometre-scale, interconnected saucer-shaped structures that consist of inner sills, bounded by inclined sheets connected to stratigraphically higher outer sills. Based on information from over 3000 boreholes and mining operations extending over an area of ca. 500 km2 and covering a > 3 km vertical section from Karoo strata into underlying basement rocks, this paper presents the results of a 3D modelling exercise that describes the geometry and spatial relationships of a regional-scale saucer complex, locally referred to as the number 8 sill, from the Secunda (coal mine) Complex in the northern parts of the Karoo Basin. The composite number 8 sill complex consists of three main dolerite saucers (dolerites A to C). These dolerite saucers are hosted by the Karoo Supergroup and the connectivity and geometry of the saucers support a lateral, sill-feeding-sill relationship between dolerite saucers A, B and C. The saucers are underlain and fed by a shallowly-dipping sheet (dolerite D) in the basement rocks below the Karoo sequence. The 3D geometric strata model agrees well with experimental results of saucer formation from underlying feeders in sedimentary basins, but demonstrates a more intricate relationship where a single feeder can give rise to several split level saucers in one regionally extensive saucer complex. More localised dome- or ridge-shape protrusions are common in the flat lying sill parts of the regional-scale saucers. We suggest a mode of emplacement for these kilometre-scale dome- and ridge structures having formed as a result of lobate magma flow processes. Magma lobes, propagating in different directions ahead of the main magma sheet, undergo successive episodes of lobe arrest and inflation. The inflation of lobes initiates failure of the overlying strata and the formation of curved faults. Magma exploiting these faults transgresses the stratigraphy and coalesces to form a ring

  10. Intensity of Attack Caused by Mediterranean Fruit Fly Ceratitis capitata Wiedem. (Diptera, Tephritidae on Mandarin along the Montenegrin Seacoast

    Directory of Open Access Journals (Sweden)

    Sanja Radonjić

    2011-01-01

    Full Text Available Along the Montenegrin seacoast, all cultivated citrus species (mandarin, orange, lemon,grapefruit, fig, loquat and ziziphus were detected as host plants of the Ceratitis capitata Wiedem.Among those found, in economic sense, the most important host plant is mandarinUnšiu.Intensity of the attack were monitored on mandarin in 2003 and 2004 in localities Baošići,Lastva Grbaljska and Bar, and was determined as higher in 2003. The first symptoms ofattack were detected, depending on locality, from middle of September until beginning ofOctober, one to two months earlier then in 2004. The maximum number of larvae per fruitwere detected in October and November (average from 13.44±0.16 to 22.82±0.13. Timeof the first symptoms appearence on mandarin in September and October 2003 and in November2004, indicate on crucial importance of alternative host plants (figs and loquat forreproduction and increasing of C. capitata population, because later during a season its intensityof attack on mandarin, depend largely on their presence.

  11. 六轴旋翼碟形飞行器控制系统软件设计及仿真研究%Simulation Research and Software Design of Flight Control System for a Six-axis Rotor Saucer Shaped Rotorcraft

    Institute of Scientific and Technical Information of China (English)

    刘羽峰; 宁媛

    2011-01-01

    采用了控制不同电机转速组合的方法,对六轴旋翼碟形飞行器进行姿态控制,使六轴旋翼碟形飞行器在不同姿态下飞行时具有较好的性能;为了实现六轴旋翼碟形飞行器的飞行控制,对飞行器的控制系统进行了初步的设计,并且给出了控制系统软件设计流程图;同时以ProtueslSIS软件为基础建立了六轴旋翼碟形飞行器控制系统的仿真模型,并进行了仿真,仿真结果显示该控制系统能够满足六轴旋翼碟形飞行器起飞、悬停及降落等控制姿态的要求.%In order to control flies state of the six-axis saucer ahaped rotorcraft,method of adjusting the speed of the different motors is proposed,so that make it good works performance for different flies state.For the purpose of relizing the flight control for the six -axis rotor saucer shaped rotorcraft,the flight control system is designed preliminarily and the software of flight control system flow chart s given.At the same time.simulation model of the six-axis rotor saucer ahaped rotor saucer shaped rotoreraft control system is created on the basis of software Protues ISIS.simulation result shows that can meet control atate requirement of taking off,hovcring and landing and so on.

  12. Long aculeus and behavior of Anastrepha ludens render gibberellic acid ineffective as an agent to reduce 'ruby red' grapefruit susceptibility to the attack of this pestiferous fruit fly in commercial groves.

    Science.gov (United States)

    Birke, Andrea; Aluja, Martín; Greany, Patrick; Bigurra, Everardo; Pérez-Staples, Diana; McDonald, Roy

    2006-08-01

    Treating Mexican grapefruit with gibberellic acid (GA3) before color break, significantly delayed peel color change and increased peel puncture resistance, but it did not reduce grapefruit susceptibility to Mexican fruit fly, Anastrepha ludens (Loew) attack under natural conditions. Despite GA3 treatments, larval infestation levels increased with higher fruit fly populations, which also increased as the season progressed. Late in the season, infestation levels were even higher in GA3-treated fruit compared with untreated fruit, possibly because treated fruit were in better condition at that stage. Egg clutch size was significantly greater in very unripe, hard, GA3-treated fruit at the beginning of the harvest season and in December, compared with control fruit. Under laboratory conditions, egg injection into different regions of the fruit suggested that A. ludens eggs are intoxicated by peel oil content in the flavedo region. However, A. ludens' long aculeus allows females to oviposit eggs deeper into the peel (i.e., albedo), avoiding toxic essential oils in the flavedo. This makes A. ludens a particularly difficult species to control compared with other citrus-infesting species such as Anastrepha suspensa (Loew), Anastrepha fraterculus (Wiedemann), and Ceratitis capitata (Wiedemann) (fly species with significantly shorter aculei), which can be effectively managed with GA3 sprays. We discuss our findings in light of their practical implications and with respect to the oviposition behavior of various fruit flies attacking citrus.

  13. Saucer-and Rod-like WO_3 3-D Microstructures:Synthesis,Characterization,and Optical Properties

    Institute of Scientific and Technical Information of China (English)

    CHEN Lin; YAN Ting-Jiang; ZHENG Jing; LI Li-Ping

    2011-01-01

    Three-dimensional(3-D)saucer-and rod-like WO3 microstructures have been synthesized by a simple hydrothermal route using tartaric acid as the assistant agent.X-ray powder diffraction(XRD)patterns indicate that the as-prepared samples are the pure hexagonal phase WO3.The morphologies are characterized by scanning electron microscope(SEM)and are found to be highly sensitized to the reaction temperature.A probable formation mechanism of the WO3 microstructures from saucer-like at low temperatures to rod-like at high temperatures is proposed.The optical properties of the novel WO3 microstructures are studied by UV-vis diffuse reflectance spectroscopy(DRS).The mechanism of strong absorption at visible region and red shift of calcined sample is also discussed.

  14. Spatial distribution of human neocortical neurons and glial cells according to sex and age measured by the saucer method

    DEFF Research Database (Denmark)

    Stark, Anette Kirstine; Petersen, A O; Gardi, Jonathan Eyal

    2007-01-01

    a proportion of a suitable size to have a reasonable relationship between workload and the information obtained. In this paper the method is used on vertical sections to investigate the spatial distribution of astrocytes, oligodendrocytes, microglial cells, endothelial cells and secondary neurons around...... primary neurons in the human neocortex (divided into frontal-, temporal-, parietal- and occipital cortex) of young and old subjects free of neurological or psychological disease to test if age and gender has any influence on the cell distribution in human neocortex. Plots of the spatial distribution......A new stereological probe, the saucer, was used for estimating three-dimensional (3D) spatial distributions of particles around particles. The advantages of the saucer include that the measurements and the results are in 3D and the size and design of the probe enables the investigator to sample...

  15. Explicit Nonlinear Model Predictive Control for a Saucer-Shaped Unmanned Aerial Vehicle

    Directory of Open Access Journals (Sweden)

    Zhihui Xing

    2013-01-01

    Full Text Available A lifting body unmanned aerial vehicle (UAV generates lift by its body and shows many significant advantages due to the particular shape, such as huge loading space, small wetted area, high-strength fuselage structure, and large lifting area. However, designing the control law for a lifting body UAV is quite challenging because it has strong nonlinearity and coupling, and usually lacks it rudders. In this paper, an explicit nonlinear model predictive control (ENMPC strategy is employed to design a control law for a saucer-shaped UAV which can be adequately modeled with a rigid 6-degrees-of-freedom (DOF representation. In the ENMPC, control signal is calculated by approximation of the tracking error in the receding horizon by its Taylor-series expansion to any specified order. It enhances the advantages of the nonlinear model predictive control and eliminates the time-consuming online optimization. The simulation results show that ENMPC is a propriety strategy for controlling lifting body UAVs and can compensate the insufficient control surface area.

  16. Electromagnetic Wave-filled Cavities Observed by the GEODESIC Sounding Rocket: A Direct Encounter with VLF Saucer Source Regions

    Science.gov (United States)

    Kabirzadeh, Rasoul

    The GEODESIC sounding rocket encountered hundreds of localized, VLF-wave-filled density depletions in an auroral return current region at altitudes between 900--1000 km. While these are similar to well-studied lower-hybrid "spikelets", which are electrostatic, many of the GEODESIC events exhibited strong VLF magnetic field enhancements as well. In the present study we show that these magnetic field fluctuations can be interpreted as the result of geomagnetic field-aligned electron currents driven by fluctuating electric fields parallel to the geomagnetic field lines. This observation suggests that the electromagnetic wave-filled cavities are signatures of unstable filaments of return current fluctuating at VLF frequencies. We argue that the cavities' spatial dimensions, their location inside the return current region and their total radiated power are consistent with the properties of VLF saucer source regions inferred from earlier satellite observations taken at higher altitudes.

  17. Pollen recovered from the exoskeleton of stable flies, Stomoxys calcitrans (L.) in Gainesville, Florida

    Science.gov (United States)

    Stable flies are pestiferous blood feeding flies that attack animals and humans. Besides consuming blood, these flies will also visit flowers to take nectar meals. When feeding on nectar, flies become coated with pollen which can be used to identify flowers used by the flies. Recently, flies cove...

  18. Heart Attack

    Science.gov (United States)

    ... a million people in the U.S. have a heart attack. About half of them die. Many people have permanent heart damage or die because they don't get ... It's important to know the symptoms of a heart attack and call 9-1-1 if someone ...

  19. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants. © 2010 IEEE....

  20. Evaluating Deterioration of Concrete by Sulfate Attack

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Effects of factors such as water to cement ratio, fly ash and silica fume on the resistance of concrete to sulfate attack were investigated by dry-wet cycles and immersion method. The index of the resistance to sulfate attack was used to evaluate the deterioration degree of concrete damaged by sulfate. The relationship between the resistance of concrete to sulfate attack and its permeability/porosity were analyzed as well as its responding mechanism. Results show that the depth of sulfate crystal attack from surface to inner of concrete can be reduced by decreasing w/c and addition of combining fly ash with silica fume. The variation of relative elastic modulus ratio and relative flexural strength ratio of various specimens before and after being subjected to sulfate attack was compared.

  1. Forced-folding by laccolith and saucer-shaped sill intrusions on the Earth, planets and icy satellites

    Science.gov (United States)

    Michaut, Chloé

    2017-04-01

    Horizontal intrusions probably initially start as cracks, with negligible surface deformation. Once their horizontal extents become large enough compared to their depths, they make room for themselves by lifting up their overlying roofs, creating characteristic surface deformations that can be observed at the surface of planets. We present a model where magma flows below a thin elastic overlying layer characterized by a flexural wavelength Λ and study the dynamics and morphology of such a magmatic intrusion. Our results show that, depending on its size, the intrusion present different shapes and thickness-to-radius relationships. During a first phase, elastic bending of the overlying layer is the main source of driving pressure in the flow; the pressure decreases as the flow radius increases, the intrusion is bell-shaped and its thickness is close to being proportional to its radius. When the intrusion radius becomes larger than 4 times Λ, the flow enters a gravity current regime and progressively develops a pancake shape with a flat top. We study the effect of topography on flow spreading in particular in the case where the flow is constrained by a lithostatic barrier within a depression, such as an impact crater on planets or a caldera on Earth. We show that the resulting shape for the flow depends on the ratio between the flexural wavelength of the layer overlying the intrusion and the depression radius. The model is tested against terrestrial data and is shown to well explain the size and morphology of laccoliths and saucer-shaped sills on Earth. We use our results to detect and characterize shallow solidified magma reservoirs in the crust of terrestrial planets and potential shallow water reservoirs in the ice shell of icy satellites.

  2. Shark attack.

    Science.gov (United States)

    Guidera, K J; Ogden, J A; Highhouse, K; Pugh, L; Beatty, E

    1991-01-01

    Shark attacks are rare but devastating. This case had major injuries that included an open femoral fracture, massive hemorrhage, sciatic nerve laceration, and significant skin and muscle damage. The patient required 15 operative procedures, extensive physical therapy, and orthotic assistance. A review of the literature pertaining to shark bites is included.

  3. Flying Things

    DEFF Research Database (Denmark)

    Cermak, Daniel

    2016-01-01

    Daniel Cermak-Sassenrath. Flying Things. Installation. Kulturnatten 2016, Danish Science Ministry, Copenhagen, DK, Oct 14, 2016.......Daniel Cermak-Sassenrath. Flying Things. Installation. Kulturnatten 2016, Danish Science Ministry, Copenhagen, DK, Oct 14, 2016....

  4. 碟式飞行器复合控制的共栖现象%Commensalism phenomenon of composite controlled flying saucer

    Institute of Scientific and Technical Information of China (English)

    冯国虎; 张新立; 顾文锦

    2007-01-01

    借用生物学概念,首次提出了复合控制的共栖现象概念,并对碟式飞行器复合控制中产生的两类共栖现象进行了仿真研究,比较了与生物共栖的相似点,指出了共栖现象的研究意义和应用前景.

  5. Research on Commensalism Phenomenon of Composite Controlled Flying Saucer%碟式飞行器复合控制的共栖现象研究

    Institute of Scientific and Technical Information of China (English)

    顾文锦; 冯国虎; 肖正良

    2008-01-01

    借用生物学概念,首次提出了复合控制的共栖现象概念,并对碟式飞行器复合控制中产生的两类共栖现象进行了仿真研究,比较了复合控制中共栖现象与生物共栖现象的相似点,指出了共栖现象的研究意义和应用前景.

  6. Flying Scared

    DEFF Research Database (Denmark)

    Dal Sie, Marco; Josiassen, Alexander

    service quality expectations and fear of flying affect travellers' flight choices on long-haul flights. The study was set in Bangkok and primary data were obtained from a large sample of travelers departing from Suvarnabhumi Airport. While service quality emerged as a relevant factor, fear of flying didn......’t turn out as a variable affecting travellers’ choices....

  7. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    -technical system, the attack navigator identifies routes to an attacker goal. Specific attacker properties such as skill or resources can be included through attacker profiles. This enables defenders to explore attack scenarios and the effectiveness of defense alternatives under different threat conditions....

  8. Disinfestation of apples attacked by the fruit fly Anastrepha fraterculus (Wied.) (Diptera: Tephritidae) using gamma radiation of cobalt-60; Desinfestacao de macas atacadas por Anastrepha fraterculus (Wied.) (Diptera: Tephritidae) atraves das radiacoes gama do cobalto-60

    Energy Technology Data Exchange (ETDEWEB)

    Arthur, Valter; Wiendl, Frederico M. [Centro de Energia Nuclear na Agricultura (CENA), Piracicaba, SP (Brazil)

    1996-04-01

    Apples, cv. Gala, artificially infested during 72 hours with adults of the fruit fly Anastrepha fraterculus (Wied.) were irradiated with the following gamma radiation doses: 0 (control), 25, 50, 75 and 100 Gy, at the dose rate of 1048 Gy per hour. After irradiation fruits were put in plastic bags with 80 ml of sugar cane bagasse. The bags were maintained in a rearing room at temperature 21 - 24 deg C, 65 - 75% R H, and photo period of 12 hours. Pupae obtained were sieved out and kept in small glass tubes. All doses tested did not allow emergence of adults. (author) 4 refs., 1 tab.

  9. Time flies

    DEFF Research Database (Denmark)

    Wit, Janneke

    , the LS fly might be able to spend energy more generously on different tasks. Therefor, the capacity of LS and C lines to locate resources in a natural environment was tested. It turns out that LS flies are less likely to find food than C flies in such a setting, yet that as they age, their ability...... to locate food decreases slower than that of C lines. Gene expression of 10 candidate genes for longevity was quantified in two types of C and LS lines at three different ages. One of these genes, CG32638, indeed appears to be involved in life span determination in both males and females, regardless...... of mating status. Generalising studies on ageing in D. melanogaster can be cumbersome, especially in light of discrepancy between correlated responses between studies. To elucidate which mechanisms might be conserved due to evolutionary constraints, life span of 13 species of Drosophila was determined...

  10. Flying Cities

    DEFF Research Database (Denmark)

    Herbelin, Bruno; Lasserre, Sebastien; Ciger, Jan

    2008-01-01

    . This cross-modal interaction not only supports our artistic messages, but also aims at providing anyone with a pleasant and stimulating feedback from her/his speech activity. As the feedback we have received when presenting Flying Cities was very positive, our objective is now to cross the bridge between art......Flying Cities is an artistic installation which generates imaginary cities from the speech of its visitors. Thanks to an original interactive process analyzing people's vocal input to create 3D graphics, a tangible correspondence between speech and visuals opens new possibilities of interaction...

  11. Generating IDS Attack Pattern Automatically Based on Attack Tree

    Institute of Scientific and Technical Information of China (English)

    向尕; 曹元大

    2003-01-01

    Generating attack pattern automatically based on attack tree is studied. The extending definition of attack tree is proposed. And the algorithm of generating attack tree is presented. The method of generating attack pattern automatically based on attack tree is shown, which is tested by concrete attack instances. The results show that the algorithm is effective and efficient. In doing so, the efficiency of generating attack pattern is improved and the attack trees can be reused.

  12. Flying Cities

    DEFF Research Database (Denmark)

    Ciger, Jan

    2006-01-01

    The Flying Cities artistic installation brings to life imaginary cities made from the speech input of visitors. In this article we describe the original interactive process generating real time 3D graphics from spectators' vocal inputs. This example of cross-modal interaction has the nice property...... of providing a tangible correspondence between the two spaces. This interaction mean has proved to suit the artistic expression well but it also aims at providing anyone with a pleasant and stimulating feedback from speech activity, a new medium for creativity and a way to visually perceive a vocal performance....... As the feedback we have received when presenting Flying Cities was very positive, our objective now is to cross the bridge between art and the potential applications to the rehabilitation of people with reduced mobility or for the treatment of language impairments....

  13. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  14. Transient Ischemic Attack

    Medline Plus

    Full Text Available Transient Ischemic Attack TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood ... The only difference between a stroke and TIA is that with TIA the blockage is transient (temporary). ...

  15. Social engineering attack framework

    CSIR Research Space (South Africa)

    Mouton, F

    2014-07-01

    Full Text Available link. A social engineering attack targets this weakness by; using various manipulation techniques in order to elicit sensitive; information. The field of social engineering is still in its infancy; stages with regards to formal definitions and attack...

  16. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... Ischemic Attack TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an artery for a short time. The only difference between a stroke ...

  17. Watermark copy attack

    OpenAIRE

    Kutter, Martin; Voloshynovskyy, Svyatoslav; Herrigel, Alexander

    2000-01-01

    Research in digital watermarking has progressed along two paths. While new watermarking technologies are being developed, some researchers are also investigating di erent ways of attacking digital watermarks. Common attacks to watermarks usually aim to destroy theembedded watermark or to impair its detection. In this paper we propose a conceptually new attack for digitally watermarked images. The proposed attack doesnot destroy anembedded watermark, but copies it from one image to a di erent ...

  18. The Watermark Template Attack

    OpenAIRE

    Herrigel, Alexander; Voloshynovskyy, Svyatoslav; Rytsar, Yuriy

    2001-01-01

    This paper presents a new attack, called the watermark template attach, for watermarked images. In contrast to the Stirmark benchmark, this attack does not severely reduce the quality of the image. This attack maintains, therefore, the commercial value of the watermarked image. In contrast to previous approaches, it is not the aim of the attack to change the statistics of embedded watermarks fooling the detection process but to utilize specific concepts that have been recently developed for m...

  19. Flying Cities

    DEFF Research Database (Denmark)

    Ciger, Jan

    2006-01-01

    of providing a tangible correspondence between the two spaces. This interaction mean has proved to suit the artistic expression well but it also aims at providing anyone with a pleasant and stimulating feedback from speech activity, a new medium for creativity and a way to visually perceive a vocal performance......The Flying Cities artistic installation brings to life imaginary cities made from the speech input of visitors. In this article we describe the original interactive process generating real time 3D graphics from spectators' vocal inputs. This example of cross-modal interaction has the nice property...

  20. Flying Fortress

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    当欧洲的年轻人想到关于德国的两种熊,一个是传统的布娃娃熊,另一个就是充满欧洲街头墙上的Teddy熊涂鸦,而这个涂鸦熊的创作者就是著名的涂鸦艺术家“Flying Fortress”,他称这些熊军队为“Teddy Tmops”。

  1. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  2. Return of ambiguity attacks

    Science.gov (United States)

    Craver, Scott A.

    2002-04-01

    The ambiguity attack, or invertibility attack, was described several years ago as a potential threat to digital watermarking systems. By manipulating the invertibility of watermark embedding, one could negate or subvert the meaning of a copyright mark. These attacks were easily prevented, however, with the appropriate application of one-way functions and cryptographic hashes in watermarking protocols. New research in watermarking, however, has caused the ambiguity attack to resurface as a threat, and this time it will not be as easy averted. Recent work in public-key watermarking create scenarios in which one-way functions may be ineffective against this threat. Furthermore, there are also positive uses for ambiguity attacks, as components in watermarking protocols. This paper provides an overview of the past and possible future of these unusual attacks.

  3. Adversary Model: Adaptive Chosen Ciphertext Attack with Timing Attack

    OpenAIRE

    2014-01-01

    We have introduced a novel adversary model in Chosen-Ciphertext Attack with Timing Attack (CCA2-TA) and it was a practical model because the model incorporates the timing attack. This paper is an extended paper for 'A Secure TFTP Protocol with Security Proofs'. Keywords - Timing Attack, Random Oracle Model, Indistinguishabilit, Chosen Plaintext Attack, CPA, Chosen Ciphertext Attack, IND-CCA1, Adaptive Chosen Ciphertext Attack, IND-CCA2, Trivial File Transfer Protocol, TFTP, Security, Trust, P...

  4. New-Fangled Method Against Data Flooding Attacks in MANET

    Directory of Open Access Journals (Sweden)

    Kavuri Roshan

    2012-07-01

    Full Text Available Mobile users like to use their own consumer electronic devices anywhere and at anytime to accessmultimedia data. Hence, we expect that wireless ad hoc networks will be widely used in the near futuresince these networks form the topology with low cost on the fly. However, consumer electronic devicesgenerally operate on limited battery power and therefore are vulnerable to security threats like dataflooding attacks. The data flooding attack causes Denial of Service (DoS attacks by flooding many datapackets. However, there are a few existing defence systems against data flooding attacks. Moreover, theexisting schemes may not guarantee the Quality of Service (QoS of burst traffic since multimedia data areusually burst. Therefore, we propose a novel defence mechanism against data flooding attacks with the aimof enhancing the throughput.

  5. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  6. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2017, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  7. Seven Deadliest Network Attacks

    CERN Document Server

    Prowell, Stacy; Borkin, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree At

  8. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  9. PROTECTION WORKS AGAINST WAVE ATTACKS IN THE HAOR AREAS OF BANGLADESH: ANALYSIS OF SUSTAINABILITY

    Directory of Open Access Journals (Sweden)

    M.K. Alam

    2010-12-01

    Full Text Available Haor is the local name of the saucer-shaped, naturally depressed areas of Bangladesh. There are 414 haors in the northeast region that comprise approximately 17% of the country. These areas are submerged under deep water from July to November due to the overflow of rivers and heavy rainfall, causing them to appear like seas with erosive waves. Recently, the wave attack has drastically increased because of de-plantation and changing cropping patterns to allow for more agricultural production. The local people, government and Non-Government Organisations (NGOs have tried many techniques to protect life and property against wave attacks. A cost comparison shows that Cement Concrete (CC blocks over geotextile on the slope embankment is a cost-effective, environment friendly and socially acceptable method to prevent loss of life and property. However, the design rules employed by the engineers are faulty because there is knowledge gap in the application of wave hydraulics among these professionals. As a result, damage frequently occurs and maintenance costs are increasing. This study explores the sustainability of the CC blocks used in the Haor areas by evaluating two case studies with the verification of available design rules.

  10. Mathematical Attacks on RSA Cryptosystem

    Directory of Open Access Journals (Sweden)

    Imad K. Salah

    2006-01-01

    Full Text Available In this paper some of the most common attacks against Rivest, Shamir, and Adleman (RSA cryptosystem are presented. We describe the integer factoring attacks, attacks on the underlying mathematical function, as well as attacks that exploit details in implementations of the algorithm. Algorithms for each type of attacks are developed and analyzed by their complexity, memory requirements and area of usage.

  11. Chemical Attack of Malaysian Pozzolans Concrete

    Directory of Open Access Journals (Sweden)

    Mohd Hilton Ahmad

    2011-09-01

    Full Text Available Malaysia produces more than 10 million tonne of by-product from industrial sector per year. As the environmental impact concerns, more than half of the by-product can be recycled to be used as construction materials. One of them is pozzolan, a cement replacing material that can be used to enhance the properties of the concrete. This paper studies the chemical attack to local prozzolans concrete. The parameters studied include weight loss, length change, and residual strength of local pozzolans concrete after been exposed to severe environment. The specimen were tested under normal room temperature, exposed to magnesium sulfate, MgSO4. 2H2O where both sulfate attack and acid attack take place. Two series of pozzolans< which is Pulverized fly ash (PFA and Palm oil fuel ash (POFA were identified. Another series of admixture, Quarry Dust (QD from quarry waste that contain high amount of silica content also been carried out. Each series will study the effect of cement replacement percentage of 5%, 10% and 15%. The parameters were compared to conventional ordinary Portland cement (OPC concrete as control mix. Accelerated testing was conducted at 3, 7, 28, 56 and 90 days. The result shows that the local pozzolans concrete were found to be in good resistance against sulfate attack compared to conventional concrete. Compared to all series conducted, series of PFA replacement gave the best resistance followed by POFA and QD replacement series.

  12. X-29 High Angle-of-Attack Flying Qualities

    Science.gov (United States)

    1991-06-01

    flhit and closure rate. Limited military utility tesIs ith thw variable gain capability. Predicted large amplitude increased roll-rate .apability...33 ll! )3l 17, oq jimod [013110 qildmoitmii~pojiro paso 1/OS0 0Jo ( ptio3O5; jad saai1 £ LI 0 Zpuo00S iod sMp 0)qlU)141)1A1 43iq pajli uaaq 0A111 p

  13. Estimating Orientation of Flying Fruit Flies.

    Directory of Open Access Journals (Sweden)

    Xi En Cheng

    Full Text Available The recently growing interest in studying flight behaviours of fruit flies, Drosophila melanogaster, has highlighted the need for developing tools that acquire quantitative motion data. Despite recent advance of video tracking systems, acquiring a flying fly's orientation remains a challenge for these tools. In this paper, we present a novel method for estimating individual flying fly's orientation using image cues. Thanks to the line reconstruction algorithm in computer vision field, this work can thereby focus on the practical detail of implementation and evaluation of the orientation estimation algorithm. The orientation estimation algorithm can be incorporated into tracking algorithms. We rigorously evaluated the effectiveness and accuracy of the proposed algorithm by running experiments both on simulation data and on real-world data. This work complements methods for studying the fruit fly's flight behaviours in a three-dimensional environment.

  14. Nocturnal panic attacks

    Directory of Open Access Journals (Sweden)

    Lopes Fabiana L.

    2002-01-01

    Full Text Available The panic-respiration connection has been presented with increasing evidences in the literature. We report three panic disorder patients with nocturnal panic attacks with prominent respiratory symptoms, the overlapping of the symptoms with the sleep apnea syndrome and a change of the diurnal panic attacks, from spontaneous to situational pattern. The implication of these findings and awareness to the distinct core of the nocturnal panic attacks symptoms may help to differentiate them from sleep disorders and the search for specific treatment.

  15. Supply Chain Attack Framework and Attack Patterns

    Science.gov (United States)

    2013-12-01

    Malware is embedded in a replacement server motherboard (e.g., in the flash memory) in order to alter server functionality from that intended. Attack...Slashdot: Dell Ships Infected Motherboards July 21, 2010(c/o Rick Dove) Threat: An adversary with access to hardware procurement, maintenance, or upgrade...control can embed malware in a critical component server motherboard . Vulnerabilities: The control processes and mechanisms for hardware

  16. Flying insects and Campylobacter

    DEFF Research Database (Denmark)

    Hald, Birthe; Sommer, Helle Mølgaard; Skovgård, Henrik

    Campylobacter in flies Flies of the Muscidae family forage on all kind of faeces – various fly species have different preferences. M domestica prefer pigs, horses and cattle faeces, animals which are all known to frequently excrete Campylobacter. As a result, the insects pick up pathogenic micro...... organisms, which may collect on their bodies or survive passage through the fly gut. Campylobacter and other pathogens are then easily transferred to other surfaces, for instance peoples food – or to broiler houses where they may be swallowed by chickens or contaminate the environment. On a large material...... of several species of flies collected outside broiler houses, merely ~1% of the flies were found Campylobacter positive. However, the prevalence varied considerably with fly species, time of the year, and availability of Campylobacter sources. Influx of flies to broiler houses As the influx of flies...

  17. Flying insects and Campylobacter

    DEFF Research Database (Denmark)

    Hald, Birthe; Sommer, Helle Mølgaard; Skovgård, Henrik

    to broiler houses may be counted in thousands per broiler rotation during summer periods, even a low prevalence of Campylobacter positive flies constitute a risk of introduction of Campylobacter to the chickens. M. domestica – the house fly is the most important vector fly for Campylobacter transmission...... organisms, which may collect on their bodies or survive passage through the fly gut. Campylobacter and other pathogens are then easily transferred to other surfaces, for instance peoples food – or to broiler houses where they may be swallowed by chickens or contaminate the environment. On a large material...... of several species of flies collected outside broiler houses, merely ~1% of the flies were found Campylobacter positive. However, the prevalence varied considerably with fly species, time of the year, and availability of Campylobacter sources. Influx of flies to broiler houses As the influx of flies...

  18. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an ... a short time. The only difference between a stroke and TIA is that with TIA the blockage ...

  19. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  20. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  1. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  2. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an ... a short time. The only difference between a stroke and TIA is that with TIA the blockage ...

  3. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... Attack Stent © 2017, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. The content in this library is for educational purposes only, and therefore is not intended to be ...

  4. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  5. Bayesian Watermark Attacks

    OpenAIRE

    Shterev, Ivo; Dunson, David

    2012-01-01

    This paper presents an application of statistical machine learning to the field of watermarking. We propose a new attack model on additive spread-spectrum watermarking systems. The proposed attack is based on Bayesian statistics. We consider the scenario in which a watermark signal is repeatedly embedded in specific, possibly chosen based on a secret message bitstream, segments (signals) of the host data. The host signal can represent a patch of pixels from an image or a video frame. We propo...

  6. DNS rebinding attacks

    OpenAIRE

    Kokkinopoulos, Georgios

    2009-01-01

    Approved for public release, distribution unlimited. A Domain Name System (DNS) Rebinding attack compromises the integrity of name resolution in DNS with the goal of controlling the IP address of the host to which the victim ultimately connects. The same origin policy and DNS Pinning techniques were introduced to protect Web browsers from DNS rebinding attacks, but their effectiveness has been undermined by vulnerabilities introduced by plug-ins such as JavaScript and Adobe Flash Play...

  7. High Order Differential Attack and Trace Attack to Block Ciphers

    Institute of Scientific and Technical Information of China (English)

    HU Yupu; CHEN Kai; Xiao Guozhen

    2001-01-01

    In this paper, we prove a high or-der differential property of power function, then giverespectively high order differential attack and traceattack to block ciphers. These attacks depend onlyon block cipher's algebraic shape on GF(2n) and haveno relation with its designing structure. The condi-tions are given for both effective attacks and strengthagainst attacks.

  8. Life After a Heart Attack

    Science.gov (United States)

    ... symptoms of a heart attack. It presents one woman's real-life experience with heart attack symptoms, which started during her pregnancy. The video also explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, ...

  9. What Is a Heart Attack?

    Science.gov (United States)

    ... symptoms of a heart attack. It presents one woman's real-life experience with heart attack symptoms, which started during her pregnancy. The video also explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, ...

  10. What Causes a Heart Attack?

    Science.gov (United States)

    ... symptoms of a heart attack. It presents one woman's real-life experience with heart attack symptoms, which started during her pregnancy. The video also explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, ...

  11. XQuery Injection Attack and Countermeasures

    Institute of Scientific and Technical Information of China (English)

    谭玉森

    2014-01-01

    As a database that allows data to be stored in XML format, XML database suffers from some similar attacks as traditional relational database does. These attacks include injection attack by XQuey function in application software. These include BaseX, eXist and MarkLogic. In order to defeat these attacks, countermeasures are proposed.

  12. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  13. Investigation of gliding flight by flying fish

    Science.gov (United States)

    Park, Hyungmin; Jeon, Woo-Pyung; Choi, Haecheon

    2006-11-01

    The most successful flight capability of fish is observed in the flying fish. Furthermore, despite the difference between two medium (air and water), the flying fish is well evolved to have an excellent gliding performance as well as fast swimming capability. In this study, flying fish's morphological adaptation to gliding flight is experimentally investigated using dry-mounted darkedged-wing flying fish, Cypselurus Hiraii. Specifically, we examine the effects of the pectoral and pelvic fins on the aerodynamic performance considering (i) both pectoral and pelvic fins, (ii) pectoral fins only, and (iii) body only with both fins folded. Varying the attack angle, we measure the lift, drag and pitching moment at the free-stream velocity of 12m/s for each case. Case (i) has higher lift-to-drag ratio (i.e. longer gliding distance) and more enhanced longitudinal static stability than case (ii). However, the lift coefficient is smaller for case (i) than for case (ii), indicating that the pelvic fins are not so beneficial for wing loading. The gliding performance of flying fish is compared with those of other fliers and is found to be similar to those of insects such as the butterfly and fruitfly.

  14. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  15. Shark attack in Natal.

    Science.gov (United States)

    White, J A

    1975-02-01

    The injuries in 5 cases of shark attack in Natal during 1973-74 are reviewed. Experience in shark attacks in South Africa during this period is discussed (1965-73), and the value of protecting heavily utilized beaches in Natal with nets is assessed. The surgical applications of elasmobranch research at the Oceanographic Research Institute (Durban) and at the Headquarters of the Natal Anti-Shark Measures Board (Umhlanga Rocks) are described. Modern trends in the training of surf life-guards, the provision of basic equipment for primary resuscitation of casualties on the beaches, and the policy of general and local care of these patients in Natal are discussed.

  16. Puncture resistance in 'Sharwil' avocado to oriental fruit fly and Mediterranean fruit fly (Diptera: Tephritidae) oviposition.

    Science.gov (United States)

    Follett, Peter A

    2009-06-01

    The physiological basis for host antibiosis or nonpreference to a quarantine pest is often not understood. Studies are needed on the mechanisms that impart resistance to better understand how resistance might fail. Experiments were conducted to examine the infestability of 'Sharwil' avocados by oriental fruit fly, Bactrocera dorsalis (Hendel), and Mediterranean fruit fly, Ceratitis capitata (Wiedemann) (Diptera: Tephritidae), after harvest and to quantify the effect of avocado skin hardness on resistance to infestation by oriental fruit fly. Infestation rate increased with decreasing fruit firmness, but fruit were generally poor hosts. Fruit with a patch of skin removed produced more flies than intact fruit, suggesting that skin puncture resistance was an important deterrent to oviposition. This study showed that fruit can be infested within 1 d after harvest, suggesting that fruit should be transferred to fruit fly-proof containers as they are harvested to minimize the risk of attack. Although risk of infestation is negatively correlated with fruit firmness, even some hard fruit may become infested. Therefore, fruit firmness cannot be used alone as an indicator to ensure fruit fly-free 'Sharwil' avocados. Measuring fruit firmness may be a useful component of a multiple component systems approach as an additional safeguard to reduce risk of infestation.

  17. Fly ash carbon passivation

    Science.gov (United States)

    La Count, Robert B; Baltrus, John P; Kern, Douglas G

    2013-05-14

    A thermal method to passivate the carbon and/or other components in fly ash significantly decreases adsorption. The passivated carbon remains in the fly ash. Heating the fly ash to about 500 and 800 degrees C. under inert gas conditions sharply decreases the amount of surfactant adsorbed by the fly ash recovered after thermal treatment despite the fact that the carbon content remains in the fly ash. Using oxygen and inert gas mixtures, the present invention shows that a thermal treatment to about 500 degrees C. also sharply decreases the surfactant adsorption of the recovered fly ash even though most of the carbon remains intact. Also, thermal treatment to about 800 degrees C. under these same oxidative conditions shows a sharp decrease in surfactant adsorption of the recovered fly ash due to the fact that the carbon has been removed. This experiment simulates the various "carbon burnout" methods and is not a claim in this method. The present invention provides a thermal method of deactivating high carbon fly ash toward adsorption of AEAs while retaining the fly ash carbon. The fly ash can be used, for example, as a partial Portland cement replacement in air-entrained concrete, in conductive and other concretes, and for other applications.

  18. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  19. Formation Flying Concept Issues

    Directory of Open Access Journals (Sweden)

    M. V. Palkin

    2015-01-01

    Full Text Available The term “formation flying” implies coordinated movement of at least two satellites on coplanar and non-coplanar orbits with a maximum distance between them being much less than the length of the orbit. Peculiarities of formation flying concept also include:- automatic coordination of satellites;- sub-group specialization of formation flying satellites;- equipment and data exchange technology unification in each specialized group or subgroup.Formation flying satellites can be classified according to the configuration stability level (order (array, cluster («swarm», intergroup specialization rules («central satellite», «leader», «slave», manoeuvrability («active» and «passive» satellites.Tasks of formation flying include:- experiments with payload, distributed in formation flying satellites;- various near-earth space and earth-surface research;- super-sized aperture antenna development;- land-based telescope calibration;- «space advertisement» (earth-surface observable satellite compositions of a logotype, word, etc.;- orbital satellite maintenance, etc.Main issues of formation flying satellite system design are:- development of an autonomous satellite group manoeuvring technology;- providing a sufficient characteristic velocity of formation flying satellites;- ballistic and navigation maintenance for satellite formation flying;- technical and economic assessment of formation flying orbital delivery and deployment;- standardization, unification, miniaturization and integration of equipment;- intergroup and intersatellite function redistribution.

  20. When women attack.

    Science.gov (United States)

    McLaughlin, Bryan; Davis, Catasha; Coppini, David; Kim, Young Mie; Knisely, Sandra; McLeod, Douglas

    2015-01-01

    The common assumption that female candidates on the campaign trail should not go on the attack, because such tactics contradict gender stereotypes, has not received consistent support. We argue that in some circumstances gender stereotypes will favor female politicians going negative. To test this proposition, this study examines how gender cues affect voter reactions to negative ads in the context of a political sex scandal, a context that should prime gender stereotypes that favor females. Using an online experiment involving a national sample of U.S. adults (N = 599), we manipulate the gender and partisan affiliation of a politician who attacks a male opponent caught in a sex scandal involving sexually suggestive texting to a female intern. Results show that in the context of a sex scandal, a female candidate going on the attack is evaluated more positively than a male. Moreover, while female participants viewed the female sponsor more favorably, sponsor gender had no effect on male participants. Partisanship also influenced candidate evaluations: the Democratic female candidate was evaluated more favorably than her Republican female counterpart.

  1. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  2. Replacement Attack: A New Zero Text Watermarking Attack

    Science.gov (United States)

    Bashardoost, Morteza; Mohd Rahim, Mohd Shafry; Saba, Tanzila; Rehman, Amjad

    2017-03-01

    The main objective of zero watermarking methods that are suggested for the authentication of textual properties is to increase the fragility of produced watermarks against tampering attacks. On the other hand, zero watermarking attacks intend to alter the contents of document without changing the watermark. In this paper, the Replacement attack is proposed, which focuses on maintaining the location of the words in the document. The proposed text watermarking attack is specifically effective on watermarking approaches that exploit words' transition in the document. The evaluation outcomes prove that tested word-based method are unable to detect the existence of replacement attack in the document. Moreover, the comparison results show that the size of Replacement attack is estimated less accurate than other common types of zero text watermarking attacks.

  3. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    Directory of Open Access Journals (Sweden)

    Yi-Hsun Wang

    2010-09-01

    Full Text Available Web applications suffer from cross-site scripting (XSS attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model for generalizing the structure model. The paper has the contributions as following: (1 automatically learn the structure of attack vectors from practical data analysis to modeling a structure model of attack vectors, (2 mimic the manners and the elements of attack vectors to extend the ability of testing tool for identifying XSS vulnerabilities, (3 be helpful to verify the flaws of blacklist sanitization procedures of Web applications. We evaluated the proposed mechanism by Burp Intruder with a dataset collected from public XSS archives. The results show that mutated XSS attack generation can identify potential vulnerabilities.

  4. Fly ash for durable concrete construction

    Energy Technology Data Exchange (ETDEWEB)

    Dhir, R.K. [University of Dundee, Dundee (United Kingdom). Dept. of Civil Engineering

    1994-12-31

    This is essentially a review paper, bringing together the various studies undertaken at the University of Dundee as well as many others selected from published work. A full range of durability properties have been considered dealing with the effects of fly ash (FA) in concrete. It is shown that the use of FA generally effects improvement in the resistance of concrete to various forms of attack. FA is shown to greatly improve concrete resistance to chloride ingress and to reduce expansion caused by ASR. In the case of sulphate attack the use of FA is recommended. With regard to carbonation, FA can slightly reduce the resistance. It is also shown that FA concrete will benefit more from curing than OPC concrete in developing its resistance to deterioration with age. 78 refs., 8 figs., 5 tabs.

  5. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  6. Ever Fly a Tetrahedron?

    Science.gov (United States)

    King, Kenneth

    2004-01-01

    Few things capture the spirit of spring like flying a kite. Watching a kite dance and sail across a cloud spotted sky is not only a visually appealing experience it also provides a foundation for studies in science and mathematics. Put simply, a kite is an airfoil surface that flies when the forces of lift and thrust are greater than the forces of…

  7. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    CERN Document Server

    Wang, Yi-Hsun; Lee, Hahn-Ming; 10.4204/EPTCS.35.2

    2010-01-01

    Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM) as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model...

  8. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  9. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks...... that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio...

  10. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  11. Short Range Top Attack Trajectory Optimum Design Based on Genetic Algorithm

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    A flying-body is considered as the reference model, the optimized mathematical model is established. The genetic operators are designed and algorithm parameters are selected reasonably. The scheme control signal in short range top attack flight trajectory is optimized by using genetic algorithm. The short range top attack trajectory designed meets the design requirements, with the increase of the falling angle and the decrease of the minimum range. The application of genetic algorithm to top attack trajectory optimization is proved to be feasibly and effectively according to the analyses of results.

  12. Flying and Your Child's Ears

    Science.gov (United States)

    ... Media Flying and Your Child's Ears KidsHealth > For Parents > Flying and Your Child's Ears Print A A A What's in this article? Flying's Effects on Ears Tips for Easing Ear Pain en español Como cuidar los oídos de su hijo(a) cuando vuele en avión Flying's Effects on ...

  13. Microstructural Effects of Sulphate Attack in Sustainable Grouts for Micropiles

    Directory of Open Access Journals (Sweden)

    José Marcos Ortega Álvarez

    2016-11-01

    Full Text Available Nowadays, the use of micropiles has undergone a great development. In general, they are made with cement grout, reinforced with steel tubing. In Spain, these grouts are prepared using OPC, although the standards do not forbid the use of other cements, like sustainable ones. Micropiles are in contact with soils and groundwater, in which the presence of sulphates is common. Their deleterious effects firstly affect to the microstructure. Then, the aim of this research is to study the effects of sulphate attack in the microstructure of micropiles grouts, prepared with OPC, fly ash and slag commercial cements, compared to their behaviour when they are exposed to an optimum hardening condition. The microstructure evolution has been studied with the non-destructive impedance spectroscopy technique, which has never been used for detecting the effects of sulphate attack when slag and fly ash cements are used. Its results have been contrasted with mercury intrusion porosimetry and “Wenner” resistivity ones. The 28-day compressive strength of grouts has been also determined. The results of microstructure characterization techniques are in agreement, although impedance spectroscopy is the most sensitive for following the changes in the porous network of grouts. The results showed that micropiles made using fly ash and slag cements could have a good performance in contact with aggressive sodium sulphate media, even better than OPC ones.

  14. Tracing Technique for Blaster Attack

    CERN Document Server

    S., Siti Rahayu; S., Shahrin; A., Faizal M; M, Mohd Zaki; R, Irda

    2009-01-01

    Blaster worm of 2003 is still persistent, the infection appears to have successfully transitioned to new hosts as the original systems are cleaned or shut off, suggesting that the Blaster worm, and other similar worms, will remain significant Internet threats for many years after their initial release. This paper is to propose technique on tracing the Blaster attack from various logs in different OSI layers based on fingerprint of Blaster attack on victim logs, attacker logs and IDS alert log. The researchers intended to do a preliminary investigation upon this particular attack so that it can be used for further research in alert correlation and computer forensic investigation.

  15. The Timing of Terrorist Attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2016-01-01

    I use a simple optimal stopping model to derive policy relevant insights on the timing of one-shot attacks by small autonomous terrorist units or “lone wolf” individuals. A main insight is that an increase in proactive counterterrorism measures can lead to a short term increase in the number...... of attempted terrorist attacks because it makes it more risky for existing terrorist units to pursue further development of capabilities. This is consistent with the events in London in 2005 where a terrorist attack on 7 July was followed by a similar but unsuccessful attack two weeks later....

  16. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  17. Seven Deadliest Web Application Attacks

    CERN Document Server

    Shema, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then you need Seven Deadliest Web Application Attacks. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. .. .. Attacks detailed in this book include: ..: ..; Cross-Site Scripting (XSS) ..; Cross-Site Request Fo

  18. Flying in North America

    Directory of Open Access Journals (Sweden)

    Jaromír Procházka

    2013-01-01

    Full Text Available Flying all over the world is very challenging and demanding. Although ICAO is covering every specific detail by rules, there are some personal experiences which cannot be substituted. Some of them are point out in the article.

  19. The effect of irradiation and mass rearing on the anti-predator behaviour of the Mexican fruit fly, Anastrepha ludens (Diptera: Tephritidae).

    Science.gov (United States)

    Rao, D; Aguilar-Argüello, S; Montoya, P; Díaz-Fleischer, F

    2014-04-01

    Fruit flies (Diptera: Tephritidae) are major pests worldwide. The sterile insect technique, where millions of flies are reared, sterilized by irradiation and then released, is one of the most successful and ecologically friendly methods of controlling populations of these pests. The mating behaviour of irradiated and non-irradiated flies has been compared in earlier studies, but there has been little attention paid to the anti-predator behaviour of mass-reared flies, especially with respect to wild flies. Tephritid flies perform a supination display to their jumping spider predators in order to deter attacks. In this study, we evaluated the possibility of using this display to determine the anti-predator capabilities of mass-reared irradiated, non-irradiated flies, and wild flies. We used an arena setup and observed bouts between jumping spiders (Phidippus audax Hentz) and male Mexican fruit flies (Anastrepha ludens Loew). We show that although all flies performed a supination display to their predator, wild flies were more likely to perform a display and were significantly more successful in avoiding attack than mass-reared flies. We suggest that this interaction can be used to develop a rapid realistic method of quality control in evaluating anti-predator abilities of mass-reared fruit flies.

  20. The Fly Printer - Extended

    DEFF Research Database (Denmark)

    Beloff, Laura; Klaus, Malena

    2016-01-01

    Artist talk / Work-in-progress What is the purpose of a machine or an artifact, like the Fly Printer, that is dislocated, that produces images that have no meaning, no instrumentality, that depict nothing in the world? The biological and the cultural are reunited in this apparatus as a possibilit...... the results. The extended version of the Fly Printer containing the technological perception and DNNs is a collaboration between Laura Beloff and Malene Theres Klaus...

  1. Chemical attraction of kleptoparasitic flies to heteropteran insects caught by orb-weaving spiders.

    OpenAIRE

    Eisner, T.; Eisner, M; Deyrup, M

    1991-01-01

    Insects of the heteropteran families Pentatomidae (stink bugs) and Coreidae (squash bugs), when being eaten by the orb-weaving spider Nephila clavipes, attract flies of the family Milichiidae. The flies aggregate on the bugs and, as kleptoparasites, share in the spider's meal. Stink bugs and squash bugs typically eject defensive sprays when attacked; they do so when caught by Nephila, but the spray only minimally affects the spider. Evidence is presented indicating that it is the spray of the...

  2. Baby Killers: Documentation and Evolution of Scuttle Fly (Diptera: Phoridae) Parasitism of Ant (Hymenoptera: Formicidae) Brood

    OpenAIRE

    Brown, Brian; Hash, John; Hartop, Emily; Porras, Wendy; Amorim, Dalton

    2017-01-01

    Numerous well-documented associations occur among species of scuttle flies (Diptera: Phoridae) and ants (Hymenoptera: Formicidae), but examples of brood parasitism are rare and the mechanisms of parasitism often remain unsubstantiated. We present two video-documented examples of ant brood (larvae and pupae) parasitism by scuttle flies. In footage from Estação Biológica de Boracéia in Brazil, adult females of Ceratoconus setipennis Borgmeier can be seen attacking workers of Linepithema h...

  3. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  4. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  5. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  6. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security...

  7. Multiculturalism & The Charlie Hebdo Attack

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2016-01-01

    The attack on Charlie Hebdo has by many been linked to multiculturalism. But it is unclear exactly how the connection between multiculturalism and the attack should be understood and whether there indeed is such a connection. The article discusses this by distinguishing between different senses o...... of multiculturalism and different ways in which one might think that there is a link between multiculturalism and the attack. On this basis the resulting claims are discussed as to whether they are in fact plausible, which many of them turn out not to be....

  8. Multiculturalism & The Charlie Hebdo Attack

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2016-01-01

    The attack on Charlie Hebdo has by many been linked to multiculturalism. But it is unclear exactly how the connection between multiculturalism and the attack should be understood and whether there indeed is such a connection. The article discusses this by distinguishing between different senses...... of multiculturalism and different ways in which one might think that there is a link between multiculturalism and the attack. On this basis the resulting claims are discussed as to whether they are in fact plausible, which many of them turn out not to be....

  9. ANALYSIS OF FLYING BIKE

    OpenAIRE

    Momin Irfan Ali Nasir Husain *1, Shah mohd. Rafique rahmatullah *2, Naumanulhaq Barkatullah Shaikh *3, Khatib Mohd. Azimuddin Najimuddin *4, Ansari Mohammad Naasir Shamsudduha *5, Ansari Mohammad Parvez Abdul Qayyum*6, Momin Mohammad Rayyan Mohammad Shakeel*7, Ansari Peer Mohammed Munna *8, Prof. Mohd. Musharraf Aamir

    2016-01-01

    Flying Bike vertical take-off and landing (VTOL) type machine which also follows Newton’s third law. It is thought of as a conventional type of aircraft with special features added to enable it to rise vertically during take-off and to land from a vertical descent.  It flies with two propellers located at front and back side. These propellers are having hovering abilities. The vehicle is controlled by tilting the propellers by using lever mechanism. Rotation is carried out by diffe...

  10. Social Engineering:A Partial Technical attack

    OpenAIRE

    P.S.Maan; Manish Sharma

    2012-01-01

    This paper suggests the crystal clear concept behind the social engineering attack. Basically social engineering is a non technical attack. But social engineering attack is an attack on human psychology to get the information, but using what? Basically it is an attack on human psychology by using some technical skills or technology. Social engineering attack has many types like fake mail, telephonic cheat etc. which are impossible without any technical skills, so in this paper we suggest that...

  11. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  12. The stable fly (Stomoxys calcitrans) (Diptera: Muscidae) recorded from the Faroes

    DEFF Research Database (Denmark)

    Nielsen, Søren Achim; Bloch, Dorete

    2005-01-01

    The stable fly (Stomoxys calcitrans) was recorded from the Faroe Islands in 2002 for the first time in five byres at Velbastaður in the vicinity of Tórshavn. The stable fly breeds in dead and decomposing plant material e.g. dung mixed with straw. If the temperature is higher than 18 ºC the species...... can reproduce all the year in the byres. Both sexes are blood feeding and attack vertebrates with preference for cattle and other ungulates. By high fly population the biting activity can result in reduction of milk and bodyweight in the livestock. S. calcitrans was probably introduced into the Faroes...... in imported cattle feed. Since the first reports on flies biting man were received in 2002, the species was probably recently introduced. In the Velbastaður area the species is widespread and probably mainly dispersed by exchange of cattle or forage. To reduce the fly problem it is important to maintain...

  13. Social Engineering:A Partial Technical attack

    Directory of Open Access Journals (Sweden)

    P. S. Maan

    2012-03-01

    Full Text Available This paper suggests the crystal clear concept behind the social engineering attack. Basically social engineering is a non technical attack. But social engineering attack is an attack on human psychology to get the information, but using what? Basically it is an attack on human psychology by using some technical skills or technology. Social engineering attack has many types like fake mail, telephonic cheat etc. which are impossible without any technical skills, so in this paper we suggest that , it is a partial technical attack and can be divided in human based and typical computer based social engineering attack.

  14. Prevenção domiciliar da dengue: avaliação preliminar de tela protetora para pratos de vasos de planta Prevención domiciliar de la dengue: evaluación preliminar de tela protectora para platos de macetas de planta Dengue prevention at the household level: preliminary evaluation of a mesh cover for flowerpot saucers

    Directory of Open Access Journals (Sweden)

    Virgínia Torres Schall

    2009-10-01

    Full Text Available Avaliou-se em laboratório a eficácia de um protótipo de capa de tela de poliéster (evidengue® destinada a vedar o acesso de fêmeas do mosquito Aedes aegypti a pratos de vasos de planta. Dois pratos de vasos com água foram envolvidos individualmente com a capa e colocados com os seus respectivos vasos em duas gaiolas entomológicas, um em cada gaiola. Numa terceira gaiola foi colocado um conjunto idêntico de prato e vasos sem a capa. Cada gaiola recebeu 20 fêmeas copuladas do mosquito, alimentadas com sangue de camundongo. Os resultados mostram que a capa foi eficaz como barreira ao acesso de fêmeas. Novos testes são necessários para se avaliar a eficácia da capa como dispositivo de prevenção da ovipostura nos pratos.Se evaluó en laboratorio la eficiencia de una cubierta de tela de polyester (evidengue® con el objetivo de vedar el acceso de hembras del mosquito Aedes aegypti a platos de macetas de planta. Fueron utilizadas tres jaulas entomológicas, dos de ellas con evidengue® y una para control. En cada jaula fueron colocados dos conjuntos de macetas de planta y platos y 20 hembras copuladas, alimentadas con sangre de ratón. Los resultados muestran que la cubierta fue eficaz como barrera al acceso de hembras. Nuevas pruebas son necesarias para evaluar la eficiencia de la cubierta como dispositivo de prevención de la oviposición en los platos.The effectiveness of a polyester mesh cover (evidengue®, aimed at preventing the access of female Aedes aegypti mosquitoes to flowerpot saucers, was evaluated in laboratory. Two saucers of flowerpot with water were individually wrapped with the cover was placed with their respective pots in two entomological cages. One identical set of flowerpot and saucer was placed in a third cage. In each cage, 20 gravid females, fed on mouse blood, were released. Results show that the cover was effective to prevent access of females. Further tests are necessary to assess cover effectiveness as a

  15. Microarchitectural Side-Channel Attacks

    OpenAIRE

    Gallais, Jean-Francois

    2013-01-01

    Cryptanalysis is the science which evaluates the security of a cryptosystem and detects its weaknesses and flaws. Initially confined to the black-box model, where only the input and output data were considered, cryptanalysis is now broadened to the security evaluation of the physical implementation of a cryptosystem. The implementation attacks which compose physical cryptanalysis are divided into fault attacks, exploiting the effect of disruption of the normal functioning of the device, and s...

  16. Kite-Flying Fun

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    China’s kite capital welcomes flying enthusiasts from across the world to its annual carnival Tens of thousands of kite enthusiast from all over the world gathered under the growing swarm of brightly colored kites. Some of the floating and billowing forms had been fashioned into

  17. Additive attacks on speaker recognition

    Science.gov (United States)

    Farrokh Baroughi, Alireza; Craver, Scott

    2014-02-01

    Speaker recognition is used to identify a speaker's voice from among a group of known speakers. A common method of speaker recognition is a classification based on cepstral coefficients of the speaker's voice, using a Gaussian mixture model (GMM) to model each speaker. In this paper we try to fool a speaker recognition system using additive noise such that an intruder is recognized as a target user. Our attack uses a mixture selected from a target user's GMM model, inverting the cepstral transformation to produce noise samples. In our 5 speaker data base, we achieve an attack success rate of 50% with a noise signal at 10dB SNR, and 95% by increasing noise power to 0dB SNR. The importance of this attack is its simplicity and flexibility: it can be employed in real time with no processing of an attacker's voice, and little computation is needed at the moment of detection, allowing the attack to be performed by a small portable device. For any target user, knowing that user's model or voice sample is sufficient to compute the attack signal, and it is enough that the intruder plays it while he/she is uttering to be classiffed as the victim.

  18. Hydration of fly ash cement

    Energy Technology Data Exchange (ETDEWEB)

    Etsuo Sakai; Shigeyoshi Miyahara; Shigenari Ohsawa; Seung-Heun Lee; Masaki Daimon [Tokyo Institute of Technology, Tokyo (Japan). Department of Metallurgy and Ceramics Science, Graduate School of Science and Engineering

    2005-06-01

    It is necessary to establish the material design system for the utilization of large amounts of fly ash as blended cement instead of disposing of it as a waste. Cement blended with fly ash is also required as a countermeasure to reduce the amount of CO{sub 2} generation. In this study, the influences of the glass content and the basicity of glass phase on the hydration of fly ash cement were clarified and hydration over a long curing time was characterized. Two kinds of fly ash with different glass content, one with 38.2% and another with 76.6%, were used. The hydration ratio of fly ash was increased by increasing the glass content in fly ash in the specimens cured for 270 days. When the glass content of fly ash is low, the basicity of glass phase tends to decrease. Reactivity of fly ash is controlled by the basicity of the glass phase in fly ash during a period from 28 to 270 days. However, at an age of 360 days, the reaction ratios of fly ash show almost identical values with different glass contents. Fly ash also affected the hydration of cement clinker minerals in fly ash cement. While the hydration of alite was accelerated, that of belite was retarded at a late stage.

  19. An area wide control of fruit flies in Mauritius

    Energy Technology Data Exchange (ETDEWEB)

    Sookar, P.; Permalloo, S.; Gungah, B.; Alleck, M.; Seewooruthun, S.I.; Soonnoo, A.R., E-mail: ento@intnet.m, E-mail: moa-entomology@mail.gov.m [Ministry of Agro Industry and Fisheries Reduit, Republic of Mauritius (Mauritius)

    2006-07-01

    An area-wide National Fruit Fly Control Programme (NFFCP) was initiated in 1994, funded by the European Union until 1999 and now fully financed by the Government of Mauritius. The NFFCP targets some 75,000 backyard fruit trees owners mainly. The bait application and male annihilation techniques (BAT e MAT) are currently being applied against the fruit flies attacking fleshy fruits and are targeting selected major fruit growing areas in the north, north-east, central and western parts of the island. Successful control has been achieved using these two techniques as demonstrated by trap catches and fruit samplings. The level of fruit fly damage to fruits has been reduced. Presently, the bait-insecticide mixture is being supplied free of charge to the public. The current status of the area-wide suppression programme is such that continuous use of BAT/MAT is a never ending process and as such is not viable. In this context, a TC project on Feasibility studies for integrated use of sterile insect technique for area wide tephritid fruit fly control.Studies are also being carried out on mass rearing of the peach fruit fly for small scale trials on SIT so as to eventually integrate this control method in our area-wide control programme. (author)

  20. An annotated checklist of the horse flies, deer flies, and yellow flies (Diptera: Tabanidae) of Florida

    Science.gov (United States)

    The family Tabanidae includes the horse flies, deer flies, and yellow flies and is considered a significant pest of livestock throughout the United States, including Florida. Tabanids can easily become a major pest of man, especially salt marsh species which are known to readily feed on humans and o...

  1. Lifestyle Changes for Heart Attack Prevention

    Science.gov (United States)

    ... symptoms of a heart attack. It presents one woman's real-life experience with heart attack symptoms, which started during her pregnancy. The video also explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, ...

  2. How Is a Heart Attack Treated?

    Science.gov (United States)

    ... symptoms of a heart attack. It presents one woman's real-life experience with heart attack symptoms, which started during her pregnancy. The video also explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, ...

  3. How Is a Heart Attack Diagnosed?

    Science.gov (United States)

    ... symptoms of a heart attack. It presents one woman's real-life experience with heart attack symptoms, which started during her pregnancy. The video also explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, ...

  4. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  5. RESIST SRP AGAINST WORMHOLE ATTACK

    Directory of Open Access Journals (Sweden)

    Marjan Kuchaki Rafsanjani

    2013-06-01

    Full Text Available Ad-hoc networks refer to temporary or interim networks which form for special purposes. Actually they are wireless networks with mobile nodes. These networks use no network assisting element for path routing and in these networks available nodes are responsible for path routing. Therefore when malicious nodes want to find a way to interfere with the path routing then the existence of a secure route protocol (SRP can prevent the interference. SRP protocol is one of the secure algorithms of path routing protocol but it is notresistant against wormhole attack. Wormhole attack is considered as a subtle attack in which two malicious nodes make a short connection in network's topology through private or implicit connection and represent two non neighbor nodes as neighbors and prevent the correctoperation of path routing protocol by using this method. One of the methods of preventing wormhole attack is by using packet leashes. We try to decrease the wormhole attack occurrence in this routing protocol by a kind of packet leashes called temporal leashes. We alsowill minimize problems resulting from using temporal leashes by different methods and modifications in its structure.

  6. Network robustness under large-scale attacks

    CERN Document Server

    Zhou, Qing; Liu, Ruifang; Cui, Shuguang

    2014-01-01

    Network Robustness under Large-Scale Attacks provides the analysis of network robustness under attacks, with a focus on large-scale correlated physical attacks. The book begins with a thorough overview of the latest research and techniques to analyze the network responses to different types of attacks over various network topologies and connection models. It then introduces a new large-scale physical attack model coined as area attack, under which a new network robustness measure is introduced and applied to study the network responses. With this book, readers will learn the necessary tools to evaluate how a complex network responds to random and possibly correlated attacks.

  7. 利用翼尖减阻装置提高碟形飞行器性能%Using Wing Tip Devices to Improve Performance of Saucer-Shaped Aircraft

    Institute of Scientific and Technical Information of China (English)

    于军力; 王林林; 高歌

    2006-01-01

    碟型飞行器采用了新颖的翼身融合气动布局.与常规飞行器相比,这种外形通过机身和机翼完全融合消除了机身阻力,且具有结构简单、容载大等许多优点,但由于其展弦比小而导致诱导阻力较大.本文通过风洞吹风试验,找到一种后掠鱼鳍形的翼尖小翼装置能很好地减小其诱导阻力.对模型安装翼尖小翼后,风洞测量其最大升阻比在30 m/s风速下提高了75%,在50 m/s风速下可达到15.为进一步考察安装翼尖装置后的飞行器低速气动性能,对其进行了模型试飞研究.试飞验证了风洞吹风结果,不仅提高了载重量而且使横侧飞行稳定性增强.%Saucer-shaped aircraft adopts a novel aerodynamic configuration of blending fuselage with wing. In contrast to the ordinary aircraft configurations, this kind of configuration can totally eliminate the drag resulted from fuselage, bringing many advantages such as simple structure, compact scale, high load capability. But its small aspect ratio makes the induced drag higher. Through wind tunnel experiments, it is discovered that a type of sweepback fin-shaped winglet can efficiently reduce the induced drag of this kind of aircraft. When this winglet is mounted to a model in wind tunnel experiment, the maximal ratio of lift to drag of the model can be increased by 75% as compared with the model without winglet at the speed of 30 m/s, and reached 15 at the speed of 50 m/s. In order to investigate the performance of this aircraft with winglet at low speed, test flights were processed. The results of test flights not only verify the conclusions of experiments in wind tunnel but also indicate that the load capability of the aircraft with winglet is increased and its lateral stability is even better than that of the aircraft without winglet.

  8. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...... side-channels attacks can be applied to ECC. This paper reflects an ongoing research in the field of countermeasures against the attacks mentioned above....

  9. Lift and wakes of flying snakes

    CERN Document Server

    Krishnan, Anush; Vlachos, Pavlos P; Barba, L A

    2013-01-01

    Flying snakes use a unique method of aerial locomotion: they jump from tree branches, flatten their bodies and undulate through the air to produce a glide. The shape of their body cross-section during the glide plays an important role in generating lift. This paper presents a computational investigation of the aerodynamics of the cross-sectional shape. We performed two-dimensional simulations of incompressible flow past the anatomically correct cross-section of the species Chrysopelea paradisi, showing that a significant enhancement in lift appears at an angle of attack of 35 degrees, above Reynolds numbers 2000. Previous experiments on physical models also obtained an increased lift, at the same angle of attack. The flow is inherently three-dimensional in physical experiments, due to fluid instabilities, and it is thus intriguing that the enhanced lift appears also in the two-dimensional simulations. The simulations point to the lift enhancement arising from the early separation of the boundary layer on the ...

  10. Global Mapping of Cyber Attacks

    Science.gov (United States)

    2014-01-01

    permutations of rows and columns. 3 Related Work Most prior empirical cyber security work is interested in characterizing the mode of operation of attack...The attribute networks (ICT att, bandwidth att, bribes att, ICT vie and ICT % diff) have all 1 component, and density and clustering coefficient...attnlrutes or attackers and victims ICT att x ICT vie 0.19*** 0.23*** 0.51*** 0.47*** Bribes att x ICT vie 0.21• 0.21* -0.26* -0.27 Bandwidth att

  11. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error...

  12. Performance of attack strategies on modular networks

    CERN Document Server

    da Cunha, Bruno Requião

    2016-01-01

    Vulnerabilities of complex networks have became a trend topic in complex systems recently due to its real world applications. Most real networks tend to be very fragile to high betweenness adaptive attacks. However, recent contributions have shown the importance of interconnected nodes in the integrity of networks and module-based attacks have appeared promising when compared to traditional malicious non-adaptive attacks. In the present work we deeply explore the trade-off associated with attack procedures, introducing a generalized robustness measure and presenting an attack performance index that takes into account both robustness of the network against the attack and the run-time needed to obtained the list of targeted nodes for the attack. Besides, we introduce the concept of deactivation point aimed to mark the point at which the network stops to function properly. We then show empirically that non-adaptive module-based attacks perform better than high degree and betweenness adaptive attacks in networks ...

  13. Mitigating Higher Ed Cyber Attacks

    Science.gov (United States)

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  14. Television journalism during terror attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2008-01-01

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on major American networks the first 24 hours...

  15. FLOODING ATTACK AWARE SECURE AODV

    Directory of Open Access Journals (Sweden)

    S. Madhavi

    2013-01-01

    Full Text Available Providing security in a Mobile Ad hoc Network (MANET is a challenging task due to its inherent nature. Flooding is a type of Denial of Service (DoS attack in MANET. Intentional flooding may lead to disturbances in the networking operation. This kind of attack consumes battery power, storage space and bandwidth. Flooding the excessive number of packets may degrade the performance of the network. This study considers hello flooding attack. As the hello packets are continuously flooded by the malicious node, the neighbor node is not able to process other packets. The functioning of the legitimate node is diverted and destroys the networking operation. Absence of hello packet during the periodical hello interval may lead to wrong assumption that the neighbor node has moved away. So one of the intermediate neighbor nodes sends Route Error (RERR message and the source node reinitiates the route discovery process. In a random fashion the hello interval values are changed and convey this information to other nodes in the network in a secured manner. This study identifies and prevents the flooding attack. This methodology considers the performance parameters such as packet delivery ratio, delay and throughput. This algorithm is implemented in Secure AODV and tested in ad hoc environment. The result of the proposed algorithm decreases the control overhead by 2%.

  16. Television Journalism During Terror Attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on the major American networks in the fi rst 24...

  17. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Science.gov (United States)

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  18. Attack Vulnerability of Network Controllability.

    Science.gov (United States)

    Lu, Zhe-Ming; Li, Xin-Feng

    2016-01-01

    Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison. It is found that the node-based strategies are often more harmful to the network controllability than the edge-based ones, and so are the recalculated strategies than their counterparts. The Barabási-Albert scale-free model, which has a highly biased structure, proves to be the most vulnerable of the tested model networks. In contrast, the Erdős-Rényi random model, which lacks structural bias, exhibits much better robustness to both node-based and edge-based attacks. We also survey the control robustness of 25 real-world networks, and the numerical results show that most real networks are control robust to random node failures, which has not been observed in the model networks. And the recalculated betweenness-based strategy is the most efficient way to harm the controllability of real-world networks. Besides, we find that the edge degree is not a good quantity to measure the importance of an edge in terms of network controllability.

  19. Dielectric properties of fly ash

    Indian Academy of Sciences (India)

    S C Raghavendra; R L Raibagkar; A B Kulkarni

    2002-02-01

    This paper reports the dielectric properties of fly ash. The dielectric measurements were performed as a function of frequency and temperature. The sample of fly ash shows almost similar behaviour in the frequency and temperature range studied. The large value of dielectric constant in the typical frequency range is because of orientation polarization and tight binding force between the ions or atoms in the fly ash. The sample of fly ash is of great scientific and technological interest because of its high value of dielectric constant (104).

  20. The effect of the olive fruit fly (Bactrocera oleae) on quality parameters, and antioxidant and antibacterial activities of olive oil.

    Science.gov (United States)

    Medjkouh, Lynda; Tamendjari, Abderezak; Keciri, Sonia; Santos, Joana; Nunes, M Antónia; Oliveira, M B P P

    2016-06-15

    The present study was performed on olives from two Algerian cultivars (Limli and Rougette de Metidja) with different rates of attack by the Bactrocera oleae fly (0%, not attacked; 100%, all attacked; and real attacked %) and the corresponding olive oils. The aim was to verify the attack effect on quality parameters (free fatty acid, peroxide value, K232 and K270, oxidation stability), bioactive compounds (fatty acids and tocopherols, and total phenols and flavonoids), and on the antioxidant (reducing power, FRAP, β-carotene bleaching inhibition, ABTS and DPPH) and antibacterial (against 8 referenced human enteropathogenic bacteria by the agar disc diffusion method) capacities. Oils from infested olives were downgraded to the virgin olive oil category. Rougette de Metidja, the cultivar with a higher drupe size, was more attacked than Limli. The B. oleae attack causes an important decrease in the total phenolic contents (>30%) but to a lesser degree in the case of tocopherols. Among them, α-tocopherol is the most affected. The antioxidant and antibacterial activities were highly correlated with phenolic levels. The results of this study show the importance of controlling the fly attack because it causes a decrease in the beneficial health effects of olive oils.

  1. Flying over decades

    Science.gov (United States)

    Hoeller, Judith; Issler, Mena; Imamoglu, Atac

    Levy flights haven been extensively used in the past three decades to describe non-Brownian motion of particles. In this presentation I give an overview on how Levy flights have been used across several disciplines, ranging from biology to finance to physics. In our publication we describe how a single electron spin 'flies' when captured in quantum dot using the central spin model. At last I motivate the use of Levy flights for the description of anomalous diffusion in modern experiments, concretely to describe the lifetimes of quasi-particles in Josephson junctions. Finished PhD at ETH in Spring 2015.

  2. Vision in flying insects.

    Science.gov (United States)

    Egelhaaf, Martin; Kern, Roland

    2002-12-01

    Vision guides flight behaviour in numerous insects. Despite their small brain, insects easily outperform current man-made autonomous vehicles in many respects. Examples are the virtuosic chasing manoeuvres male flies perform as part of their mating behaviour and the ability of bees to assess, on the basis of visual motion cues, the distance travelled in a novel environment. Analyses at both the behavioural and neuronal levels are beginning to unveil reasons for such extraordinary capabilities of insects. One recipe for their success is the adaptation of visual information processing to the specific requirements of the behavioural tasks and to the specific spatiotemporal properties of the natural input.

  3. A study of a three-dimensional self-propelled flying bird with flapping wings

    Science.gov (United States)

    Zhu, LinLin; Guan, Hui; Wu, ChuiJie

    2015-09-01

    In this paper, a study of a three-dimensional (3D) self-propelled bionic flying bird in a viscous flow is carried out. This bionic bird is propelled and lifted through flapping and rotating wings, and better flying can be achieved by adjusting the flapping and rotation motion of wings. In this study, we found that the bird can fly faster forward and upward with appropriate center of rotation and oscillation without more energy consumption and have perfect flight performance at a certain angle of attack by adjusting the center of oscillation. The study utilizes a 3D computational fluid dynamics package which constitutes combined immersed boundary method and the volume of fluid method. In addition, it includes adaptive multigrid finite volume method and control strategy of swimming and flying.

  4. Perfection of Recent Attacks using IP

    Directory of Open Access Journals (Sweden)

    A. RENGARAJAN

    2012-02-01

    Full Text Available The Internet threat monitoring (ITM systems have been deployed to detect widespread attacks on the Internet in recent years. However, the effectiveness of ITM systems critically depends on the confidentiality of the location of their monitors. If adversaries learn the monitor locations of an ITM system, they can bypass the monitors and focus on the uncovered IP address space without being detected. In this paper, we study a new class of attacks, the invisible LOCalization (iLOC attack. The iLOC attack can accurately and invisibly localize monitors of ITM systems. In the iLOC attack, the attacker launches low-rate port-scan traffic, encoded with a selected pseudo noise code (PN-code, to targeted networks. While the secret PN-code is invisible to others, the attacker can accurately determine the existence of monitors in the targeted networks based on whether the PN-code is embedded in the report data queried from the data center of the ITM system. We formally analyze the impact of various parameters on attack effectiveness. We implement the iLOC attack and conduct the performance evaluation on a real-world ITM system to demonstrate the possibility of such attacks. We also conduct extensive simulations on the iLOC attack using real-world traces. Our data show that the iLOC attack can accurately identify monitors while being invisible to ITM systems. Finally, we present a set of guidelines to counteract the iLOC attack.

  5. Fly ash quality and utilization

    Energy Technology Data Exchange (ETDEWEB)

    Barta, L.E.; Lachner, L.; Wenzel, G.B. [Inst. for Energy, Budapest (Hungary); Beer, M.J. [Massachusetts Inst. of Technology, Cambridge, MA (United States)

    1995-12-01

    The quality of fly ash is of considerable importance to fly ash utilizers. The fly ash puzzolanic activity is one of the most important properties that determines the role of fly ash as a binding agent in the cementing process. The puzzolanic activity, however is a function of fly ash particle size and chemical composition. These parameters are closely related to the process of fly ash formation in pulverized coal fired furnaces. In turn, it is essential to understand the transformation of mineral matter during coal combustion. Due to the particle-to-particle variation of coal properties and the random coalescence of mineral particles, the properties of fly ash particles e.g. size, SiO{sub 2} content, viscosity can change considerably from particle to particle. These variations can be described by the use of the probability theory. Since the mean values of these randomly changing parameters are not sufficient to describe the behavior of individual fly ash particles during the formation of concrete, therefore it is necessary to investigate the distribution of these variables. Examples of these variations were examined by the Computer Controlled Scanning Electron Microscopy (CCSEM) for particle size and chemical composition for Texas lignite and Eagel Butte mineral matter and fly ash. The effect of combustion on the variations of these properties for both the fly ash and mineral matter were studied by using a laminar flow reactor. It is shown in our paper, that there are significant variations (about 40-50% around the mean values) of the above-listed properties for both coal samples. By comparing the particle size and chemical composition distributions of the mineral matter and fly ash, it was possible to conclude that for the Texas lignite mineral matter, the combustion did not effect significantly the distribution of these properties, however, for the Eagel Butte coal the combustion had a major impact on these mineral matter parameters.

  6. Physics of flying

    Science.gov (United States)

    Vetrone, Jim

    2015-05-01

    Column editor's note: As the school year comes to a close, it is important to start thinking about next year. One area that you want to consider is field trips. Many institutions require that teachers plan for a field trip well in advance. Keeping that in mind, I asked Jim Vetrone to write an article about the fantastic field trip he takes his AP Physics students on. I had the awesome opportunity to attend a professional development day that Jim arranged at iFLY in the Chicago suburbs. The experience of "flying" in a wind tunnel was fabulous. Equally fun was watching the other physics teachers come up with experiments to have the professional "flyers" perform in the tube. I could envision my students being similarly excited about the experience and about the development of their own experiments. After I returned to school, I immediately began the process of trying to get this field trip approved for the 2015-16 school year. I suggest that you start your process as well if you hope to try a new field trip next year. The key to getting the approval, in my experience, is submitting a proposal early that includes supporting documentation from sources. Often I use NGSS or state standards as justifications for my field trips. I have also quoted College Board expectations for AP Physics 1 and 2 in my documents when requesting an unusual field trip.quote>

  7. Flying qualities design criteria applicable to supersonic cruise aircraft

    Science.gov (United States)

    Chalk, C. R.

    1980-01-01

    A comprehensive set of flying qualities design criteria was prepared for use in the supersonic cruise research program. The framework for stating the design criteria is established and design criteria are included which address specific failures, approach to dangerous flight conditions, flight at high angle of attack, longitudinal and lateral directional stability and control, the primary flight control system, and secondary flight controls. Examples are given of lateral directional design criteria limiting lateral accelerations at the cockpit, time to roll through 30 deg of bank, and time delay in the pilot's command path. Flight test data from the Concorde certification program are used to substantiate a number of the proposed design criteria.

  8. Zika Attacks Nerves, Muscles, Other Tissues

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_164010.html Zika Attacks Nerves, Muscles, Other Tissues Monkey study may ... 2017 (HealthDay News) -- Scientists have learned where the Zika virus attacks the body in monkeys. In their ...

  9. Classification of cyber attacks in South Africa

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-05-01

    Full Text Available This paper introduces a classification scheme for the visual classification of cyber attacks. Through the use of the scheme, the impact of various cyber attacks throughout the history of South Africa are investigated and classified. The goal...

  10. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within...

  11. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  12. Social engineering attack examples, templates and scenarios

    CSIR Research Space (South Africa)

    Mouton, Francois

    2016-06-01

    Full Text Available link. A social engineering attack targets this weakness by using various manipulation techniques to elicit sensitive information. The field of social engineering is still in its early stages with regard to formal definitions, attack frameworks...

  13. Refractive Index of Fly Rhabdomeres

    NARCIS (Netherlands)

    Stavenga, D.G.

    1974-01-01

    The refractive index reported previously for the rhabdomeres of flies (1.349) has been corrected for waveguide effects. The presented correction method has yielded n1 = 1.365 ± 0.006. It is argued that an acceptable estimate for the refractive index of the inhomogeneous surroundings of fly

  14. Effect of mutual interference on the ability of Spalangia cameroni (Hymenoptera: Pteromalidae) to attack and parasitize pupae of Stomoxys calcitrans (Diptera: Muscidae)

    DEFF Research Database (Denmark)

    Skovgård, Henrik; Nachman, Gösta

    2015-01-01

    We investigated the effect of mutual interference on the attack efficiency and the rate of successful parasitism on the parasitoid Spalangia cameroni (Perkins) attacking pupae of the stable fly Stomoxys calcitrans (L.). Female parasitoids (2, 4, 8, 16, or 32) were exposed to 100 fly pupae during 24...... h. The number of pupae that were attacked and the number successfully parasitized increased with the parasitoid density and reached a maximum of similar to 70 and 50, respectively. Parasitoid-induced mortality (PIM) was about 20 pupae, irrespective of parasitoid density. The per capita rates...... of attack, successful parasitism and parasitoid-induced mortality declined monotonously with parasitoid density. Progeny sex ratio was female biased for all parasitoid densities, but declined significantly with increasing parasitoid density from similar to 70% females at the lowest density to similar to 60...

  15. A Study of Gaps in Attack Analysis

    Science.gov (United States)

    2016-10-12

    at- tack analysis as opposed to analyzing individual attacks; making detection sensors temporally and spatially dynamic; making attack identification...and Analysis Environment Asymmetry 22 3.5 Legacy Support Requirements 27 3.6 Sensors are Static Spatially and Temporally , While Attacks are Dynamic 28...or analysis, typically due to a lack of context from the points of attack. 2. Systems are designed for expressiveness and flexibility a. Many languages

  16. Terror attacks influence driving behavior in Israel

    Science.gov (United States)

    Stecklov, Guy; Goldstein, Joshua R.

    2004-01-01

    Terror attacks in Israel produce a temporary lull in light accidents followed by a 35% spike in fatal accidents on Israeli roads 3 days after the attack. Our results are based on time-series analysis of Israeli traffic flows, accidents, and terror attacks from January 2001 through June 2002. Whereas prior studies have focused on subjective reports of posttraumatic stress, our study shows a population-level behavioral response to violent terror attacks. PMID:15448203

  17. Sybil attack in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Abirami.K

    2013-04-01

    Full Text Available Wireless network is very susceptible to different types of attack. The main attack is Sybil attack, which allows forming other attacks on the network. Security is very important to the wireless network. In wireless sensor network, to verify node identities by cryptographic authentication but this is not easy because sensor node which contains limited resources. Therefore the current research is going on how to handling the situation of different traffic levels and transmission power for security.

  18. New Multi-step Worm Attack Model

    OpenAIRE

    Robiah, Y.; Rahayu, S. Siti; Shahrin , S.; M. FAIZAL A.; Zaki, M. Mohd; Marliza, R.

    2010-01-01

    The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack pattern can be abstracted to form worms' attack model which describes the process of worms' infection. Fo...

  19. Biomechanics of knife stab attacks.

    Science.gov (United States)

    Chadwick, E K; Nicol, A C; Lane, J V; Gray, T G

    1999-10-25

    Equipment, materials and methods for the measurement of the biomechanical parameters governing knife stab attacks have been developed and data have been presented that are relevant to the improvement of standards for the testing of stab-resistant materials. A six-camera Vicon motion analysis system was used to measure velocity, and derive energy and momentum during the approach phase of the attack and a specially developed force-measuring knife was used to measure three-dimensional forces and torque during the impact phase. The body segments associated with the knife were modelled as a series of rigid segments: trunk, upper arm, forearm and hand. The velocities of these segments, together with knowledge of the mass distribution from biomechanical tables, allowed the calculation of the individual segment energy and momentum values. The instrumented knife measured four components of load: axial force (along the length of the blade), cutting force (parallel to the breadth of the blade), lateral force (across the blade) and torque (twisting action) using foil strain gauges. Twenty volunteers were asked to stab a target with near maximal effort. Three styles of stab were used: a short thrust forward, a horizontal style sweep around the body and an overhand stab. These styles were chosen based on reported incidents, providing more realistic data than had previously existed. The 95th percentile values for axial force and energy were 1885 N and 69 J, respectively. The ability of current test methods to reproduce the mechanical parameters measured in human stab attacks has been assessed. It was found that current test methods could reproduce the range of energy and force values measured in the human stab attacks, although the simulation was not accurate in some respects. Non-axial force and torque values were also found to be significant in the human tests, but these are not reproduced in the standard mechanical tests.

  20. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof;

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based...

  1. On Mitigating Distributed Denial of Service Attacks

    Science.gov (United States)

    Gao, Zhiqiang

    2006-01-01

    Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…

  2. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available In this paper we demonstrate how an automated reasoner, HermiT, is used to classify instances of computer network based attacks in conjunction with a network attack ontology. The ontology describes different types of network attacks through classes...

  3. 47 CFR 76.1612 - Personal attack.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Personal attack. 76.1612 Section 76.1612... CABLE TELEVISION SERVICE Notices § 76.1612 Personal attack. (a) When, during origination cablecasting of issues of public importance, an attack is made upon the honesty, character, integrity, or like...

  4. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...

  5. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  6. On Mitigating Distributed Denial of Service Attacks

    Science.gov (United States)

    Gao, Zhiqiang

    2006-01-01

    Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…

  7. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  8. Methods of Identifying and Preventing SQL Attacks

    Directory of Open Access Journals (Sweden)

    Bojken Shehu

    2012-11-01

    Full Text Available The paper begins by identifying the organizations which are vulnerable to the SQL attack referred to as an SQL injection attack. The term SQL injection attack is defined and a diagram is used to illustrate the way that attack occurs. In another section, the paper identifies the methods used to detect an attack to SQL, whereby the techniques are discussed extensively using relevant diagrams for illustration. The other sections cover the preventive methods, where the methods are also discussed with an illustration using diagrams.

  9. Lightweight Distance Bounding Protocol against Relay Attacks

    Science.gov (United States)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  10. Attacking the Cruise Missile Threat

    Science.gov (United States)

    2010-07-26

    little warning before a strike. Cruise missiles such as Silkworm and Exocet are designed to fly at “sea-skimming” levels only a few feet above the surface...the SS-N-2 Styx missile, a surface-to-surface antiship cruise missile. Most variants of modern cruise missiles are conversions of the Styx—the Silkworm ...number of Soviet built SS-N-2 Styxes that had been dismounted from boats.23 The Silkworm , the predominant of these variants, is the “Scud” of cruise

  11. Continuous Weight Attack on Complex Network

    Institute of Scientific and Technical Information of China (English)

    YIN Yan-Ping; ZHANG Duan-Ming; TAN Jin; PAN Gui-Jun; HE Min-Hua

    2008-01-01

    We introduce a continuous weight attack strategy and numerically investigate the effect of continuous use a weight coefficient ω to define the attack intensity. The weight coefficient ω increases continuously from 1 to infinity, where 1 represents no attack and infinity represents complete destructive attack. Our results show that the continuous weight attack on two selected nodes with small ω (ω≈ 3) could achieve the same damage of complete elimination of a single selected node on both BA and ER networks. It is found that the continuous weight attack on a single selected edge with small ω (ω≈ 2) can reach the same effect of complete elimination of a single edge on BA network, but on ER network the damage of the continuous weight attack on a single edge is close to but always smaller than that of complete elimination of edge even if ω is very large.

  12. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  13. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  14. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  15. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identifi...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....... through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based...

  16. Roll Control in Fruit Flies

    CERN Document Server

    Beatus, Tsevi; Cohen, Itai

    2014-01-01

    Due to aerodynamic instabilities, stabilizing flapping flight requires ever-present fast corrective actions. Here we investigate how flies control body roll angle, their most susceptible degree of freedom. We glue a magnet to each fly, apply a short magnetic pulse that rolls it in mid-air, and film the corrective maneuver. Flies correct perturbations of up to $100^{\\circ}$ within $30\\pm7\\mathrm{ms}$ by applying a stroke-amplitude asymmetry that is well described by a linear PI controller. The response latency is $\\sim5\\mathrm{ms}$, making the roll correction reflex one of the fastest in the animal kingdom.

  17. Establishment of the west indian fruit fly (Diptera: Tephritidae) parasitoid Doryctobracon areolatus (Hymenoptera: Braconidae)in the Dominican Republic

    Science.gov (United States)

    The West Indian fruit fly, Anastrepha obliqua (Macquart), infests numerous fruit species, particularly Anacardiaceae and most importantly mango (Mangifera indica L.). Widespread in the Neotropics, it was first reported in Hispaniola nearly 70 years ago. Continental populations are attacked by the op...

  18. Terrorist Attacks and Financial Markets

    OpenAIRE

    Bonekamp, Bas; van Veen, Tom

    2017-01-01

    This paper investigates the magnitude and the duration of the effect of a terrorist attack on stock market indices. We investigate the impact of New York (2001), Madrid (2004), London (2005), Boston (2013), Paris (2015), Brussels (2016), Nice (2016) and Berlin(2016) on the stock indices of the USA (S&P), Japan (NIKKEI), Germany (DAX), Spain (IBEX), UK (FTSE), France (CAC) and the Euronext Index (BEL). We use both a graphical analysis and an event study methodology to assess the effect of terr...

  19. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  20. Managing the Fruit Fly Experiment.

    Science.gov (United States)

    Jeszenszky, Arleen W.

    1997-01-01

    Describes a sophisticated version of the fruit fly experiment for teaching concepts about genetics to biology students. Provides students with the opportunity to work with live animals over an extended period. (JRH)

  1. Quantitative proteomics on the fly

    NARCIS (Netherlands)

    Gouw, J.W.

    2009-01-01

    The development of multicellular organisms is characterized by complex processes that progressively transform essentially a single cell into a creature with complicated structures and highly specialized functions. The fruit fly Drosophila melanogaster provides an excellent model system to investigat

  2. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  3. ACTIVITY ATTACK ON REDUCED VARIANTS OF RIJNDAEL

    Institute of Scientific and Technical Information of China (English)

    Wei Baodian; Liu Dongsu; Wang Xinmei

    2004-01-01

    The famous Square attacks against the Rijndael algorithm have taken advantage of the change of the balance of some bytes. Further study shows that the change of activity always happens before the change of balance, which builds the foundation for a new activity attack presented in this paper. In the activity attack, the round in which the activity changes is executed in an equivalent form to avoid the obstructive restriction of the subkeys of that round.The existence of the birthday paradox guarantees much fewer plaintexts necessary for activity attacks comparing with that for corresponding Square attacks. But no benefit may result from the new attacks performed independently because the activity attacks guess four instead of one key byte once. Only when both the balance property and the activity property are exploited at the same time can much better performance be obtained. The better performance in the simulation shows that the consuming time and chosen plaintexts necessary are both reduced to one tenth of those of the corresponding Square attacks. So the activity attacks could be viewed as an efficient supplement to the Square attacks.

  4. Psychological interventions following terrorist attacks.

    Science.gov (United States)

    Mansdorf, Irwin J

    2008-01-01

    Psychological reactions to terror attacks have been documented as ranging from no symptoms to transient behavioural symptoms to more serious posttraumatic stress. A review of representative studies is presented, with a critical analysis of the salient points of the various psychological intervention strategies for terrorist attacks. Common aspects of both most intervention approaches include multifaceted models that foster social support and include a preparatory phase, a phase of 'psychological first aid' and a follow-up phase of referral for more severe cases. The notion of intervention for all who may show some symptoms is not universally accepted. Where treatment or intervention is used, the debriefing aspect of CISM (Critical Incident Stress Management) remains highly disputed, with the focus on intrusively revisiting the trauma appearing to have questionable value at best. Some data questions whether formal treatment or intervention is necessary or even desirable. For many who choose not to seek out any help following a trauma, clinical data shows no negative results. Moreover, the preponderance of data shows that conventional 'debriefing' is not recommended. If the debriefing mechanism is refined so that intrusive emotional rehashing of the traumatic event is eliminated, the resultant interventions resemble resilience based approaches. Further defining when intervention is called for and refining the mechanisms of intervention in multi-stage intervention.

  5. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage to ...... of the modelled systems. Our analysis of processes identifies which actions may be performed by whom, at which locations, accessing which data. This allows to compute a superset of audit results---before an incident occurs.......By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... to the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools...

  6. Migraine attacks the Basal Ganglia

    Directory of Open Access Journals (Sweden)

    Bigal Marcelo

    2011-09-01

    Full Text Available Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month. The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF to a matched (gender, age, age of onset and type of medication group of patients whose migraine episodes progressed (HF. Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine.

  7. Subtropical Fruit Fly Invasions into Temperate Fruit Fly Territory in California's San Joaquin Valley

    Science.gov (United States)

    Subtropical fruit fly species including peach fruit fly, Bactrocera zonata (Saunders); melon fly, B. cucurbitae (Coquillett); oriental fruit fly, B. dorsalis (Hendel); and Mediterranean fruit fly, Ceratitis capitata Weidemann, have been detected in the past decade in the San Joaquin Valley of Califo...

  8. Flying in Two Dimensions

    CERN Document Server

    Prakash, Manu

    2011-01-01

    Diversity and specialization of behavior in insects is unmatched. Insects hop, walk, run, jump, row, swim, glide and fly to propel themselves in a variety of environments. We have uncovered an unusual mode of propulsion of aerodynamic flight in two dimensions in Waterlilly Beetles \\emph{(Galerucella)}. The adult beetles, often found in water lilly ponds, propel themselves strictly in a two-dimensional plane on the surface of water via flapping wing flight. Here we analyze the aerodynamics of this peculiar flight mode with respect to forces exerted on the organism during flight. The complexity of 2-D flight is captured by accounting for additional forces beyond gravitational, thrust, lift and drag, exerted on the insect body in 3D flight. Understanding this constrained propulsion mode requires accounting for viscous drag, surface tension, buoyancy force, and capillary-wave drag. Moreover, dramatic differences exist in the magnitude of the resultant forces in 2D vs. 3D flight. Here, in this fluid dynamics video...

  9. Fly ash. Quality recycling material

    Energy Technology Data Exchange (ETDEWEB)

    Blomster, D.; Leisio, C.

    1996-11-01

    Imatran Voima`s coal-fired power plants not only generate power and heat but also produce fly ash which is suitable raw material for recycling. This material for recycling is produced in the flue gas cleaning process. It is economical and, thanks to close quality control, is suitable for use as a raw material in the building materials industry, in asphalt production, and in earthworks. Structures made from fly ash are also safe from an environmental point of view. (orig.)

  10. Fly ash. Quality recycling material

    Energy Technology Data Exchange (ETDEWEB)

    Blomster, D.; Leisio, C.

    1996-11-01

    Imatran Voima`s coal-fired power plants not only generate power and heat but also produce fly ash which is suitable raw material for recycling. This material for recycling is produced in the flue gas cleaning process. It is economical and, thanks to close quality control, is suitable for use as a raw material in the building materials industry, in asphalt production, and in earthworks. Structures made from fly ash are also safe from an environmental point of view. (orig.)

  11. Detection of Denial-of-service Attacks

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Denial-of-service (DOS) is a type of computer attack, which can essentially disable computers and networks.Resource consumption type of DOS attack could not be detected by the traditional misuse detection technique. This paper presents a new method of support vector mchine (SVM) to detect these attacks. We find that a DOS attack to a host is related to the activities within an impact data set of the host. The SVM method is used to classify the subsets of an impact data set to estimate its anomalism. The experiment result shows that this method can detect resource consumption type of DOS attacks, such as SYNflood, Smurf and UDP-storm. A receiver operating characteristic curve is plotted to determine performance for any possible operating point of the DOS attacks detection.

  12. Percolation of localized attack on complex networks

    CERN Document Server

    Shao, Shuai; Stanley, H Eugene; Havlin, Shlomo

    2014-01-01

    The robustness of complex networks against node failure and malicious attack has been of interest for decades, while most of the research has focused on random attack or hub-targeted attack. In many real-world scenarios, however, attacks are neither random nor hub-targeted, but localized, where a group of neighboring nodes in a network are attacked and fail. In this paper we develop a percolation framework to analytically and numerically study the robustness of complex networks against such localized attack. In particular, we investigate this robustness in Erd\\H{o}s-R\\'{e}nyi networks, random-regular networks, and scale-free networks. Our results provide insight into how to better protect networks, enhance cybersecurity, and facilitate the design of more robust infrastructures.

  13. Fault Attack on the Balanced Shrinking Generator

    Institute of Scientific and Technical Information of China (English)

    GAO Juntao; LI Xuelian; HU Yupu

    2006-01-01

    Fault analysis, belonging to indirect attack, is a cryptanalysis technique for the physical implementation of cryptosystem. In this paper, we propose a fault attack on the Balanced Shrinking Generator. The results show that the attacker can obtain the secret key by analyzing faulty output sequences which is produced by changing control clock of one of Linear Feedback Shift Registers (LFSR). Therefore, the balanced shrinking generator has a trouble in hardware implementation.

  14. Impact of Alleged Russian Cyber Attacks

    Science.gov (United States)

    2009-05-01

    March 14, 2009). 96 Ivan Buranov, Vladimir Vodo, and Seda Yegikyan, Pro-Kremlin Activist Admits Attack on Estonian Websites, Denies Criminal...Vladimir Vodo, and Seda Yegikyan, Pro-Kremlin Activist Admits Attack on Estonian Websites, Denies Criminal Wrongdoing, Translated by Open Source...Buranov, Ivan; Vodo, Vladimir; and Yegikyan, Seda Pro-Kremlin Activist Admits Attack on Estonian Websites, Denies Criminal Wrongdoing, Translated

  15. Effect of Fly Ash on TSA Resistance of Cement-based Material

    Institute of Scientific and Technical Information of China (English)

    ZHANG Fengchen; MA Baoguo; WU Shengxing; ZHOU Jikai

    2011-01-01

    Thaumasite form of sulfate attack (TSA) is a major concern in evaluating durability of concrete structures subjected to sulfate and carbonate ions. By means of Fourier transform infrared spectroscopy (FT-IR), X-ray diffraction (XRD), scanning electron microscopy (SEM),and energy dispersive spectrum (EDS)as well as Raman spectra of erosion substances, effect of fly ash on TSA resistance of Portland cement-based material were investigated. Immersed in magnesium sulfate solution with 33 800 ppm mass concentration of SO42- at 5±2 ℃ for 15 weeks, ratio of compressive strength loss decreased as binder replacement ratio of fly ash increased. Furthermore, when binder replacement of fly ash was 60%, compressive strength increased. When thaumasite came into being in samples with 0, 15% binder replacement ratio of fly ash, ettringite and gypsum appeared in those with 30%, 45%, 60% binder replacement ratio of fly ash. Results mentioned above showed that fly ash can restrain formation of thaumasite and improve TSA resistance of Portland cement-based material sufficiently.

  16. Control of Cherry Leaf Spot and Cherry Fruit Fly at Sour Cherry

    Directory of Open Access Journals (Sweden)

    Maria BOROVINOVA

    2015-06-01

    Full Text Available The investigations were made in the experimental sour cherry orchard from the Institute of Agriculture, Kyustendil, Bulgaria, during the period 2010-2014, in order to compare conventional and integrated sour cherry protection against cherry leaf spot and cherry fruit fly. Two variants were investigated, with two different treatment approaches for the control of cherry leaf spot and cherry fruit fly. Variant 1 – cherry leaf spot was controlled by protective treatments with dodin and tebuconazole + trifloxystrobin and cherry fruit fly was controlled by treatments with deltametrin and thiacloprid, independently of density. Variant 2 - cherry leaf spot was controlled by post-infection (curative treatments with tebuconazole + trifloxystrobin and cherry fruit fly was controlled by treatments based on biological threshold: 10-11 cherry fruit fly females caught in traps up to the moment for chemical treatment. It was established that Blumeriella japii can be successfully controlled by post-infection treatments and by this the number of insecticide treatments was reduced. The treatments against cherry fruit fly can be avoided or reduced when the attack control is based on the biological threshold established in the studied area.

  17. Evaluation of Hypervisor Stability towards Insider Attacks

    Institute of Scientific and Technical Information of China (English)

    Roman Kulikov; Svetlana Kolesnikova

    2016-01-01

    Virtualization technology plays a key role in cloud computing. Thus, the security issues of virtualization tools (hypervisors, emulators, etc.) should be under precise consideration. However, threats of insider attacks are underestimated. The virtualization tools and hypervisors have been poorly protected from this type of attacks. Furthermore, hypervisor is one of the most critical elements in cloud computing infrastructure. Firstly, hypervisor vulnerabilities analysis is provided. Secondly, a formal model of insider attack on hypervisor is developed. Consequently, on the basis of the formal attack model, we propose a new methodology of hypervisor stability evaluation. In this paper, certain security countermeasures are considered that should be integrated in hypervisor software architecture.

  18. Colluding attacks on a group signature scheme

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    Xie and Yu (2005) proposed a group signature scheme and claimed that it is the most efficient group signature scheme so far and secure. In this paper, we show that two dishonest group members can collude to launch two attacks on the scheme. In the first attack they can derive the group secret key and then generate untraceable group signatures. In the second attack, they can impersonate other group members once they see their signatures. Therefore we conclude that the signature scheme is not secure.We show that some parameters should be carefully selected in the scheme to resist our attacks.

  19. Off-Path Attacking the Web

    CERN Document Server

    Gilad, Yossi

    2012-01-01

    We show how an off-path (spoofing-only) attacker can perform cross-site scripting (XSS), cross-site request forgery (CSRF) and site spoofing/defacement attacks, without requiring vulnerabilities in either web-browser or server and circumventing known defenses. Attacker can also launch devastating denial of service (DoS) attacks, even when the connection between the client and the server is secured with SSL/TLS. The attacks are practical and require a puppet (malicious script in browser sandbox) running on a the victim client machine, and attacker capable of IP-spoofing on the Internet. Our attacks use a technique allowing an off-path attacker to learn the sequence numbers of both client and server in a TCP connection. The technique exploits the fact that many computers, in particular those running Windows, use a global IP-ID counter, which provides a side channel allowing efficient exposure of the connection sequence numbers. We present results of experiments evaluating the learning technique and the attacks ...

  20. Localized attack on clustering networks

    CERN Document Server

    Dong, Gaogao; Du, Ruijin; Shao, Shuai; Stanley, H Eugene; Shlomo, Havlin

    2016-01-01

    Clustering network is one of which complex network attracting plenty of scholars to discuss and study the structures and cascading process. We primarily analyzed the effect of clustering coefficient to other various of the single clustering network under localized attack. These network models including double clustering network and star-like NON with clustering and random regular (RR) NON of ER networks with clustering are made up of at least two networks among which exist interdependent relation among whose degree of dependence is measured by coupling strength. We show both analytically and numerically, how the coupling strength and clustering coefficient effect the percolation threshold, size of giant component, critical coupling point where the behavior of phase transition changes from second order to first order with the increase of coupling strength between the networks. Last, we study the two types of clustering network: one type is same with double clustering network in which each subnetwork satisfies ...

  1. Attacks on Local Searching Tools

    CERN Document Server

    Nielson, Seth James; Wallach, Dan S

    2011-01-01

    The Google Desktop Search is an indexing tool, currently in beta testing, designed to allow users fast, intuitive, searching for local files. The principle interface is provided through a local web server which supports an interface similar to Google.com's normal web page. Indexing of local files occurs when the system is idle, and understands a number of common file types. A optional feature is that Google Desktop can integrate a short summary of a local search results with Google.com web searches. This summary includes 30-40 character snippets of local files. We have uncovered a vulnerability that would release private local data to an unauthorized remote entity. Using two different attacks, we expose the small snippets of private local data to a remote third party.

  2. Aerodynamic performances of cruise missile flying above local terrain

    Science.gov (United States)

    Ahmad, A.; Saad, M. R.; Che Idris, A.; Rahman, M. R. A.; Sujipto, S.

    2016-10-01

    Cruise missile can be classified as a smart bomb and also Unmanned Aerial Vehicle (UAV) due to its ability to move and manoeuvre by itself without a pilot. Cruise missile flies in constant velocity in cruising stage. Malaysia is one of the consumers of cruise missiles that are imported from other nations, which can have distinct geographic factors including their local terrains compared to Malaysia. Some of the aerodynamic performances of missile such as drag and lift coefficients can be affected by the local geographic conditions in Malaysia, which is different from the origin nation. Therefore, a detailed study must be done to get aerodynamic performance of cruise missiles that operate in Malaysia. The effect of aerodynamic angles such as angle of attack and side slip can be used to investigate the aerodynamic performances of cruise missile. Hence, subsonic wind tunnel testings were conducted to obtain the aerodynamic performances of the missile at various angle of attack and sideslip angles. Smoke visualization was also performed to visualize the behaviour of flow separation. The optimum angle of attack found was at α=21° and side slip, β=10° for optimum pitching and yawing motion of cruise missile.

  3. Effect of Metarhizium anisopliae on the fertility and fecundity of two species of fruit flies and horizontal transmission of mycotic infection.

    Science.gov (United States)

    Sookar, P; Bhagwant, S; Allymamod, M N

    2014-01-01

    In Mauritius, the peach fruit fly, Bactrocera zonata Saunders (Diptera: Tephritidae), and the melon fly, Bactrocera cucurbitae (Coquillett), are the major pest of fruits and vegetables, respectively. Fruit growers make use of broad-spectrum insecticides to protect their crops from fruit fly attack. This method of fruit fly control is hazardous to the environment and is a threat to beneficial insects. The entomopathogenic fungus, Metarhizium anisopliae (Metchnikoff) Sorokin (Hypocreales: Clavicipitaceae), which was isolated from the soils of Mauritius, was used to investigate whether fungus-treated adult fruit flies could transfer conidia to non-treated flies during mating, and whether fungal infection could have an effect on mating behavior, fecundity, and fertility of the two female fruit fly species. When treated male flies were maintained together with non-treated female flies, they were able to transmit infection to untreated females, resulting in high mortalities. Similarly, fungus-infected female flies mixed with untreated males also transmitted infections to males, also resulting in high mortalities. Infection by M. anisopliae also resulted in the reduction of the number of eggs produced by females of B. cucurbitae. The results suggest that M. anisopliae may have potential for use in integrated control programs of B. zonata and B. cucurbitae using the sterile insect technique in Mauritius.

  4. Spatially localized attacks on interdependent networks: the existence of a finite critical attack size

    CERN Document Server

    Berezin, Yehiel; Danziger, Michael M; Li, Daqing; Havlin, Shlomo

    2013-01-01

    Many real world complex systems such as infrastructure, communication and transportation networks are embedded in space, where entities of one system may depend on entities of other systems. These systems are subject to geographically localized failures due to malicious attacks or natural disasters. Here we study the resilience of a system composed of two interdependent spatially embedded networks to localized geographical attacks. We find that if an attack is larger than a finite (zero fraction of the system) critical size, it will spread through the entire system and lead to its complete collapse. If the attack is below the critical size, it will remain localized. In contrast, under random attack a finite fraction of the system needs to be removed to initiate system collapse. We present both numerical simulations and a theoretical approach to analyze and predict the effect of local attacks and the critical attack size. Our results demonstrate the high risk of local attacks on interdependent spatially embedd...

  5. Fiber optics that fly

    Science.gov (United States)

    Wilcox, Michael J.; Thelen, Donald C., Jr.

    1996-11-01

    The need for autonomous systems to work under unanticipated conditions requires the use of smart sensors. High resolution systems develop tremendous computational loads. Inspiration from animal vision systems can guide us in developing preprocessing approaches implementable in real time with high resolution and deduced computational load. Given a high quality optical path and a 2D array of photodetectors, the resolution of a digital image is determined by the density of photodetectors sampling the image. In order to reconstruct an image, resolution is limited by the distance between adjacent detectors. However, animal eyes resolve images 10-100 times better than either the acceptance angle of a single photodetector or the center-to-center distance between neighboring photodetectors. A new model of the fly's visual system emulates this improved performance, offering a different approach to subpixel resolution. That an animal without a cortex is capable of this performance suggests that high level computation is not involved. The model takes advantage of a photoreceptor cell's internal structure for capturing light. This organelle is a waveguide. Neurocircuitry exploits the waveguide's optical nonlinearities, namely in the shoulder region of its gaussian sensitivity-profile, to extract high resolution information from the visual scene. The receptive fields of optically disparate inputs overlap in space. Photoreceptor input is continuous rather than discretely sampled. The output of the integrating module is a signal proportional to the position of the target within the detector array. For tracking a point source, resolution is 10 times better than the detector spacing. For locating absolute position and orientation of an edge, the model performs similarly. Analog processing is used throughout. Each element is an independent processor of local luminance. Information processing is in real time with continuous update. This processing principle will be reproduced in an

  6. Fly-in/Fly-out: Implications for Community Sustainability

    Directory of Open Access Journals (Sweden)

    Keith Storey

    2010-04-01

    Full Text Available “Fly-in/fly-out” is a form of work organization that has become the standard model for new mining, petroleum and other types of resource development in remote areas. In many places this “no town” model has replaced that of the “new town.” The work system has both beneficial and adverse implications for the sustainability of both existing communities near new resource developments and for the more distant communities from which workers are drawn. This paper explores these outcomes drawing upon examples from North America and Australia.

  7. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Directory of Open Access Journals (Sweden)

    Andy Martens

    Full Text Available Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  8. Escherichia coli fliAZY operon.

    OpenAIRE

    Mytelka, D S; Chamberlin, M J

    1996-01-01

    We have cloned the Escherichia coli fliAZY operon, which contains the fliA gene (the alternative sigma factor sigma F) and two novel genes, fliZ and fliY. Transcriptional mapping of this operon shows two start sites, one of which is preceded by a canonical E sigma F-dependent consensus and is dependent on sigma F for expression in vivo and in vitro. We have overexpressed and purified sigma F and demonstrated that it can direct core polymerase to E sigma F-dependent promoters. FliZ and FliY ar...

  9. British used Congreve Rockets to Attack Napoleon

    Science.gov (United States)

    2004-01-01

    Sir William Congreve developed a rocket with a range of about 9,000 feet. The incendiary rocket used black powder, an iron case, and a 16-foot guide stick. In 1806, British used Congreve rockets to attack Napoleon's headquarters in France. In 1807, Congreve directed a rocket attack against Copenhagen.

  10. Fast Collision Attack on MD5

    NARCIS (Netherlands)

    M.M.J. Stevens (Marc)

    2006-01-01

    textabstractIn this paper, we present an improved attack algorithm to find two-block collisions of the hash function MD5. The attack uses the same differential path of MD5 and the set of sufficient conditions that was presented by Wang et al. We present a new technique which allows us to

  11. Quantifying Shannon's work function for cryptanalytic attacks

    NARCIS (Netherlands)

    van Son, R.J.J.H.

    2010-01-01

    Attacks on cryptographic systems are limited by the available computational resources. A theoretical understanding of these resource limitations is needed to evaluate the security of cryptographic primitives and procedures. This study uses an Attacker versus Environment game formalism based on compu

  12. Revisiting attacker model for smart vehicles

    NARCIS (Netherlands)

    Petit, Jonathan; Feiri, Michael; Kargl, Frank

    Because of the potential impact on user's life in cooperative automated safety applications, the security of Vehicle-to-X communication (V2X) is mandatory. However, the current attacker model used in literature is often too network-oriented, and it is unclear what realistic attacks could be. In this

  13. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks with c...... with cascaded Erbium-doped fiber amplifiers and a comb laser....

  14. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian

    2014-01-01

    ciphers, including the new standard SHA-3 (Keccak). The rebound attack is a start-from-the-middle approach for finding differential paths and conforming pairs in byte-oriented designs like Substitution-Permutation networks and AES. We apply our new compositional attack to the reduced version of the hash...

  15. Fast Collision Attack on MD5

    NARCIS (Netherlands)

    Stevens, M.M.J.

    2006-01-01

    In this paper, we present an improved attack algorithm to find two-block collisions of the hash function MD5. The attack uses the same differential path of MD5 and the set of sufficient conditions that was presented by Wang et al. We present a new technique which allows us to deterministically fulfi

  16. Minimization and Reliability Analyses of Attack Graphs

    Science.gov (United States)

    2002-02-01

    they model only attacks. Since we have a generic state machine model , we can simultaneously model not just attacks, but also seemingly benign system...Finite State Machine Model The Network We model the network as a set of facts, each represented as a relational predicate. The state of the network

  17. Attack tree generation by policy invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified th

  18. New Multi-step Worm Attack Model

    CERN Document Server

    Robiah, Y; Shahrin, S; Faizal, M A; Zaki, M Mohd; Marliza, R

    2010-01-01

    The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack pattern can be abstracted to form worms' attack model which describes the process of worms' infection. For the purpose of this paper, only Blaster variants were used during the experiment. This paper proposes a multi-step worm attack model which can be extended into research areas in alert correlation and computer forensic investigation.

  19. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  20. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  1. CompChall: Addressing Password Guessing Attacks

    CERN Document Server

    Goyal, Vipul; Singh, Mayank; Abraham, Ajith; Sanyal, Sugata

    2011-01-01

    Even though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online and offline. While offline dictionary attacks are possible only if the adversary is able to collect data for a successful protocol execution by eavesdropping on the communication channel and can be successfully countered using public key cryptography, online dictionary attacks can be performed by anyone and there is no satisfactory solution to counter them. This paper presents a new authentication protocol which is called CompChall (computational challenge). The proposed protocol uses only one way hash functions as the building blocks and attempts to eliminate online dictionary attacks by implementing a challenge-response system. This challenge-response system is designed in a fashion that it does not pose any difficulty to a genuine user but is time consuming and computationally intensive for an adversary trying to launch a large n...

  2. Performance Evaluation of Wormhole Attack In AODV

    Directory of Open Access Journals (Sweden)

    Samuel Jacob

    2015-02-01

    Full Text Available The Mobile Ad hoc Networks (MANETs is a collection of wireless nodes which interact with each other by sending packets to one another or on behalf of another node, without any central network infrastructure to control data routing. For communication, the nodes cooperatively forward data packets to other nodes in network by using the routing protocol. But, these routing protocols are not secure, thus paving the way for the MANET to be open to malicious attacks. A malicious attack which is commonly observed in MANET environment is wormhole attack. The objective of this work is to analyze the performance parameters of throughput, delay and packet loss in AODV with the existence of wormhole attack. Simulation results have shown that the performance parameters are affected very much when there is an attack due to wormholes.

  3. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  4. SURVEY OF PACKET DROPPING ATTACK IN MANET

    Directory of Open Access Journals (Sweden)

    A.Janani

    2014-03-01

    Full Text Available Mobile Ad-hoc NETwork (MANET is an application of wireless network with self-configuring mobile nodes. MANET does not require any fixed infrastructure. Its development never has any threshold range. Nodes in MANET can communicate with each other if and only if all the nodes are in the same range. This wide distribution of nodes makes MANET vulnerable to various attacks, packet dropping attack or black hole attack is one of the possible attack. It is very hard to detect and prevent. To prevent from packet dropping attack, detection of misbehavior links and selfish nodes plays a vital role in MANETs. In this paper, a omprehensive investigation on detection of misbehavior links and malicious nodes is carried out.

  5. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    . In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...... but not the computation. Such weaker model can still be practically useful and moreover, may provide nice building-blocks to tackle full-fledged tampering in future. In this dissertation we study different models of memory-tampering and provide a number of solutions with different flavors. Mainly we took two different...

  6. Fundamentals and Methods of High Angle-of-Attack Flying Qualities Research

    Science.gov (United States)

    1988-01-01

    Solving Equation (6) for the spin Radius, R, and substituting into equation (13), ay can be redefined in terms of fib 𔃼V as given by equation (17). (T...14) through (16) respectively) are functions of flb/2V, o, and a. Thus there are three equations to solve for three unknowns ( fib /2V, 1, a) in order...January 17,1983, pp. 57-62. 86. Markman, Steven R., "Capabilities of Airborne and Ground Based Flight Simulation," AIAA Paper 85-1944. 87. Knotts

  7. Attack of the Flying Snakes : Formation of Isolated HI Clouds By Fragmentation of Long Streams

    CERN Document Server

    Taylor, R; Jachym, P; Keenan, O; Minchin, R F; Palous, J; Smith, R; Wunsch, R

    2016-01-01

    The existence of long (> 100 kpc) HI streams and small ( 100 km/s), similar to observed clouds which are otherwise intriguing dark galaxy candidates. We find that producing such features is possible but extremely unlikely, occurring no more than 0.2% of the time in our simulations. In contrast, we find that genuine dark galaxies could be extremely stable to harassment and remain detectable even after 5 Gyr in the cluster environment (with the important caveat that our simulations only explore harassment and do not yet include the intracluster medium, heating and cooling, or star formation). We also discuss the possibility that such objects could be the progenitors of recently discovered ultra diffuse galaxies.

  8. Attack of the flying snakes: formation of isolated H I clouds by fragmentation of long streams

    Science.gov (United States)

    Taylor, R.; Davies, J. I.; Jáchym, P.; Keenan, O.; Minchin, R. F.; Palouš, J.; Smith, R.; Wünsch, R.

    2016-09-01

    The existence of long (>100 kpc) H I streams and small (100 km s-1), similar to observed clouds which are otherwise intriguing dark galaxy candidates. We find that producing such features is possible but extremely unlikely, occurring no more than 0.2% of the time in our simulations. In contrast, we find that genuine dark galaxies could be extremely stable to harassment and remain detectable even after 5 Gyr in the cluster environment (with the important caveat that our simulations only explore harassment and do not yet include the intracluster medium, heating and cooling, or star formation). We also discuss the possibility that such objects could be the progenitors of recently discovered ultra diffuse galaxies.

  9. Dermatobia, the neotropical warble fly.

    Science.gov (United States)

    Sancho, E

    1988-09-01

    The neotropical warble fly, Dermatobia hominis (Fig. 1), has plagued neotropical America since preColombian times, and has become an economically important pest causing substantial losses to the meat, milk and leather industries from northern Mexico down to northern Argentina. Its life cycle (Box 1) is astonishingly complex, requiring another insect as a phoretic carrier of its eggs to the skin of its mammal hosts. Here Eugenio Sancho discusses factors that contribute to the current economic and public health importance of this myiasis-causing fly.

  10. Detection Block Model for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Diksha G. Kumar

    2014-10-01

    Full Text Available With the rapid development of Internet, more and more organizations connect their databases to the Internet for resource sharing. However, due to developers' lack of knowledge of all possible attacks, web applications become vulnerable to multiple attacks. Thus the network databases could face multiple threats. Web applications generally consist of a three tier architecture where database is in the third pole, which is the most valuable asset in any organization. SQL injection is an attack technique in which specially crafted input string is entered in user input field. It is submitted to server and result is returned to the user. In SQL injection vulnerability, the database server is forced to execute malicious operations which may cause the data loss or corruption, denial of access, and unauthentic access to sensitive data by crafting specific inputs. An attacker can directly compromise the database, and that is why this is a most threatening web attack. SQL injection attack occupies first position in top ten vulnerabilities as specified by Open Web Application Security Project. It is probably the most common Website vulnerability today. Current scenarios which provide solutions to SQL injection attack either have limited scope i.e. can’t be implemented across all platforms, or do not cover all types of SQL injection attacks. In this work we implement Message Authentication Code (MAC based solution against SQL injection attacks. The model works both on client and server side. Client side implements a filter function and server side is based on information theory. MAC of static and dynamic queries is compared to detect SQL injection attack.

  11. Susceptibility of low-chill blueberry cultivars to Mediterranean fruit fly, oriental fruit fly, and melon fly (Diptera: Tephritidae).

    Science.gov (United States)

    Follett, Peter A; Zee, Francis T; Hamasaki, Randall T; Hummer, Kim; Nakamoto, Stuart T

    2011-04-01

    No-choice tests were conducted to determine whether fruit of southern highbush blueberry, Vaccinium corymbosum L., hybrids are hosts for three invasive tephritid fruit flies in Hawaii. Fruit of various blueberry cultivars was exposed to gravid female flies of Bactrocera dorsalis Hendel (oriental fruit fly), Ceratitis capitata (Wiedemann) (Mediterranean fruit fly), or Bactrocera cucurbitae Coquillet (melon fly) in screen cages outdoors for 6 h and then held on sand in the laboratory for 2 wk for pupal development and adult emergence. Each of the 15 blueberry cultivars tested were infested by oriental fruit fly and Mediterranean fruit fly, confirming that these fruit flies will oviposit on blueberry fruit and that blueberry is a suitable host for fly development. However, there was significant cultivar variation in susceptibility to fruit fly infestation. For oriental fruit fly, 'Sapphire' fruit produced an average of 1.42 puparia per g, twice as high as that of the next most susceptible cultivar 'Emerald' (0.70 puparia per g). 'Legacy', 'Biloxi', and 'Spring High' were least susceptible to infestation, producing only 0.20-0.25 oriental fruit fly puparia per g of fruit. For Mediterranean fruit fly, 'Blue Crisp' produced 0.50 puparia per g of fruit, whereas 'Sharpblue' produced only 0.03 puparia per g of fruit. Blueberry was a marginal host for melon fly. This information will aid in development of pest management recommendations for blueberry cultivars as planting of low-chill cultivars expands to areas with subtropical and tropical fruit flies. Planting of fruit fly resistant cultivars may result in lower infestation levels and less crop loss.

  12. Terrorist Attacks Escalate in Frequency and Fatalities Preceding Highly Lethal Attacks

    Science.gov (United States)

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G.; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates–both in the number of people killed per attack and in the frequency of attacks–leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack. PMID:24755753

  13. An Intrusion Detection System Against UDP Flood Attack and Ping of Death Attack (DDOS in MANET

    Directory of Open Access Journals (Sweden)

    Ankur Ashok Acharya

    2016-04-01

    Full Text Available DDoS is one of the serious attacks in the ad hoc network. Among lot many DDoS attacks, UDP flood attack and Ping of death attack are considered to be important as these two attacks may cause severe damage to the network. To provide better security to the network, efficient intrusion detection (IDS system is required to monitor the network continuously, keeping track of malicious activities and policy violations and produce report to the network administrator. UDP flood attack and ping of death attack are given importance in this paper as they are not well addressed in the existing research works. Packet capture and packet decoder is used to identify the packets and retrieve the packet details. A threshold is set for each node that is connected to the network. If the packet flow into the node exceeds the threshold that is set then the administrator is notified about the same.

  14. Fruit Flies Help Human Sleep Research

    Science.gov (United States)

    Skip Navigation Bar Home Current Issue Past Issues Fruit Flies Help Human Sleep Research Past Issues / Summer 2007 ... courtesy of NIGMS Neuroscientist Chiara Cirelli uses experimental fruit flies to study sleep. Although it may be tough ...

  15. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  16. Utilizing Probabilistic Linear Equations in Cube Attacks

    Institute of Scientific and Technical Information of China (English)

    Yuan Yao; Bin Zhang; Wen-Ling Wu

    2016-01-01

    Cube attacks, proposed by Dinur and Shamir at EUROCRYPT 2009, have shown huge power against stream ciphers. In the original cube attacks, a linear system of secret key bits is exploited for key recovery attacks. However, we find a number of equations claimed linear in previous literature actually nonlinear and not fit into the theoretical framework of cube attacks. Moreover, cube attacks are hard to apply if linear equations are rare. Therefore, it is of significance to make use of probabilistic linear equations, namely nonlinear superpolys that can be approximated by linear expressions effectively. In this paper, we suggest a way to test out and utilize these probabilistic linear equations, thus extending cube attacks to a wider scope. Concretely, we employ the standard parameter estimation approach and the sequential probability ratio test (SPRT) for linearity test in the preprocessing phase, and use maximum likelihood decoding (MLD) for solving the probabilistic linear equations in the online phase. As an application, we exhibit our new attack against 672 rounds of Trivium and reduce the number of key bits to search by 7.

  17. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approac...... inside-out computations and neutral bits in the inbound phase of the rebound attack, and give well-defined rotational distinguishers as certificates of weaknesses for the compression functions and block ciphers.......In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...... and the Threefish cipher. The new techniques include an analytical search for optimal input values in the rotational cryptanalysis, which allows to extend the outbound phase of the attack with a precomputation phase, an approach never used in any rebound-style attack before. Further we show how to combine multiple...

  18. Forensics Investigation of Web Application Security Attacks

    Directory of Open Access Journals (Sweden)

    Amor Lazzez

    2015-02-01

    Full Text Available Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the security attacks targeting a web application every day, and hence improve its security. The aim of this paper is to carry out a detailed overview about the web application forensics. First, we define the web applications forensics, and we present a taxonomic structure of the digital forensics. Then, we present the methodology of a web application forensics investigation. After that, we illustrate the forensics supportive tools for a web application forensics investigation. After that, we present a detailed presentation of a set of the main considered web application forensics tools. Finally, we provide a comparison of the main considered web application forensics tools.

  19. The Spider and the Fly

    Science.gov (United States)

    Mellinger, Keith E.; Viglione, Raymond

    2012-01-01

    The Spider and the Fly puzzle, originally attributed to the great puzzler Henry Ernest Dudeney, and now over 100 years old, asks for the shortest path between two points on a particular square prism. We explore a generalization, find that the original solution only holds in certain cases, and suggest how this discovery might be used in the…

  20. Electrodialytic treatment of fly ash

    DEFF Research Database (Denmark)

    Jensen, Pernille Erland; Pedersen, Anne Juul; Kirkelund, Gunvor Marie

    Heavy metals are removed from the fly ashes by an electrodialytic treatment with the aim of up-grading the ashes for reuse in stead of disposal in landfill.A great potential for upgrading of bio- and waste incineration ashes by electrodialytic treatment exists. In the future, the applicability...

  1. Resistance to chemical attack of bittern-resisting cement in high-bittern environment

    Institute of Scientific and Technical Information of China (English)

    Yunbing Hou; Bingwen Wang; Yu Chen; Botao Zhang; Lin Yu

    2005-01-01

    A new kind of bittern-resisting cement (BRC) was introduced. This material is based on the ternary cementitious system of clinker containing C4A3 -S phase, high-activity ground granulated blast-furnace slag (GGBFS) and fly ash (FA). The hydration process and the hydrated products of BRC were studied by means of XRD, TG-DTA and SEM, and the resistance to chemical attack of BRC in high-bittern environment was also examined. The corrosion experiment in seven kinds of brines proved that BRC exhibits an excellent resistance to chemical attack of bittern. The corrosion resistance factors were calculated and all of them were greater than 0.96. It showed that BRC totally controls the cement-based material corrosion in brines from four aspects: (1) making full use of the dominant complementation effect of mineral materials; (2) diminishing the hydrated products easy to be attacked; (3) improving the microstructure of hardened cement mortar; (4) degrading the chemical attack of bittern.

  2. DURABILITY OF HARDENED FLY ASH PASTE

    Institute of Scientific and Technical Information of China (English)

    1999-01-01

    The mechanical properties and durability ( mainly frost-resistance and carbonation resistance ) of fly ash-CaO-CaSO4 .2H2O hardened paste are studied. The relationship among durability of harden ed fly ash paste, the quantity and distribution of hydrates and the initial p aste texture of hardened fly ash paste is presented.

  3. Louse flies on birds of Baja California.

    Science.gov (United States)

    Tella, J L; Rodríguez-Estrella, R; Blanco, G

    2000-01-01

    Louse flies were collected from 401 birds of 32 species captured in autumn of 1996 in Baja California Sur (Mexico). Only one louse fly species (Microlynchia pusilla) was found. It occurred in four of the 164 common ground doves (Columbina passerina) collected. This is a new a host species for this louse fly.

  4. Flies and Campylobacter infection of broiler flocks

    DEFF Research Database (Denmark)

    Hald, Birthe; Skovgård, Henrik; Bang, Dang Duong

    2004-01-01

    A total of 8.2% of flies caught outside a broiler house in Denmark had the potential to transmit Campylobacter jejuni to chickens, and hundreds of flies per day passed through the ventilation system into the broiler house. Our study suggests that flies may be an important source of Campylobacter...

  5. FliO Regulation of FliP in the Formation of the Salmonella enterica Flagellum

    OpenAIRE

    Barker, Clive S.; Meshcheryakova, Irina V.; Kostyukova, Alla S.; Samatey, Fadel A.

    2010-01-01

    The type III secretion system of the Salmonella flagellum consists of 6 integral membrane proteins: FlhA, FlhB, FliO, FliP, FliQ, and FliR. However, in some other type III secretion systems, a homologue of FliO is apparently absent, suggesting it has a specialized role. Deleting the fliO gene from the chromosome of a motile strain of Salmonella resulted in a drastic decrease of motility. Incubation of the ΔfliO mutant strain in motility agar, gave rise to pseudorevertants containing extrageni...

  6. Optimizing Decision Tree Attack on CAS Scheme

    Directory of Open Access Journals (Sweden)

    PERKOVIC, T.

    2016-05-01

    Full Text Available In this paper we show a successful side-channel timing attack on a well-known high-complexity cognitive authentication (CAS scheme. We exploit the weakness of CAS scheme that comes from the asymmetry of the virtual interface and graphical layout which results in nonuniform human behavior during the login procedure, leading to detectable variations in user's response times. We optimized a well-known probabilistic decision tree attack on CAS scheme by introducing this timing information into the attack. We show that the developed classifier could be used to significantly reduce the number of login sessions required to break the CAS scheme.

  7. Multiple Partial Attacks on Complex Networks

    Institute of Scientific and Technical Information of China (English)

    YIN Yan-Ping; ZHANG Duan-Ming; TAN Jin; PAN Gui-Jun; HE Min-Hua

    2008-01-01

    We numerically investigate the effect of four kinds of partial attacks of multiple targets on the Barabási-Albert (BA) scale-free network and the Erd(o)s-Rényi (ER) random network.Comparing with the effect of single target complete knockout we find that partial attacks of multiple targets may produce an effect higher than the complete knockout of a single target on both BA scale-free network and ER random network.We also find that the BA ecale-free network seems to be more susceptible to multi-target partial attacks than the ER random network.

  8. Review Paper on Flooding Attack in MANET

    Directory of Open Access Journals (Sweden)

    Ruchita Meher,

    2014-01-01

    Full Text Available Mobile ad-hoc network (MANET is widely applicable in various areas like military services, civilian environments and emergency operations. The issues in MANET are broadcasting, clustering, mobility management, bandwidth management and power management. Broadcasting becomes an important issue in MANET for route information discovery. The different routing attacks in MANET are flooding, black hole, link spoofing and wormhole attack. In this paper we are representing works proposed by various author on flooding attack. Our contribution in this paper is that we have presented details comparison of various counter based schemes.

  9. Measuring a System’s Attack Surface

    Science.gov (United States)

    2004-01-01

    fold: • In terms of a state machine model of the system, we present formal definitions of attack, attack surface, and attack class. Our definitions are...versions. The rest of this paper is organized as follows. In Section 2, we introduce our state machine model and point out the key differences from...approach in Section 6 and compare it to related work in Section 7. We conclude in Section 8. 2 State Machine Model We use a state machine to model the

  10. FAST CORRELATION ATTACKS ON BLUETOOTH COMBINER

    Institute of Scientific and Technical Information of China (English)

    Ma Weiju; Feng Dengguo

    2006-01-01

    A simple fast correlation attack is used to analysis the security of Bluetooth combiner in this paper.This attack solves the tradeoff between the length of the keystream and the computing complexity needed to recover the secret key. We give the computing complexities of the attack algorithm according to different lengths of the known keystream. The result is less time-consuming than before. It is also shown that the security of the modified Bluetooth combiner by Hermelin and Nyberg is not significantly enhanced.

  11. What Are the Symptoms of a Heart Attack?

    Science.gov (United States)

    ... from the NHLBI on Twitter. What Are the Symptoms of a Heart Attack? Not all heart attacks ... symptoms are called silent heart attacks. Most Common Symptoms The most common warning symptoms of a heart ...

  12. Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals

    Directory of Open Access Journals (Sweden)

    Xiapu Luo

    2009-01-01

    Full Text Available This paper addresses the important problem of detecting pulsing denial of service (PDoS attacks which send a sequence of attack pulses to reduce TCP throughput. Unlike previous works which focused on a restricted form of attacks, we consider a very broad class of attacks. In particular, our attack model admits any attack interval between two adjacent pulses, whether deterministic or not. It also includes the traditional flooding-based attacks as a limiting case (i.e., zero attack interval. Our main contribution is Vanguard, a new anomaly-based detection scheme for this class of PDoS attacks. The Vanguard detection is based on three traffic anomalies induced by the attacks, and it detects them using a CUSUM algorithm. We have prototyped Vanguard and evaluated it on a testbed. The experiment results show that Vanguard is more effective than the previous methods that are based on other traffic anomalies (after a transformation using wavelet transform, Fourier transform, and autocorrelation and detection algorithms (e.g., dynamic time warping.

  13. Zebras and Biting Flies: Quantitative Analysis of Reflected Light from Zebra Coats in Their Natural Habitat

    Science.gov (United States)

    Britten, Kenneth H.; Thatcher, Timothy D.; Caro, Tim

    2016-01-01

    Experimental and comparative evidence suggests that the striped coats of zebras deter biting fly attack, but the mechanisms by which flies fail to target black-and-white mammals are still opaque. Two hypotheses have been proposed: stripes might serve either to defeat polarotaxis or to obscure the form of the animal. To test these hypotheses, we systematically photographed free-living plains zebras in Africa. We found that black and white stripes both have moderate polarization signatures with a similar angle, though the degree (magnitude) of polarization in white stripes is lower. When we modeled the visibility of these signals from different distances, we found that polarization differences between stripes are invisible to flies more than 10 m away because they are averaged out by the flies’ low visual resolution. At any distance, however, a positively polarotactic insect would have a distinct signal to guide its visual approach to a zebra because we found that polarization of light reflecting from zebras is higher than from surrounding dry grasses. We also found that the stripes themselves are visible to flies at somewhat greater distances (up to 20 m) than the polarization contrast between stripes. Together, these observations support hypotheses in which zebra stripes defeat visually guided orienting behavior in flies by a mechanism independent of polarotaxis. PMID:27223616

  14. FliO Regulation of FliP in the Formation of the Salmonella enterica Flagellum

    Science.gov (United States)

    Barker, Clive S.; Meshcheryakova, Irina V.; Kostyukova, Alla S.; Samatey, Fadel A.

    2010-01-01

    The type III secretion system of the Salmonella flagellum consists of 6 integral membrane proteins: FlhA, FlhB, FliO, FliP, FliQ, and FliR. However, in some other type III secretion systems, a homologue of FliO is apparently absent, suggesting it has a specialized role. Deleting the fliO gene from the chromosome of a motile strain of Salmonella resulted in a drastic decrease of motility. Incubation of the ΔfliO mutant strain in motility agar, gave rise to pseudorevertants containing extragenic bypass mutations in FliP at positions R143H or F190L. Using membrane topology prediction programs, and alkaline phosphatase or GFPuv chimeric protein fusions into the FliO protein, we demonstrated that FliO is bitopic with its N-terminus in the periplasm and C-terminus in the cytoplasm. Truncation analysis of FliO demonstrated that overexpression of FliO43–125 or FliO1–95 was able to rescue motility of the ΔfliO mutant. Further, residue leucine 91 in the cytoplasmic domain was identified to be important for function. Based on secondary structure prediction, the cytoplasmic domain, FliO43–125, should contain beta-structure and alpha-helices. FliO43–125-Ala was purified and studied using circular dichroism spectroscopy; however, this domain was disordered, and its structure was a mixture of beta-sheet and random coil. Coexpression of full-length FliO with FliP increased expression levels of FliP, but coexpression with the cytoplasmic domain of FliO did not enhance FliP expression levels. Overexpression of the cytoplasmic domain of FliO further rescued motility of strains deleted for the fliO gene expressing bypass mutations in FliP. These results suggest FliO maintains FliP stability through transmembrane domain interaction. The results also demonstrate that the cytoplasmic domain of FliO has functionality, and it presumably becomes structured while interacting with its binding partners. PMID:20941389

  15. FliO regulation of FliP in the formation of the Salmonella enterica flagellum.

    Directory of Open Access Journals (Sweden)

    Clive S Barker

    2010-09-01

    Full Text Available The type III secretion system of the Salmonella flagellum consists of 6 integral membrane proteins: FlhA, FlhB, FliO, FliP, FliQ, and FliR. However, in some other type III secretion systems, a homologue of FliO is apparently absent, suggesting it has a specialized role. Deleting the fliO gene from the chromosome of a motile strain of Salmonella resulted in a drastic decrease of motility. Incubation of the ΔfliO mutant strain in motility agar, gave rise to pseudorevertants containing extragenic bypass mutations in FliP at positions R143H or F190L. Using membrane topology prediction programs, and alkaline phosphatase or GFPuv chimeric protein fusions into the FliO protein, we demonstrated that FliO is bitopic with its N-terminus in the periplasm and C-terminus in the cytoplasm. Truncation analysis of FliO demonstrated that overexpression of FliO₄₃-₁₂₅ or FliO₁-₉₅ was able to rescue motility of the ΔfliO mutant. Further, residue leucine 91 in the cytoplasmic domain was identified to be important for function. Based on secondary structure prediction, the cytoplasmic domain, FliO₄₃-₁₂₅, should contain beta-structure and alpha-helices. FliO₄₃-₁₂₅-Ala was purified and studied using circular dichroism spectroscopy; however, this domain was disordered, and its structure was a mixture of beta-sheet and random coil. Coexpression of full-length FliO with FliP increased expression levels of FliP, but coexpression with the cytoplasmic domain of FliO did not enhance FliP expression levels. Overexpression of the cytoplasmic domain of FliO further rescued motility of strains deleted for the fliO gene expressing bypass mutations in FliP. These results suggest FliO maintains FliP stability through transmembrane domain interaction. The results also demonstrate that the cytoplasmic domain of FliO has functionality, and it presumably becomes structured while interacting with its binding partners.

  16. Aerodynamics of the Smallest Flying Insects

    CERN Document Server

    Miller, Laura A; Hedrick, Ty; Robinson, Alice; Santhanakrishnan, Arvind; Lowe, Audrey

    2011-01-01

    We present fluid dynamics videos of the flight of some of the smallest insects including the jewel wasp, \\textit{Ampulex compressa}, and thrips, \\textit{Thysanoptera} spp. The fruit fly, \\textit{Drosophila melanogaster}, is large in comparison to these insects. While the fruit fly flies at $Re \\approx 120$, the jewel wasp flies at $Re \\approx 60$, and thrips flies at $Re \\approx 10$. Differences in the general structures of the wakes generated by each species are observed. The differences in the wakes correspond to changes in the ratio of lift forces (vertical component) to drag forces (horizontal component) generated.

  17. Taxonomy of SSL/TLS Attacks

    Directory of Open Access Journals (Sweden)

    Keerthi Vasan K.

    2016-02-01

    Full Text Available Secure Socket Layer (SSL and Transport Layer Security (TLS protocols use cryptographic algorithms to secure data and ensure security goals such as Data Confidentiality and Integrity in networking. They are used along with other protocols such as HTTP, SMTP, etc. in applications such as web browsing, electronic mail, and VoIP. The existing versions of the protocols as well as the cryptographic algorithms they use have vulnerabilities and is not resistant towards Man-In-The- Middle (MITM attacks. Exploiting these vulnerabilities, several attacks have been launched on SSL/TLS such as session hijacking, version degradation, heart bleed, Berserk etc. This paper is a comprehensive analysis of the vulnerabilities in the protocol, attacks launched by exploiting the vulnerabilities and techniques to mitigate the flaws in protocols. A novel taxonomy of the attacks against SSL/TLS has been proposed in this paper.

  18. Twisted Polynomials and Forgery Attacks on GCM

    DEFF Research Database (Denmark)

    Abdelraheem, Mohamed Ahmed A. M. A.; Beelen, Peter; Bogdanov, Andrey;

    2015-01-01

    nonce misuse resistance, such as POET. The algebraic structure of polynomial hashing has given rise to security concerns: At CRYPTO 2008, Handschuh and Preneel describe key recovery attacks, and at FSE 2013, Procter and Cid provide a comprehensive framework for forgery attacks. Both approaches rely...... heavily on the ability to construct forgery polynomials having disjoint sets of roots, with many roots (“weak keys”) each. Constructing such polynomials beyond naïve approaches is crucial for these attacks, but still an open problem. In this paper, we comprehensively address this issue. We propose to use...... in an improved key recovery algorithm. As cryptanalytic applications of our twisted polynomials, we develop the first universal forgery attacks on GCM in the weak-key model that do not require nonce reuse. Moreover, we present universal weak-key forgeries for the nonce-misuse resistant AE scheme POET, which...

  19. Outdoor Air Pollution, Heart Attack and Stroke

    Science.gov (United States)

    Elevated outdoor ambient air particle pollution triggers heart attacks, strokes, and abnormal heart rhythms and worsens heart failure in individuals at high risk due to underlying medical conditions. Emergency Medical Services in communities are the first responders to these eme...

  20. Preventing Coordinated Attacks Via Distributed Alert Exchange

    CERN Document Server

    Garcia-Alfaro, Joaquin; Muehl, Gero; Borrell, Joan

    2008-01-01

    Attacks on information systems followed by intrusions may cause large revenue losses. The prevention of both is not always possible by just considering information from isolated sources of the network. A global view of the whole system is necessary to recognize and react to the different actions of such an attack. The design and deployment of a decentralized system targeted at detecting as well as reacting to information system attacks might benefit from the loose coupling realized by publish/subscribe middleware. In this paper, we present the advantages and convenience in using this communication paradigm for a general decentralized attack prevention framework. Furthermore, we present the design and implementation of our approach based on existing publish/subscribe middleware and evaluate our approach for GNU/Linux systems.

  1. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  2. Performance Evaluation of AODV under Blackhole Attack

    National Research Council Canada - National Science Library

    Tarunpreet Bhatia; A K Verma

    2013-01-01

    .... This paper simulates one of the most malicious behaviors known as blackhole attack. The blackhole node creates forged reply, advertising valid and fresh route to destination and thereafter drops data packets maliciously...

  3. Uncertainties of a preemptive nuclear attack

    Energy Technology Data Exchange (ETDEWEB)

    Bunn, M.; Tsipis, K.

    1983-11-01

    The deterrence of nuclear war requires that nuclear forces not be vulnerable to a preemptive disarming attack that would preclude retaliation. The uncertainties surrounding a countersilo attack stem from incomplete intelligence information about the accuracy of weapons delivery due to errors in the inertial-guidance system and those associated with reentry into the atmosphere. An analyses of these uncertainties examines the results of test flights and calculations based on simulations that consider the problems of fratricide, estimates of yield, and a number of other technical uncertainties that are overshadowed by the uncertainty of whether the nation under attack would respond with launch-on-warning or launch-under-attack. The analysis concludes that, despite a current level of stability, the progress of weapons technology bodes ill for the future unless stringent testing and deployment limitations are imposed. 6 figures, 1 table. (DCK)

  4. Thatcher condemns attacks on abortion mp.

    Science.gov (United States)

    1987-12-19

    The Prime Minister, Mrs Margaret Thatcher, has stepped in to condemn a series of violent attacks on Liberal MP David Alton who is trying to reduce the [Illegible word] limit on abortions from 28 to 18 weeks.

  5. Identifying and Analyzing Web Server Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Seifert, Christian; Endicott-Popovsky, Barbara E.; Frincke, Deborah A.; Komisarczuk, Peter; Muschevici, Radu; Welch, Ian D.

    2008-08-29

    Abstract: Client honeypots can be used to identify malicious web servers that attack web browsers and push malware to client machines. Merely recording network traffic is insufficient to perform comprehensive forensic analyses of such attacks. Custom tools are required to access and analyze network protocol data. Moreover, specialized methods are required to perform a behavioral analysis of an attack, which helps determine exactly what transpired on the attacked system. This paper proposes a record/replay mechanism that enables forensic investigators to extract application data from recorded network streams and allows applications to interact with this data in order to conduct behavioral analyses. Implementations for the HTTP and DNS protocols are presented and their utility in network forensic investigations is demonstrated.

  6. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter 2014 Table ... NHLBI has uncovered some of the causes of heart diseases and conditions, as well as ways to prevent ...

  7. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  8. Correlations in complex networks under attack

    CERN Document Server

    Srivastava, Animesh; Ganguly, Niloy; Peruani, Fernando; 10.1103/PhysRevE.86.036106

    2013-01-01

    For any initial correlated network after any kind of attack where either nodes or edges are removed, we obtain general expressions for the degree-degree probability matrix and degree distribution. We show that the proposed analytical approach predicts the correct topological changes after the attack by comparing the evolution of the assortativity coefficient for different attack strategies and intensities in theory and simulations. We find that it is possible to turn an initial assortative network into a disassortative one, and vice versa, by fine-tuning removal of either nodes or edges. For an initial uncorrelated network, on the other hand, we discover that only a targeted edge-removal attack can induce such correlations.

  9. Longest-path attacks on complex networks

    CERN Document Server

    Pu, Cunlai

    2014-01-01

    We investigate the longest-path attacks on complex networks. Specifically, we remove approximately the longest simple path from a network iteratively until there are no paths left in the network. We propose two algorithms, the random augmenting approach (RPA) and the Hamilton-path based approach (HPA), for finding the approximately longest simple path in a network. Results demonstrate that steps of longest-path attacks increase with network density linearly for random networks, while exponentially increasing for scale-free networks. The more homogeneous the degree distribution is, the more fragile the network, which is totally different from the previous results of node or edge attacks. HPA is generally more efficient than RPA in the longest-path attacks of complex networks. These findings further help us understand the vulnerability of complex systems, better protect complex systems, and design more tolerant complex systems.

  10. Study Shows How Zika Attacks Infant Brain

    Science.gov (United States)

    ... gov/news/fullstory_162514.html Study Shows How Zika Attacks Infant Brain Virus can copy itself thousands ... New research paints a chilling portrait of how Zika ravages the infant brain. Scientists from the U.S. ...

  11. A NEW METHOD FOR RESYNCHRONIZATION ATTACK

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    This paper presents a new method for resynchronization attack, which is the combination of the differential cryptanalysis and algebraic attack. By using the new method one gets a system of linear equations or low-degree equations about initial keys, and the solution of the system of equations results in the recovery of the initial keys. This method has a lower computational complexity and better performance of attack in contrast to the known methods. Accordingly, the design of the resynchronization stream generators should be reconsidered to make them strong enough to avoid our attacks. When implemented to the Toyocrypt, our method gains the computational complexity of O(217), and that of O(267) for LILI-128.

  12. AN APPROACH OF DEFENDING AGAINST DDOS ATTACK

    Institute of Scientific and Technical Information of China (English)

    Wu Zhijun; Duan Haixin; Li Xing

    2006-01-01

    An approach of defending against Distributed Denial of Service (DDoS) attack based on flow model and flow detection is presented. The proposed approach can protect targets from DDoS attacking, and allow targets to provide good service to legitimate traffic under DDoS attacking, with fast reaction. This approach adopts the technique of dynamic comb filter, yields a low level of false positives of less than 1.5%,drops similar percentage of good traffic, about 1%, and passes neglectable percentage of attack bandwidth to the victim, less than 1.5%. The prototype of commercial product, D-fighter, is developed by implementing this proposed approach on Intel network processor platform IXP 1200.

  13. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  14. SECURING MANET FROM BLACKHOLE AND WORMHOLE ATTACKS

    Directory of Open Access Journals (Sweden)

    C.M.Vidhyapathi

    2013-06-01

    Full Text Available Mobile Ad-Hoc networks are self-configuring and self-organizing multi-hop wireless networks. They do not have any fixed infrastructure or centralized management. Due to this, the ad hoc networks are vulnerable to attacks. The routing protocol for MANET considered in this paper is AODV(Ad hoc On-demand Distance Vector Routing Protocol. Blackhole and Wormhole nodes are malicious nodeswhich degrade the performance of the network. They actively participate in the network and conform to forward packets to the destination. The Watchdog Mechanism is used to correct the network from both blackhole and wormhole attacks. The networks originally, with the attacks and after being prevented from attacks are compared on the basis of packets received, throughput, end-to-end delay and packet delivery ratio. ns2 software is used for the simulation.

  15. Heuristic attacks against graphical password generators

    CSIR Research Space (South Africa)

    Peach, S

    2010-05-01

    Full Text Available In this paper the authors explore heuristic attacks against graphical password generators. A new trend is emerging to use user clickable pictures to generate passwords. This technique of authentication can be successfully used for - for example...

  16. Prevention of Routing Attacks In Manet

    Directory of Open Access Journals (Sweden)

    N.Rajesh

    2013-01-01

    Full Text Available Mobile Ad hoc Networks (MANET are easily prone to attacks due to its network infrastructure. In previous routing attacks the malicious node is isolated using naive fuzzy response decisions. In this paper a new technology of broadcasting the awareness information about attacker node to all the existing nodes in the network is discussed. The awareness approach is based on an extended Dempster-Shafer mathematical theory(D-S Theory. Dempster-Shafer mathematical theory is used to collect the evidence notion of importance factors. The adaptiveness of the mechanism allows to systematically cope with the identified MANET routing attacks. The intrusion response action in MANET was addressed by isolating uncooperative nodes based on the node reputation derived from their behaviors. Here the effectiveness of the approach with the consideration of the packet delivery ratio and routing cost were demonstrated using java swing concepts

  17. Randomized, controlled trial of telcagepant over four migraine attacks

    DEFF Research Database (Denmark)

    Ho, Andrew P; Dahlöf, Carl Gh; Silberstein, Stephen D

    2010-01-01

    This study evaluated the calcitonin gene-related peptide (CGRP) receptor antagonist telcagepant (tablet formulation) for treatment of a migraine attack and across four attacks. Adults with migraine were randomized, double-blind, to telcagepant 140 mg, telcagepant 280 mg, or control treatment...... sequences to treat four moderate-to-severe migraine attacks. Control patients received placebo for three attacks and telcagepant 140 mg for one attack. Efficacy for the first attack (Attack 1) and consistency of efficacy over multiple attacks were assessed. For an individual patient, consistent efficacy...

  18. To mitigate Black-hole attack with CBDS in MANET

    Directory of Open Access Journals (Sweden)

    Navjot

    2015-06-01

    Full Text Available Mobile ad-hoc network is self configured network that consist of mobile nodes which communicate with each other. Distributed self-organized nature of this network makes it venerable to various attacks likes DOS attack, Black hole attack, wormhole attack and jamming attack etc. Blackhole attack is one of the serious attack in network in which information loss occur which degrades the performance of network. In this work black hole attack is detected with the help of CBDS (cooperative Bait Detection Algorithm and MD5 is used for the security purpose. This work is implemented in Network simulator and performance is checked on the bases of network parameters.

  19. Heart Attack Prediction System Based Neural Arbitration

    OpenAIRE

    Helwan, Abdulkader

    2015-01-01

    Heart attack is an asymptomatic and epidemic medical condition that may suddenly occur and causes “death”. Therefore, it is a life-threatening condition and it should be detected before it occurs. Heart attack is so far predicted using the conventional ways of doctor’s examination and by performing some medical tests such as stress test, ECG, and heart CTScan etc. The coronary vessels constriction, the cholesterol levels in the arteries, and other attributes can be good indicators for making ...

  20. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  1. Binocular interactions underlying the classic optomotor responses of flying flies

    Directory of Open Access Journals (Sweden)

    Brian J Duistermars

    2012-02-01

    Full Text Available In response to imposed course deviations, the fast optomotor reactions of animals reduce motion blur and facilitate the maintenance of stable body posture. In flies, the monocular front-to-back (progressive and back-to-front (regressive visual motion components generated by horizontal rotation are selectively encoded, respectively, by homo and heterolateral motion sensitive circuits in the third optic ganglion, the lobula plate. To investigate the strength of such inter-ocular interactions and their role in compensatory sensory-motor transformations, we utilize a virtual reality flight simulator to record optomotor reactions by tethered flying flies in response to imposed binocular and monocular visual rotation. With stimulus parameters generating large contrast insensitive optomotor responses to binocular rotation, we find that responses to monocular progressive motion are larger than those to panoramic rotation but contrast sensitive. Conversely, responses to monocular regressive motion are slower than those to rotation and peak at the lowest tested contrast. Together our results suggest that contrast insensitive optomotor responses to binocular rotation result from the dynamic interplay of contralateral inhibitory as well as excitatory circuit interactions and serve to maintain a stable optomotor equilibrium across a range of visual contrasts.

  2. Collision Attack on the Full Extended MD4 and Pseudo-Preimage Attack on RIPEMD

    Institute of Scientific and Technical Information of China (English)

    Gao-Li Wang

    2013-01-01

    The cryptographic hash functions Extended MD4 and RIPEMD are double-branch hash functions,which consist of two parallel branches.Extended MD4 was proposed by Rivest in 1990,and RIPEMD was devised in the framework of the RIPE project (RACE Integrity Primitives Evaluation,1988~1992).On the basis of differential analysis and meet-in-the-middle attack principle,this paper proposes a collision attack on the full Extended MD4 and a pseudo-preimage attack on the full RIPEMD respectively.The collision attack on Extended MD4 holds with a complexity of 237,and a collision instance is presented.The pseudo-preimage attack on RIPEMD holds with a complexity of 2125,4,which optimizes the complexity order for brute-force attack.The results in this study will also be beneficial to the analysis of other double-branch hash functions such as RIPEMD-160.

  3. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  4. Geopolymer Mortar with Fly Ash

    Directory of Open Access Journals (Sweden)

    Saloma

    2016-01-01

    Full Text Available The cement industry accounts for about 7% of all CO2 emissions caused by humans. Therefore, it is necessary to find another material in order to support sustainable material. An alternative way is replacing cement material with alternative material as fly ash. Fly ash as binder need to be added alkaline activator in the form of sodium silicate (Na2SiO3 or potassium silicate (K2SiO3 and sodium hydroxide (NaOH or potassium hydroxide (KOH. The purpose of this research is to analyze the effect of activator liquid concentration on geopolymer mortar properties and to know the value of compressive strength. Molarity variation of NaOH are 8, 12, 14, and 16 M with ratio of Na2SiO3/NaOH = 1.0. Ratio of sand/fly ash = 2.75 and ratio of activator/fly ash = 0.8. The cube-shaped specimen 50 × 50 × 50 mm is cured by steam curing with a temperature of 60°C for 48 hours. The experimental result of fresh mortar reported that the molarity of NaOH affect the slump flow and setting time, higher of NaOH produces the smaller value of slump and the faster time of setting. The experimental of density results reported that the increase of specific gravity when the molarity of NaOH increased. The experimental results of the compressive strength are showed that the maximum compressive strength of geopolymer mortar 14 M is 10.06 MPa and the lowest compressive strength produced by geopolymer mortar 8 M is 3.95 MPa. Testing the compressive strength of geopolymer mortar 16 M produces compressive strength lower than 14 M geopolymer mortar is 9.16 MPa.

  5. "Fly me to the moon"

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    @@ China's first lunar probe Chang'e-I, named after a mythical Chinese goddess who, according to legend, made her home on the moon, blasted off on 24 October from the Xichang Satellite Launch Center in the southwestern province of Sichuan. In addition to making the dream cherished by Chinese people to fly to the moon come true, it is the first step into China's ambitious threestage moon mission, marking a new milestone in the country's space exploration history.

  6. Notes on flying and dying.

    Science.gov (United States)

    Meyer, B C

    1983-07-01

    Focused on selected details in the lives and creative works of Samuel Johnson, Edgar Allan Poe, and Houdini, this paper explores a seeming antinomy between claustrophobic annihilation and aviation. At first glance the latter appears as an antidote to the threat of entrapment and death. On a deeper level the distinction fades as the impression arises that in the examples cited, flying may represent an unconscious expression of a wish for death and ultimate reunion.

  7. Pathologic features of fatal shark attacks.

    Science.gov (United States)

    Byard, R W; Gilbert, J D; Brown, K

    2000-09-01

    To examine the pattern of injuries in cases of fatal shark attack in South Australian waters, the authors examined the files of their institution for all cases of shark attack in which full autopsies had been performed over the past 25 years, from 1974 to 1998. Of the seven deaths attributed to shark attack during this period, full autopsies were performed in only two cases. In the remaining five cases, bodies either had not been found or were incomplete. Case 1 was a 27-year-old male surfer who had been attacked by a shark. At autopsy, the main areas of injury involved the right thigh, which displayed characteristic teeth marks, extensive soft tissue damage, and incision of the femoral artery. There were also incised wounds of the right wrist. Bony injury was minimal, and no shark teeth were recovered. Case 2 was a 26-year-old male diver who had been attacked by a shark. At autopsy, the main areas of injury involved the left thigh and lower leg, which displayed characteristic teeth marks, extensive soft tissue damage, and incised wounds of the femoral artery and vein. There was also soft tissue trauma to the left wrist, with transection of the radial artery and vein. Bony injury was minimal, and no shark teeth were recovered. In both cases, death resulted from exsanguination following a similar pattern of soft tissue and vascular damage to a leg and arm. This type of injury is in keeping with predator attack from underneath or behind, with the most severe injuries involving one leg. Less severe injuries to the arms may have occurred during the ensuing struggle. Reconstruction of the damaged limb in case 2 by sewing together skin, soft tissue, and muscle bundles not only revealed that no soft tissue was missing but also gave a clearer picture of the pattern of teeth marks, direction of the attack, and species of predator.

  8. Identifying glass compositions in fly ash

    Directory of Open Access Journals (Sweden)

    Katherine eAughenbaugh

    2016-01-01

    Full Text Available In this study, four Class F fly ashes were studied with a scanning electron microscope; the glassy phases were identified and their compositions quantified using point compositional analysis with k-means clustering and multispectral image analysis. The results showed that while the bulk oxide contents of the fly ashes were different, the four fly ashes had somewhat similar glassy phase compositions. Aluminosilicate glasses (AS, calcium aluminosilicate glasses (CAS, a mixed glass, and, in one case, a high iron glass were identified in the fly ashes. Quartz and iron crystalline phases were identified in each fly ash as well. The compositions of the three main glasses identified, AS, CAS, and mixed glass, were relatively similar in each ash. The amounts of each glass were varied by fly ash, with the highest calcium fly ash containing the most of calcium-containing glass. Some of the glasses were identified as intermixed in individual particles, particularly the calcium-containing glasses. Finally, the smallest particles in the fly ashes, with the most surface area available to react in alkaline solution, such as when mixed with portland cement or in alkali-activated fly ash, were not different in composition than the large particles, with each of the glasses represented. The method used in the study may be applied to a fly ash of interest for use as a cementing material in order to understand its potential for reactivity.

  9. Computational Aerodynamic Analysis of a Micro-CT Based Bio-Realistic Fruit Fly Wing.

    Science.gov (United States)

    Brandt, Joshua; Doig, Graham; Tsafnat, Naomi

    2015-01-01

    The aerodynamic features of a bio-realistic 3D fruit fly wing in steady state (snapshot) flight conditions were analyzed numerically. The wing geometry was created from high resolution micro-computed tomography (micro-CT) of the fruit fly Drosophila virilis. Computational fluid dynamics (CFD) analyses of the wing were conducted at ultra-low Reynolds numbers ranging from 71 to 200, and at angles of attack ranging from -10° to +30°. It was found that in the 3D bio-realistic model, the corrugations of the wing created localized circulation regions in the flow field, most notably at higher angles of attack near the wing tip. Analyses of a simplified flat wing geometry showed higher lift to drag performance values for any given angle of attack at these Reynolds numbers, though very similar performance is noted at -10°. Results have indicated that the simplified flat wing can successfully be used to approximate high-level properties such as aerodynamic coefficients and overall performance trends as well as large flow-field structures. However, local pressure peaks and near-wing flow features induced by the corrugations are unable to be replicated by the simple wing. We therefore recommend that accurate 3D bio-realistic geometries be used when modelling insect wings where such information is useful.

  10. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  11. Modelling social-technical attacks with timed automata

    NARCIS (Netherlands)

    David, Nicolas; David, Alexandre; Hansen, René Rydhof; Larsen, Kim G.; Legay, Axel; Olesen, Mads Chr.; Probst, Christian W.

    2015-01-01

    Attacks on a system often exploit vulnerabilities that arise from human behaviour or other human activity. Attacks of this type, so-called socio-technical attacks, cover everything from social engineering to insider attacks, and they can have a devastating impact on an unprepared organisation. In th

  12. Performance Evaluation of AODV with Blackhole Attack

    Science.gov (United States)

    Dara, Karuna

    2010-11-01

    A Mobile Ad Hoc Network (MANET) is a temporary network set up by a wireless mobile computers moving arbitrary in the places that have no network infrastructure. These nodes maintain connectivity in a decentralized manner. Since the nodes communicate with each other, they cooperate by forwarding data packets to other nodes in the network. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, mobile ad-hoc networks are unprotected to attacks of the malicious nodes. One of these attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. In this paper, we simulated the black hole attack in various mobile ad-hoc network scenarios using AODV routing protocol of MANET and have tried to find a effect if number of nodes are increased with increase in malicious nodes.

  13. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  14. Panic Attack during Elective Gastrointestinal Endoscopy

    Directory of Open Access Journals (Sweden)

    Charalampos Mitsonis

    2011-01-01

    Full Text Available Background. Esophagogastroduodenoscopy (EGD and colonoscopy (CS can evoke anxiety, embarrassment, and discomfort. These concerns can culminate in panic attacks, which may traumatize patients and significantly decrease their compliance to the procedure. The objective of this study was to evaluate the relationship between preendoscopic anxiety and the possibility of a panic attack during an elective gastrointestinal endoscopy (EGE. Methods. The study population comprised of 79 Greek outpatients. The examination was carried out without the use of conscious sedation. Patients' anxiety levels were assessed before the procedure using the Greek version of the Spielberger State-Trait Anxiety Inventory (STAI-Y. Results. Seventy-nine patients were enrolled: 45 EGD and 34 CS. Females had higher state and trait anxiety levels than males (48.14 ± 7.94 versus 44.17 ± 7.43, <0.05; and 43.68 ± 6.95 versus 39.86 ± 7.46, <0.05. Patients who experienced panic attack had significantly higher levels of both trait and state anxiety, compared to those who were panic-free. There was no significant relationship between panic attacks and sex or type of procedure. Conclusions. Patients who experience panic attacks during endoscopic procedures appear to have significantly higher anxiety levels before the procedure. Administering the STAI questionnaire prior to the endoscopy seems to be a useful screening method for vulnerable patients.

  15. The Role of Behavioral Responses in the Total Economic Consequences of Terrorist Attacks on U.S. Air Travel Targets.

    Science.gov (United States)

    Rose, Adam; Avetisyan, Misak; Rosoff, Heather; Burns, William J; Slovic, Paul; Chan, Oswin

    2017-07-01

    U.S. airports and airliners are prime terrorist targets. Not only do the facilities and equipment represent high-value assets, but the fear and dread that is spread by such attacks can have tremendous effects on the U.S. economy. This article presents the methodology, data, and estimates of the macroeconomic impacts stemming from behavioral responses to a simulated terrorist attack on a U.S. airport and on a domestic airliner. The analysis is based on risk-perception surveys of these two scenarios. The responses relate to reduced demand for airline travel, shifts to other modes, spending on nontravel items, and savings of potential travel expenditures by U.S. resident passengers considering flying domestic routes. We translate these responses to individual spending categories and feed these direct impact results into a computable general equilibrium (CGE) model of the U.S. economy to ascertain the indirect and total impacts on both the airline industry and the economy as a whole. Overall, the estimated impacts on GDP of both types of attacks exceed $10B. We find that the behavioral economic impacts are almost an order of magnitude higher than the ordinary business interruption impacts for the airliner attack and nearly two orders of magnitude higher for the airport attack. The results are robust to sensitivity tests on the travel behavior of U.S. residents in response to terrorism. © 2016 Society for Risk Analysis.

  16. On the anatomy of social engineering attacks -- A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    2017-01-01

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing sin

  17. Pareto Efficient Solutions of Attack-Defence Trees

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2015-01-01

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as proba......Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes...... on a new and general formalism for attack-defence trees....

  18. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  19. Attack Prevention for Collaborative Spectrum Sensing in Cognitive Radio Networks

    CERN Document Server

    Duan, Lingjie; Huang, Jianwei; Shin, Kang G

    2011-01-01

    Collaborative spectrum sensing can significantly improve the detection performance of secondary unlicensed users (SUs). However, the performance of collaborative sensing is vulnerable to sensing data falsification attacks, where malicious SUs (attackers) submit manipulated sensing reports to mislead the fusion center's decision on spectrum occupancy. Moreover, attackers may not follow the fusion center's decision regarding their spectrum access. This paper considers a challenging attack scenario where multiple rational attackers overhear all honest SUs' sensing reports and cooperatively maximize attackers' aggregate spectrum utilization. We show that, without attack-prevention mechanisms, honest SUs are unable to transmit over the licensed spectrum, and they may further be penalized by the primary user for collisions due to attackers' aggressive transmissions. To prevent such attacks, we propose two novel attack-prevention mechanisms with direct and indirect punishments. The key idea is to identify collisions...

  20. Hymenopterous parasitoids attacking Acanthiophilus helianthi Rossi (Diptera: Tephritidae pupae in Kohgiluyeh Safflower farms of Iran

    Directory of Open Access Journals (Sweden)

    K. Saeidi

    2016-12-01

    Full Text Available The Safflower capsule fly (SCF, Acanthiophilus helianthi Rossi (Diptera: Tephritidae is the most destructive insect pest attacking the Safflower Carthamus tinctorius L. plant which are cultivated as an oil crop. It is mainly controlled through application of broad-spectrum insecticides, which can adversely affect safflower farms ecosystem and consequently human health. Since a first step in setting up an integrated pest management program is to assess the biological control agents within the ecosystem. Therefore, in this research work the pupal parasitoids of Safflower capsule fly a main insect pest attacking Safflower plants were identified. The impact of these parasitoids against this pest was evaluated on the varying pest generations and within different locations in Kohgiluyeh province during 2008-2009 seasons. Pupal parasitoid adults of SCF were recorded from fieldreared pupae, which had been collected from heavily infested small flower heads of the first generation as well from large flower heads of the second and third generations. Rate of parasitism on A. helianthi pupae was estimated as the number of parasitoids over the total count of parasitoids and flies. Ten hymenopterous species belonging to different families parasitizing insect pupae were screened as follows: Bracon hebetor (Spinola, 1808 and Bracon luteator (Spinola, 1808 (Braconidae; Isocolus tinctorious (Melika and Gharaei, 2006 (Cynipidae; Pronotalia carlinarum (Szelenyi and Erdos, 1951 (Eulophidae; Eurytoma acroptilae (Zerova, 1986 (Eurytomidae; Ormyrus orientalis (Walker, 1871 (Ormyridae; Colotrechnus viridis (Masi, 1921 and Pteromalus sp. (Walker, 1976 (Pteromalidae; and Antistrophoplex conthurnatus (Zerova, 2000 and Microdontomenus annulatus (Masi, 1899 (Torymidae. The average parasitization rate was 23±1 as revealed through the present study. The highest parasitization rate occurred during the first generation in all localities tested, as well as in years. Statistical

  1. Ultrasonic vocalizations emitted by flying squirrels.

    Directory of Open Access Journals (Sweden)

    Meghan N Murrant

    Full Text Available Anecdotal reports of ultrasound use by flying squirrels have existed for decades, yet there has been little detailed analysis of their vocalizations. Here we demonstrate that two species of flying squirrel emit ultrasonic vocalizations. We recorded vocalizations from northern (Glaucomys sabrinus and southern (G. volans flying squirrels calling in both the laboratory and at a field site in central Ontario, Canada. We demonstrate that flying squirrels produce ultrasonic emissions through recorded bursts of broadband noise and time-frequency structured frequency modulated (FM vocalizations, some of which were purely ultrasonic. Squirrels emitted three types of ultrasonic calls in laboratory recordings and one type in the field. The variety of signals that were recorded suggest that flying squirrels may use ultrasonic vocalizations to transfer information. Thus, vocalizations may be an important, although still poorly understood, aspect of flying squirrel social biology.

  2. Possibilities of utilizing power plant fly ashes

    Directory of Open Access Journals (Sweden)

    Mezencevová Andrea

    2003-09-01

    Full Text Available The burning of fossil fuels in industrial power stations plays a significant role in the production of thermal and electrical energy. Modern thermal power plants are producing large amounts of solid waste, mainly fly ashes. The disposal of power plant waste is a large environmental problem at the present time. In this paper, possibilities of utilization of power plant fly ashes in industry, especially in civil engineering, are presented. The fly ash is a heterogeneous material with various physical, chemical and mineralogical properties, depending on the mineralogical composition of burned coal and on the used combustion technology. The utilization of fly ashes is determined of their properties. The fineness, specific surface area, particle shape, density, hardness, freeze-thaw resistance, etc. are decisive. The building trade is a branch of industry, which employs fly ash in large quantities for several decades.The best utilization of fluid fly ashes is mainly in the production of cement and concrete, due to the excellent pozzolanic and cementitious properties of this waste. In the concrete processing, the fly ash is utilized as a replacement of the fine aggregate (fine filler or a partial replacement for cement (active admixture. In addition to economic and ecological benefits, the use of fly ash in concrete improves its workability and durability, increases compressive and flexural strength, reduces segregation, bleeding, shrinkage, heat evolution and permeability and enhances sulfate resistance of concrete.The aim of current research is to search for new technologies for the fly ash utilization. The very interesting are biotechnological methods to recovery useful components of fly ashes and unconventional methods of modification of fly ash properties such as hydrothermal zeolitization and mechanochemical modification of its properties. Mechanochemistry deals with physico - chemical transformations and chemical reactions of solids induced by

  3. Attack-tolerant networked control system: an approach for detection the controller stealthy hijacking attack

    Science.gov (United States)

    Atta Yaseen, Amer; Bayart, Mireille

    2017-01-01

    In this work, a new approach will be introduced as a development for the attack-tolerant scheme in the Networked Control System (NCS). The objective is to be able to detect an attack such as the Stuxnet case where the controller is reprogrammed and hijacked. Besides the ability to detect the stealthy controller hijacking attack, the advantage of this approach is that there is no need for a priori mathematical model of the controller. In order to implement the proposed scheme, a specific detector for the controller hijacking attack is designed. The performance of this scheme is evaluated be connected the detector to NCS with basic security elements such as Data Encryption Standard (DES), Message Digest (MD5), and timestamp. The detector is tested along with networked PI controller under stealthy hijacking attack. The test results of the proposed method show that the hijacked controller can be significantly detected and recovered.

  4. Resistance of the double random phase encryption against various attacks.

    Science.gov (United States)

    Frauel, Yann; Castro, Albertina; Naughton, Thomas J; Javidi, Bahram

    2007-08-06

    Several attacks are proposed against the double random phase encryption scheme. These attacks are demonstrated on computer-generated ciphered images. The scheme is shown to be resistant against brute force attacks but susceptible to chosen and known plaintext attacks. In particular, we describe a technique to recover the exact keys with only two known plain images. We compare this technique to other attacks proposed in the literature.

  5. Conditional beam splitting attack on quantum key distribution

    OpenAIRE

    Calsamiglia, John; Barnett, Stephen M.; Lütkenhaus, Norbert

    2001-01-01

    We present a novel attack on quantum key distribution based on the idea of adaptive absorption [calsam01]. The conditional beam splitting attack is shown to be much more efficient than the conventional beam spitting attack, achieving a performance similar to the, powerful but currently unfeasible, photon number splitting attack. The implementation of the conditional beam splitting attack, based solely on linear optical elements, is well within reach of current technology.

  6. Distributed Denial of Service Attacks: A Review

    Directory of Open Access Journals (Sweden)

    Sonali Swetapadma Sahu

    2014-01-01

    Full Text Available A wireless sensor network (WSN is a wireless network consisting of spatially distributed autonomous devices using sensors to monitor physical or environmental conditions.WSN is a fluorishing network that has numerous applications and could be used in diverse scenarios. DDoS (Distributed Denial of Service is an attack where a number of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users.Not much research work has been done in DDoS in WSN.We are conducting a review on DDoS attack to show its impact on networks and to present various defensive, detection and preventive measures adopted by researchers till now.

  7. Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    Energy Technology Data Exchange (ETDEWEB)

    Chatterjee, Samrat; Halappanavar, Mahantesh; Tipireddy, Ramakrishna; Oster, Matthew R.; Saha, Sudip

    2015-04-15

    Representation and propagation of uncertainty in cyber attacker payoffs is a key aspect of security games. Past research has primarily focused on representing the defender’s beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and intervals. Within cyber-settings, continuous probability distributions may still be appropriate for addressing statistical (aleatory) uncertainties where the defender may assume that the attacker’s payoffs differ over time. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attacker’s payoff generation mechanism. Such epistemic uncertainties are more suitably represented as probability boxes with intervals. In this study, we explore the mathematical treatment of such mixed payoff uncertainties.

  8. A Traceability Attack against e-Passports

    Science.gov (United States)

    Chothia, Tom; Smirnov, Vitaliy

    Since 2004, many nations have started issuing "e-passports" containing an RFID tag that, when powered, broadcasts information. It is claimed that these passports are more secure and that our data will be protected from any possible unauthorised attempts to read it. In this paper we show that there is a flaw in one of the passport's protocols that makes it possible to trace the movements of a particular passport, without having to break the passport's cryptographic key. All an attacker has to do is to record one session between the passport and a legitimate reader, then by replaying a particular message, the attacker can distinguish that passport from any other. We have implemented our attack and tested it successfully against passports issued by a range of nations.

  9. Revised irradiation doses to control melon fly, Mediterranean fruit fly, and oriental fruit fly (Diptera: Tephritidae) and a generic dose for tephritid fruit flies.

    Science.gov (United States)

    Follett, Peter A; Armstrong, John W

    2004-08-01

    Currently approved irradiation quarantine treatment doses for Bactrocera cucurbitae (Coquillet), melon fly; Ceratitis capitata (Wiedemann), Mediterranean fruit fly; and Bactrocera dorsalis (Hendel), oriental fruit fly, infesting fruits and vegetables for export from Hawaii to the continental United States are 210, 225, and 250 Gy, respectively. Irradiation studies were initiated to determine whether these doses could be reduced to lower treatment costs, minimize any adverse effects on quality, and support a proposed generic irradiation dose of 150 Gy for fruit flies. Dose-response tests were conducted with late third instars of wild and laboratory strains of the three fruit fly species, both in diet and in fruit. After x-ray irradiation treatment, data were taken on adult emergence, and adult female fecundity and fertility. Melon fly was the most tolerant of the three species to irradiation, and oriental fruit fly was more tolerant than Mediterranean fruit fly. Laboratory and wild strains of each species were equally tolerant of irradiation, and larvae were more tolerant when irradiated in fruit compared with artificial diet. An irradiation dose of 150 Gy applied to 93,666 melon fly late third instars in papayas resulted in no survival to the adult stage, indicating that this dose is sufficient to provide quarantine security. Irradiation doses of 100 and 125 Gy applied to 31,920 Mediterranean fruit fly and 55,743 oriental fruit fly late third instars, respectively, also resulted in no survival to the adult stage. Results support a proposed generic irradiation quarantine treatment dose of 150 Gy for all tephritid fruit flies.

  10. The effect of fly ashes in the corrosion and durability in concretes; Efecto de las Cenizas Volantes en la Durabilidad y en la Corrosion en Armaduras del Hormigon

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-12-31

    From the beginning of this century, fly ashes have been the object of a variety of studies and research-looking for different ways of application. The construction industry reuses the highest volume of the fly ash actually produced. Researches carried out on the behaviour of hydraulic blended materials mixed with fly ash have supported the progressive use of these by-products, and simultaneously have opened new ways of application. Spanish fly ash producers together with research centers, as IETcc, have been involved in investigations since 70`s. The last important research carried out has been the one dealing with the durability of concrete made with fly ash and its interaction with the corrosion of reinforcements. In this work five fly ashes of silicon-aluminous type were mixed with portland cement containing low alkali and aluminates in order to enhance the effect of those components from the fly ash. The main goal was to study the degradation mechanisms of concretes made with fly ashes, substituting partially the cement (15 and 35%) in several aggressive media: containing sulfates, chlorides or sea water. The effect to these aggressive media on the durability has also been considered regarding reinforcements. Different type of tests were carried out in laboratory and under natural exposure. In the case of laboratory studies the objectives were: 1) to stablish the mechanisms of hardening. The effect of fly ashes in pozolanic reaction and in the microstructure of the material. 2) Resistance of the addition of fly ashes against chloride and sulfates. Definition of the deterioration mechanisms. 3) Effect of fly ashes on the corrosion of reinforcements. Influence on the passivation process. Resistance against carbonation and chloride attack. (Author)

  11. Chilling and Host Plant/Site-Associated Eclosion Times of Western Cherry Fruit Fly (Diptera: Tephritidae) and a Host-Specific Parasitoid.

    Science.gov (United States)

    Yee, Wee L; Goughnour, Robert B; Hood, Glen R; Forbes, Andrew A; Feder, Jeffrey L

    2015-08-01

    The western cherry fruit fly, Rhagoletis indifferens Curran (Diptera: Tephritidae), is an endemic herbivore of bitter cherry, Prunus emarginata (Douglas ex Hooker) Eaton, but ∼100 years ago established on earlier-fruiting domesticated sweet cherry, Prunus avium (L.) L. Here, we determined if eclosion times of adult R. indifferens from sweet and bitter cherry differ according to the phenology of their respective host plants and if eclosion times of the host-specific parasitoid Diachasma muliebre (Muesebeck) (Hymenoptera: Braconidae) attacking bitter and sweet cherry flies differ according to the eclosion phenology of their fly hosts. Fly pupae from sweet and bitter cherry fruit were collected from sympatric and allopatric sites in Washington state, and chilled at 5°C. Because timing of eclosion in R. indifferens depends on chill duration, eclosion time in wasps could also vary with chill duration. To account for this, fly pupae were chilled for 1, 2, 2.5, 3, 4, 6, or 8 mo. Both flies and wasps eclosed earlier with longer chill durations. Eclosion times of sweet and bitter cherry flies from a sympatric site in central Washington did not differ. However, at allopatric sites in northwestern and central Washington, bitter cherry flies eclosed later than sweet and bitter cherry flies at the sympatric site. Correspondingly, D. muliebre parasitizing a more isolated bitter cherry fly population eclosed later than D. muliebre parasitizing earlier-emerging sweet and bitter cherry fly populations. These results provide evidence for D. muliebre rapidly responding to changes in host plant shifts by R. indifferens.

  12. Susceptibility of 15 mango (Sapindales: Anacardiaceae) cultivars to the attack by Anastrepha ludens and Anastrepha obliqua (Diptera:Tephritidae) and the role of underdeveloped fruit as pest reservoirs: management implications

    Science.gov (United States)

    We evaluated the susceptibility of 15 mango cultivars to the attack of Anastrepha ludens and A. obliqua, the main Tephritid pests of this crop in Mexico. In a field experiment, bagged, fruit-bearing branches were exposed to gravid females of both fly species. Infestation rates, developmental time,...

  13. Flying qualities criteria and flight control design

    Science.gov (United States)

    Berry, D. T.

    1981-01-01

    Despite the application of sophisticated design methodology, newly introduced aircraft continue to suffer from basic flying qualities deficiencies. Two recent meetings, the DOD/NASA Workshop on Highly Augmented Aircraft Criteria and the NASA Dryden Flight Research Center/Air Force Flight Test Center/AIAA Pilot Induced Oscillation Workshop, addressed this problem. An overview of these meetings is provided from the point of view of the relationship between flying qualities criteria and flight control system design. Among the items discussed are flying qualities criteria development, the role of simulation, and communication between flying qualities specialists and control system designers.

  14. Use Of Fly Iarvae In Space Agriculture

    Science.gov (United States)

    Katayama, Naomi; Mitsuhashi, Jun; Hachiya, Natumi; Miyashita, Sachiko; Hotta, Atuko

    The concept of space agriculture is full use of biological and ecological components ot drive materials recycle loop. In an ecological system, producers, consumers and decomposers are its member. At limited resources acailable for space agriculture, full use of members' function is required to avoid food shortage and catastrophe.Fly is categrized to a decomposer at its eating excreta and rotten materials. However, is it could be edible, certainly it is eaten in several food culture of the world, it functions as a converter of inedible biomass ot edible substance. This conversion enhances the efficiency of usage of resource that will be attributed to space agriculture. In this context, we examine the value of melon fly, Dacus cucurbitae, as a candidate fly species ofr human food. Nutrients in 100g of melon fly larvae were protein 12g, lipid 4.6g Fe 4.74mg, Ca 275mg, Zn 6.37mg, Mn 4.00mg. Amino acids compositon in 100g of larvae was glutamic acid 1.43g and aspartic acid 1.12g. Because of high contents of these amino acids taste of fly larva might be good. Life time of adult melon fly is one to two month, and lays more than 1,000 eggs in total during the life. Larvae hatch after one to two days, and metamorphose after 8 to 15 days to pupae. Srxual maturity is reached after 22 days the earliest from it egg. Sixteen generations could be succeeded in a year for melon fly at maximum. The rate of proliferation of fly is quite high compared to silkworm that can have 8.7 generations per year. The wide food habit of fly, compared to mulberry leaf for silkworm, is another advantage to choose fly for entomophage. Rearing technology of melon fly is well established, since large scaled production of sterile male fly has been conducted in order ot exterminate melon fly in the field. Feeding substance for melon fly larvae in production line is a mixture of wheat, bran, raw sugar, olara, beer yeast, tissue paper, and additive chemicals. A 1 kg of feed substance can be converted to

  15. What the fly's nose tells the fly's brain.

    Science.gov (United States)

    Stevens, Charles F

    2015-07-28

    The fly olfactory system has a three-layer architecture: The fly's olfactory receptor neurons send odor information to the first layer (the encoder) where this information is formatted as combinatorial odor code, one which is maximally informative, with the most informative neurons firing fastest. This first layer then sends the encoded odor information to the second layer (decoder), which consists of about 2,000 neurons that receive the odor information and "break" the code. For each odor, the amplitude of the synaptic odor input to the 2,000 second-layer neurons is approximately normally distributed across the population, which means that only a very small fraction of neurons receive a large input. Each odor, however, activates its own population of large-input neurons and so a small subset of the 2,000 neurons serves as a unique tag for the odor. Strong inhibition prevents most of the second-stage neurons from firing spikes, and therefore spikes from only the small population of large-input neurons is relayed to the third stage. This selected population provides the third stage (the user) with an odor label that can be used to direct behavior based on what odor is present.

  16. Characteristics of spanish fly ashes

    Directory of Open Access Journals (Sweden)

    de Luxán, M. P.

    1988-03-01

    Full Text Available The purpose of this study is the characterization of fly ashes produced by Spanish thermoelectric power plants, according to sampling taken in 1981 and 1982. The study takes in the following characteristics: physical characteristics (size distribution of particles, ...; chemical ones (chemical analysis...; and mineralogical ones (application of instrumental techniques of X-ray diffraction and infrared absorption spectroscopy. From a general point of view, it can be said that the samples of Spanish fly ashes are similar to those produced in other countries. The results obtained are a contribution to the knowledge of Spanish fly ashes and form part of the antecedents of investigations carried out in subsequent years.

    Este trabajo tiene por objeto la caracterización de las cenizas volantes producidas en las Centrales Termoeléctricas españolas, según un muestreo realizado entre 1981 y 1982. El estudio comprende las siguientes características: físicas (distribución del tamaño de partículas,...; químicas (análisis químico, …; y mineralógicas (aplicación de las técnicas instrumentales de difracción de rayos X y espectroscopía de absorción infrarroja. Desde un punto de vista general, se puede afirmar que las muestras de ceniza volante estudiadas son semejantes a las producidas en otros países. Los resultados obtenidos son una aportación al conocimiento de las cenizas volantes españolas y forman parte de los antecedentes de las investigaciones llevadas a cabo en años posteriores.

  17. Textual Manipulation for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Hussein AlNabulsi

    2013-11-01

    Full Text Available SQL injection attacks try to use string or text manipulations to access illegally websites and their databases. This is since using some symbols or characters in SQL statements may trick the authentication system to incorrectly allow such SQL statements to be processed or executed. In this paper, we highlighted several examples of such text manipulations that can be successfully used in SQL injection attacks. We evaluated the usage of those strings on several websites and web pages using SNORT open source. We also conducted an extensive comparison study of some relevant papers.

  18. Defending Against Wormhole Attack in OLSR

    Institute of Scientific and Technical Information of China (English)

    HONG Liang; HONG Fan; FU Cai

    2006-01-01

    OLSR (optimal link state routing) is one of the four basic routing protocols used in mobile ad hoc Networks by the MANET working group of IETF(Internet engineering task force). OLSR, a proactive routing protocol, is based on a multipoint relaying flooding technique to reduce the number of topology broadcast. OLSR uses periodic HELLO packets to neighbor detection. As introduced in Reference [1], the wormhole attack can form a serious threat in wireless Networks, especially against many ad hoc Network routing protocols and location-based wireless security systems. Here, a trust model to handle this attack in OLSR is provided and simulated in NS2.

  19. Attacks and infections in percolation processes

    Science.gov (United States)

    Janssen, Hans-Karl; Stenull, Olaf

    2017-08-01

    We discuss attacks and infections at propagating fronts of percolation processes based on the extended general epidemic process. The scaling behavior of the number of the attacked and infected sites in the long time limit at the ordinary and tricritical percolation transitions is governed by specific composite operators of the field-theoretic representation of this process. We calculate corresponding critical exponents for tricritical percolation in mean-field theory and for ordinary percolation to 1-loop order. Our results agree well with the available numerical data.

  20. Evaluating the quality of the Mexican fruit-fly, Anastrepha ludens, as host for the parasitoid Melittobia digitata

    Directory of Open Access Journals (Sweden)

    J.M. González

    2013-08-01

    Full Text Available We investigated the presence of Melittobia digitata (Hymenoptera: Eulophidae and its associations with its natural hosts in Veracruz, Mexico. The parasitoid was confirmed to be present and found to attack prepupae of Trypoxylon and Sceliphron (Hymenoptera: Crabronidae and Sphecidae, respectively mud daubers as well as pupae of the Mexican fruit fly Anastrepha ludens (Diptera: Tephritidae. Since A. ludens is a very important pest of citrus and mango in Mexico and Central America, we evaluated, in laboratory experiments, the quality of A. ludens as host of M. digitata comparing the development of the parasitoid in another unrelated fly species (Sarcophaga [Neobellieria] bullata (Diptera: Sarcophagidae and in mud dauber wasps (Trypoxylon sp. and Sceliphron sp.. The Mexican fruit fly appears to be a good-quality host for M. digitata, and the results are discussed in the context of their possible interest as a natural enemy of A. ludens.

  1. Grapefruit as a host for the West Indian fruit fly (Diptera: Tephritidae).

    Science.gov (United States)

    Mangan, Robert L; Thomas, Donald B; Moreno, Aleena Tarshis; Robacker, David

    2011-02-01

    The most common hosts for the West Indian fruit fly, Anastrepha obliqua (Macquart) (Diptera: Tephritidae) are fruit in the family Anacardiaceae (mango [Mangifera L.] and mombin [Spondias L.] species). However, similar to many of the tropical fruit flies of major economic importance, this species attacks several other families of crop fruit, including Annonaceae (cherimoya, Annona cherimola Mill.), Myrtaceae (guava, Psidium L.), Oxalidaceae (carambola, Averrhoa carambola L.), Passifloraceae (granadilla, Passiflora quadrangularis Mill.), and Sapotaceae [mamey sapote, Pouteria sapota (Jacq.) H. E. Moore & Steam]. In the family Rutaceae the economically important genus Citrus has been reported and until recently considered a host for this fruit fly. In this study, we reviewed the taxonomy of A. obliqua, tested specific chemicals that may inhibit oviposition, compared egg-to-adult survival of A. obliqua on preferred hosts and on grapefruit (Citrus X paradisi Macfad.), and measured fruit tissue-specific developmental rates of A. obliqua and the known citrus breeding Mexican fruit fly, Anastrepha ludens (Loew) (Diptera: Tephritidae), from egg to pupae. Our literature review shows much confusion concerning the taxonomy of this and related Anastrepha species, including synonymies and confusion with other species. The deterrent effect of the highest concentration of flavonoids for oviposition, although significant, was not absolute. Experiments carried out under laboratory conditions showed 15-40 times greater survival of A. ludens (whose preferred hosts include Rutaceae) on grapefruit compared with A. obliqua for both tree attached and harvested fruit. Experiments of survival of developing stages over time showed that the two species oviposit into different tissues in the fruit, and mortality is much higher for the West Indian fruit fly in the flavedo and albedo of the fruit compared with the Mexican fruit fly.

  2. Susceptibility of 15 mango (Sapindales: Anacardiaceae) cultivars to the attack by Anastrepha ludens and Anastrepha obliqua (Diptera: Tephritidae) and the role of underdeveloped fruit as pest reservoirs: management implications.

    Science.gov (United States)

    Aluja, M; Arredondo, J; Díaz-Fleischer, F; Birke, A; Rull, J; Niogret, J; Epsky, N

    2014-02-01

    We evaluated the susceptibility of 15 mango cultivars to the attack of Anastrepha ludens (Loew) and Anastrepha obliqua (Macquart) (Diptera: Tephritidae), the main tephritid pests of this crop in Mexico. In a field experiment, bagged fruit-bearing branches were exposed to gravid females of both fly species. Infestation rates, developmental time, adult eclosion, and F1 adult longevity, fecundity, and fertility were recorded, ranking cultivars in terms of susceptibility to fly attack and development. We also compared the volatile profile in selected resistant and susceptible cultivars in search of possible correlations. In a second experiment, clutch size for A. ludens was determined in each cultivar. Infestation rates, developmental time, and F1 demographic parameters varied sharply among cultivars and between fly species for bagged fruit. Cultivars 'Vishi,' '74-82,' and 'Brooks' were most susceptible to A. ludens infestation while "Tommy,' 'Sensation,' and 'Ataulfo "niño"' (parthenocarpic fruit) were most susceptible to A. obliqua infestation. 'Edward,' 'Kent,' 'Brooks late,' 'Palmer, and 'Ataulfo' exhibited tolerance to attack of both fly species. Fruit of susceptible and resistant cultivars exhibited unique volatile profiles. Fly development and F1 adult demographic parameters varied significantly among cultivars. A. ludens females laid larger clutches in larger and harder fruit. We highlight the important role of Ataulfo "niño" as pest reservoir if fruit is left unharvested on trees. We discuss the possible use of highly resistant cultivars as trap crops or egg sinks.

  3. Two-and Three-Dimensional Chloride Ingress into Fly Ash Concrete

    Institute of Scientific and Technical Information of China (English)

    ZHANG Yunsheng; SUN Wei; CHEN Shudong; GUO Fei

    2011-01-01

    2D,3D chloride ion concentration at the edge and comer zones were systematically investigated for fly ash concretes made with different cement replacement percentage by fly ash (0%,10%,20%,40%,60%),water to binder ratios (0.3,0.35,0.4),and curing ages (28 d,90 d).An interaction effect caused by 2D and 3D diffusion could obviously be observed through the comparison with 1D testing results.In order to quantify the interaction effect,2D and 3D diffusion interaction coefficients was proposed in this paper.Finally,the changes of 2D and 3D interaction coefficients with the change in the free chloride ion concentration were given.The above research provide an insight into chloride ion attack on the edge and comer reinforcing bars of concrete structures in the field of civil engineering.

  4. Predictor-corrector entry guidance with waypoint and no-fly zone constraints

    Science.gov (United States)

    Wang, Tao; Zhang, Hongbo; Tang, Guojian

    2017-09-01

    With the requirement of the future entry mission, the guidance method not only needs to be robust, reliable and autonomous, but also needs to have the ability to meet the constraints of no-fly zone and waypoint. The paper proposes a predictor-corrector entry guidance method that satisfies the constraints of no-fly zone and waypoint. The trajectory prediction is realized by numerical integration and the corrector is based on fuzzy logic. No-fly zones and waypoints are transformed to a series of reference points. For each reference point, one bank angle reversal is designed. The attack angle, the magnitude and reversal times of bank angle are cooperatively corrected to meet all constraints. The proposed method can guide longitudinal motion and lateral motion synergistically, so it is more robust and flexible. Only one bank angle reversal is needed for a no-fly zone or waypoint, so the reversal times are few. Moreover, without iteration, only a single trajectory prediction is required in a correction cycle, which is favorable for on-board calculation.

  5. Utilisation of zeolitised coal fly ash as immobilising agent of a metallurgical waste

    Energy Technology Data Exchange (ETDEWEB)

    Fernandez-Pereira, C.; Galiano, Y.L.; Rodriguez-Pinero, M.A.; Vale, J.; Querol, X. [University of Sevilla, Seville (Spain). Dept. Ingenieria Quimica y Ambiental, Escuela Superior Ingenieros Industriales

    2002-07-01

    Partially zeolitised coal fly ash from a Spanish power station has been studied as the immobilising agent of an arc furnace dust waste (s-WA). The hazardous metals normally found in this kind of waste are lead, cadmium, and chromium. In addition, the dust usually has a high zinc content resulting from the use of galvanised scrap. Because of its heavy metal content, s-WA is classified as hazardous waste, according to Spanish regulations. Different zeolitisation procedures, depending on the treatment of the fly ash with NaOH and KOH alkaline solutions, using reflux heating and different times of attack were tested. The zeolitised products were studied using XRD in order to characterise the solid phases produced. The solidification/stabilisation (S/S) trials of s-WA were carried out using the zeolitised ashes, as well as the original coal fly ash, in mixtures containing 20% (w/w) of ordinary Portland cement. To evaluate the efficiency of the immobilisation process, some specific criteria were defined, with regard to some physical (compressive strength) and chemical (pH and metal concentrations in TCLP leachates) characteristics of the S/S solids. Finally, comparisons among the stabilising mixtures were made and the role of the zeolitisation of fly ash in the S/S process was evaluated.

  6. Susceptibility of low-chill blueberry cultivars to oriental fruit fly, mediterranean fruit fly, and melon fly (Diptera: Tephritidae)

    Science.gov (United States)

    Forced infestation studies were conducted to determine if fruits of southern highbush blueberries (Vaccinium corymbosum L. hybrids) are hosts for three invasive tephritid fruit flies. Fruits of 17 blueberry cultivars were exposed to gravid female flies of Bactrocera dorsalis (Hendel) (oriental frui...

  7. A graph based system for multi-stage attacks recognition

    Institute of Scientific and Technical Information of China (English)

    Safaa O. Al-Mamory; Zhai Jianhong; Zhang Hongli

    2008-01-01

    Building attack scenario is one of the most important aspects in network security. This paper proposed a system which collects intrusion alerts, clusters them as sub-attacks using alerts abstraction, aggregates the similar sub-attacks, and then correlates and generates correlation graphs. The scenarios were represented by alert classes instead of alerts themselves so as to reduce the required rules and have the ability of detecting new variations of attacks. The proposed system is capable of passing some of the missed attacks. To evaluate system effectiveness, it was tested with different datasets which contain multi-step attacks. Compressed and easily understandable correlation graphs which reflect attack scenarios were generated. The proposed system can correlate related alerts, uncover the attack strategies, and detect new variations of attacks.

  8. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  9. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They represent in an intuitive, graphical way the interaction between an attacker and a defender who compete in order to achieve conflicting objectives. We propose a novel framework for the formal...... analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack......-defence trees to two-player stochastic games, and then employ probabilistic model checking techniques to formally analyse these models. This provides a means to both verify formally specified security properties of the attack-defence scenarios and, dually, to synthesise strategies for attackers or defenders...

  10. Attack Classification Schema for Smart City WSNs.

    Science.gov (United States)

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2017-04-05

    Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  11. Intrusion-Tolerant Replication under Attack

    Science.gov (United States)

    Kirsch, Jonathan

    2010-01-01

    Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…

  12. Shark Attack! Sinking Your Teeth into Anatomy.

    Science.gov (United States)

    House, Herbert

    2002-01-01

    Presents a real life shark attack story and studies arm reattachment surgery to teach human anatomy. Discusses how knowledge of anatomy can be put to use in the real world and how the arm functions. Includes teaching notes and suggestions for classroom management. (YDS)

  13. Why Does Asthma Attack Severely at Night?

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    @@ The rhythmic changes of human physiological activities by day and at night may cause regular change of the patient's condition within one day. The following is the explanation with the theory of Chinese medicine for the reason why asthma attacks severely at night.

  14. Attack Classification Schema for Smart City WSNs

    Directory of Open Access Journals (Sweden)

    Victor Garcia-Font

    2017-04-01

    Full Text Available Urban areas around the world are populating their streets with wireless sensor networks (WSNs in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  15. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the…

  16. Armed Deterrence: Countering Soft Target Attacks

    Science.gov (United States)

    2016-02-06

    increasing trend and the carnage 4 that IS sympathizers can unleash. This coordinated attack on a concert hall, a soccer stadium, and restaurant...have campus police departments located on the university grounds, a preferred option would be to utilize the police department’s secured facility to

  17. Social Engineering Attack Detection Model: SEADMv2

    CSIR Research Space (South Africa)

    Mouton, F

    2015-10-01

    Full Text Available link in the security chain. A social engineering attack targets this weakness by using various manipulation techniques to elicit individuals to perform sensitive requests. The field of social engineering is still in its infancy as far as formal...

  18. Strengthening Crypto-1 Cipher Against Algebraic Attacks

    Directory of Open Access Journals (Sweden)

    Farah Afianti

    2015-08-01

    Full Text Available In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. In order to strengthen Crypto-1 against SAT solver attacks, a modification of the feedback function with better cryptographic properties is proposed. It applies a primitive polynomial companion matrix. SAT solvers cannot directly attack the feedback shift register that uses the modified Boolean feedback function, the register has to be split into smaller groups. Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function. In addition, another modified Crypto-1, using the modified feedback function and a modified filter function, had the lowest percentage of revealed variables. It can be concluded that the security strength and performance of the modified Crypto-1 using the modified feedback function and the modified filter function are better than those of the original Crypto-1.

  19. Rhode Island School Terrorist Attack Preparedness

    Science.gov (United States)

    Dube, Michael W. M.

    2012-01-01

    This study examined the state of safety and terrorist attack preparedness in Rhode Island Schools as determined by Rhode Island school leader perceptions. The study is descriptive in nature as it gathers data to describe a particular event or situation. Using a researcher generated survey based on terrorist preparedness guidelines and suggestions…

  20. The diagnosis of transient ischemic attacks

    NARCIS (Netherlands)

    P.J. Koudstaal (Peter Jan)

    1989-01-01

    textabstractThe diagnosis of transient ischemic attack (TIA) is fraught with difficulty, since the diagnosis rests entirely upon the history of the patient's symptoms and the neurologist's skill in questioning the patient. The aim of this thesis is to investigate various measures to improve the reli

  1. Persistent cognitive impairment after transient ischemic attack

    NARCIS (Netherlands)

    Rooij, F.G. van; Schaapsmeerders, P.; Maaijwee, N.A.; Duijnhoven, D.A. van; Leeuw, F.E. de; Kessels, R.P.; Dijk, E.J. van

    2014-01-01

    BACKGROUND AND PURPOSE: By definition, the symptoms of a transient ischemic attack (TIA) subside completely within 24 hours. Imaging studies show signs of persistent ischemic tissue damage in a substantial amount of patients with TIA. Cerebral infarction can cause permanent cognitive impairment. Whe

  2. Persistent Cognitive Impairment After Transient Ischemic Attack

    NARCIS (Netherlands)

    Rooij, F.G. van; Schaapsmeerders, P.; Maaijwee, N.A.M.M.; Duijnhoven, D.A. van; de Leeuw, F.E.; Kessels, R.P.C.; Dijk, E.J. van

    2014-01-01

    Background and Purpose—By definition, the symptoms of a transient ischemic attack (TIA) subside completely within 24 hours. Imaging studies show signs of persistent ischemic tissue damage in a substantial amount of patients with TIA. Cerebral infarction can cause permanent cognitive impairment. Whet

  3. Plant defences against herbivore and insect attack

    Science.gov (United States)

    Plants deploy a number of defences against attack by insects and other herbivores. Direct defence is conferred by plant products and structures that deter or kill the herbivores. Chemical toxins and deterrents vary widely among plant species, and some typical toxins include alkaloids, terpenoids, st...

  4. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the…

  5. CASE STUDY: DIELDRIN ATTACK IN DALYAN LAGOON

    Science.gov (United States)

    During the first two weeks of December 2005, NATO sponsored an Advanced Study Institute (ASI) in Istanbul, Turkey. Part of this ASI involved a case study of a terrorist attack, where a chemical was assumed to be dumped into Sulunger Lake in Turkey. This chapter documents the re...

  6. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that

  7. Self hardening property of Botswana fly ash | Sahu | Botswana ...

    African Journals Online (AJOL)

    Self hardening property of Botswana fly ash. ... In the present investigation, an effort has been made to study the self hardening property of Botswana fly ash by ... This will encourage the use of fly ash economically as a construction material.

  8. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim.

  9. A fly larva (Syrphidae: Ocyptamus that preys on adult flies

    Directory of Open Access Journals (Sweden)

    Onanchi Ureña

    2010-12-01

    Full Text Available Predatory syrphid larvae feed on relatively immobile prey, but here we report the first case (as far as we are aware of obligatory predation on very mobile prey. Larvae of an undescribed species of Ocyptamus (Diptera: Syrphidae were found in whitefly (Hemiptera: Aleyrodidae aggregations on the undersides of citrus leaves. However, instead of preying on the whitefly nymphs (as would be expected, the larvae preyed on adult flies (Diptera that were attracted to the honeydew. In the laboratory, larvae captured significantly more flies on whitefly infested leaves than on washed leaves, and generally abandoned leaves that lacked whiteflies. Most cases of successful prey capture involved flies that probed the anterior part of the larva’s body with its proboscis (as if it were honeydew. The syrphid larva lashed out at the fly and entangled it in sticky oral secretion. The prey did not recover when they were removed from the larva, suggesting that this new predatory species also employs venom to subdue its prey. Although the larvae consumed some honeydew, they were unable to complete their development on this diet. Two parasitoids were reared from Ocyptamus puparia, Proaspicera sp. (Hymenoptera: Figitidae and Paracarotomus sp. (Hymenoptera: Pteromalidae, both of which are endoparasitic koinobionts. Rev. Biol. Trop. 58 (4: 1157-1163. Epub 2010 December 01.Las larvas depredadoras de Syrphidae se alimentan de presas relativamente inmóviles, pero aquí reportamos el primer caso (hasta ahora conocido de la depredación obligatoria en presas muy móviles. Se encontraron las larvas de una especie no descrita de Ocyptamus (Diptera: Syrphidae juntas con ninfas de mosca blanca (Hemiptera: Aleyrodidae en el envés de las hojas de cítricos. Sin embargo, en vez de alimentarse de las ninfas de mosca blanca (como debería esperarse, las larvas se alimentaron de moscas adultas (Diptera que fueron atraídas a las excreciones azucaradas de la mosca blanca. En el

  10. Requirements for satisfactory flying qualities of airplanes

    Science.gov (United States)

    Gilruth, R R

    1943-01-01

    Report discusses the results of an analysis of available data to determine what measured characteristics are significant in defining satisfactory flying qualities, what characteristics are reasonable to require of an airplane, and what influence the various design features have on the observed flying qualities.

  11. MODAL CONTROL OF PILOTLESS FLYING MACHINE

    Directory of Open Access Journals (Sweden)

    V. A. Antanevich

    2010-01-01

    Full Text Available The paper considers a problem on synthesis of lateral movement control algorithms in a pilotless flying machine which is made on the basis of a modal control method providing a required root arrangement of a characteristic closed control system polynom. Results of the modeling at stabilization of a lateral pilotless flying machine co-ordinate are presented in the paper.

  12. Flying Probe Tester: Architecture, Principle and Implementation

    Institute of Scientific and Technical Information of China (English)

    Fu,Xu; Fang,Kangling; Chen,Guoqing

    2005-01-01

    This paper introduces the flying probe tester, which is a testing device for PCB. The architecture and principle of flying probe tester are firstly introduced. Then the implementation of hardware and software is illuminated briefly. Finally, the optimizing method for the probe's moving path is researched based on the traveling salesman problem.

  13. Low back pain and low level flying

    NARCIS (Netherlands)

    J.C.F.M. Aghina

    1989-01-01

    textabstractLow level flying is a very good tactical possibility to carry out a mission unseen by a hostile radarsystem. Nowadays, Western Europe in general and the Federal Republic of Germany in particular, decreased . the permissions to low level flying in assigned regions. That's why the

  14. Testing for Mutagens Using Fruit Flies.

    Science.gov (United States)

    Liebl, Eric C.

    1998-01-01

    Describes a laboratory employed in undergraduate teaching that uses fruit flies to test student-selected compounds for their ability to cause mutations. Requires no prior experience with fruit flies, incorporates a student design component, and employs both rigorous controls and statistical analyses. (DDR)

  15. Catch Composition of Tsetse Flies (Glossina: Glossinidae

    Directory of Open Access Journals (Sweden)

    K. E. Okoh

    2011-01-01

    Full Text Available Problem statement: A study to determine the composition of tsetse flies species was conducted between January and December, 2007 in Kamuku National Park, Nigeria, using Biconical and Nitse traps. Tsetse flies were trapped along gallery forest in five streams for two trapping days and were collected daily. Approach: All tsetse flies caught were identified to species level, sexed, separated into teneral and non-teneral, hunger staged and Mean Hunger Stage computed. Fly density were calculated, the age structure examined using wing fray techniques for males and ovarian technique for females; the reproductive status of female flies were assessed. Two species of tsetse flies (Glossina palpalis palpalis robineau-desvoidy and Glossina tachinoides Westwood were caught in total of five hundred and two (502 flies. Out of these, 309(61.6% Glossina tachinoides and 193(38.4% G. palpalis were caught. Male catches (309, 61.6% were significantly (P Results: The estimated mean age for males was 11 days and females were 8 days. The insemination rate of 93.8% generally was high, G. tachinoides recorded 95.5% more than G. palpalis of 91.6%. Whereas parity rate (25.8% was low; G. palpalis was 37.4% while G. tachinoides parity rate is 17.2%. Conclusion: The study shows that two species of tsetse flies abound in the park although at low densities their presence may bear semblance to Trypanosomiasis and its impact to ecotourism.

  16. Physicochemical characterization of Spanish fly ashes

    Energy Technology Data Exchange (ETDEWEB)

    Querol, X.; Umana, J.C.; Alastuey, A.; Bertrana, C.; Lopez-Soler, A.; Plana, F.

    1999-12-01

    This article summarizes the results obtained from the physical, chemical, and mineralogical characterization of 14 fly ash samples. Major features that influence the utilization of each fly ash for zeolite synthesis are evidenced, and several fly ash types were selected as potential high-quality starting material for zeolite synthesis and ceramic applications. The main parameters influencing this selection were relatively small grain size; high Al and Si contents; high glass content; low CaO, S, and Fe contents; and relatively low heavy metal concentration. The Compostilla and Cou He fly ashes have high potential applications because of the low content of major impurities (such as Ca, Fe, and S) and the low content of soluble hazardous elements. The Espiel, Escucha, Los Barrios, As Pontes, Soto de Ribera, Meirama, Narcea, and Teruel fly ashes have important application potential, but this potential is slightly limited by the intermediate content of nonreactive impurities, such as Fe and Ca. The La Robla fly ash is of moderate interest, since the relatively high Ca and Fe oxide contents may reduce its potential applications. Finally, the Puertollano fly ash also has limited application because of the very high concentration of some heavy metals such as As, Cd, Ge, Hg, Pb, and Zn. From a mineralogical point of view, the Compostilla, Espiel, and Soto de Ribera fly ashes show the highest aluminum-silicate glass content and, consequently, the highest industrial application potential.

  17. Physiochemical characterization of Spanish fly ashes

    Energy Technology Data Exchange (ETDEWEB)

    Querol, X.; Umana, J.C.; Alastuey, A.; Bertrana, C.; Lopez Soler, A.; Plana, F.

    1999-12-01

    This article summarizes the results obtained from the physical, chemical, and mineralogical characterization of 14 fly ash samples. Major features that influence the utilization of each fly ash for zeolite synthesis are evidenced, and several fly ash types were selected as potential high-quality starting material for zeolite synthesis and ceramic applications. The main parameters influencing this selection were relatively small grain size; high Al and Si contents; high glass content; low CaO, S, and Fe contents; and relatively low heavy metal concentration. The Compostilla and Dou He fly ashes have high potential applications because of the low content of major impurities (such as Ca, Fe, and S) and the low content of soluble hazardous elements. The Espiel, Escucha, Los Barrios, As Pontes, Soto de Ribera, Meirama, Narcea, and Teruel fly ashes have important application potential, but this potential is slightly limited by the intermediate content of nonreactive impurities, such as Fe and Ca. The La Robla fly ash is of moderate interest, since the relatively high Ca and Fe oxide contents may reduce its potential applications. Finally, the Puertollano fly ash also has limited application because of the very high concentration of some heavy metals such as As, Cd, Ge, Hg, Pb, and Zn. From a mineralogical point of view, the Compostilla, Espiel, and Soto de Ribera fly ashes show the highest aluminum-silicate glass content and, consequently, the highest industrial application potential. (author)

  18. Low back pain and low level flying

    NARCIS (Netherlands)

    J.C.F.M. Aghina

    1989-01-01

    textabstractLow level flying is a very good tactical possibility to carry out a mission unseen by a hostile radarsystem. Nowadays, Western Europe in general and the Federal Republic of Germany in particular, decreased . the permissions to low level flying in assigned regions. That's why the Royal Ne

  19. Analysis of the SYN Flood DoS Attack

    Directory of Open Access Journals (Sweden)

    Mitko Bogdanoski

    2013-06-01

    Full Text Available The paper analyzes systems vulnerability targeted by TCP (Transmission Control Protocol segments when SYN flag is ON, which gives space for a DoS (Denial of Service attack called SYN flooding attack or more often referred as a SYN flood attack. The effects of this type of attack are analyzed and presented in OPNET simulation environment. Furthermore, the paper presents two anomaly detection algorithms as an effective mechanism against this type of attack. Finally, practical approaches against SYN flood attack for Linux and Windows environment which are followed by are shown.

  20. A Survey of Mobile Ad Hoc Network Attacks

    Directory of Open Access Journals (Sweden)

    PRADIP M. JAWANDHIYA,

    2010-09-01

    Full Text Available Security is an essential requirement in mobile ad hoc network (MANETs. Compared to wired networks, MANETs are more vulnerable to security attacks due to the lack of a trusted centralized authority and limited resources. Attacks on ad hoc networks can be classified as passive and active attacks, depending on whether the normal operation of the network is disrupted or not. In this paper, we are describing the all prominent attacks described in literature in a consistent manner to provide a concise comparison on attack types. To the best of our knowledge, this is the first paper that studies all the existing attacks on MANETs.

  1. Construction procedures using self hardening fly ash

    Science.gov (United States)

    Thornton, S. I.; Parker, D. G.

    1980-07-01

    Fly ash produced in Arkansas from burning Wyoming low sulfur coal is self-hardening and can be effective as a soil stabilizing agent for clays and sands. The strength of soil-self hardening fly ash develops rapidly when compacted immediately after mixing. Seven day unconfined compressive strengths up to 1800 psi were obtained from 20% fly ash and 80% sand mixtures. A time delay between mixing the fly ash with the soil and compaction of the mixture reduced the strength. With two hours delay, over a third of the strength was lost and with four hours delay, the loss was over half. Gypsum and some commercial concrete retarders were effective in reducing the detrimental effect of delayed compaction. Adequate mixing of the soil and fly ash and rapid compaction of the mixtures were found to be important parameters in field construction of stabilized bases.

  2. TrackFly: virtual reality for a behavioral system analysis in free-flying fruit flies.

    Science.gov (United States)

    Fry, Steven N; Rohrseitz, Nicola; Straw, Andrew D; Dickinson, Michael H

    2008-06-15

    Modern neuroscience and the interest in biomimetic control design demand increasingly sophisticated experimental techniques that can be applied in freely moving animals under realistic behavioral conditions. To explore sensorimotor flight control mechanisms in free-flying fruit flies (Drosophila melanogaster), we equipped a wind tunnel with a Virtual Reality (VR) display system based on standard digital hardware and a 3D path tracking system. We demonstrate the experimental power of this approach by example of a 'one-parameter open loop' testing paradigm. It provided (1) a straightforward measure of transient responses in presence of open loop visual stimulation; (2) high data throughput and standardized measurement conditions from process automation; and (3) simplified data analysis due to well-defined testing conditions. Being based on standard hardware and software techniques, our methods provide an affordable, easy to replicate and general solution for a broad range of behavioral applications in freely moving animals. Particular relevance for advanced behavioral research tools originates from the need to perform detailed behavioral analyses in genetically modified organisms and animal models for disease research.

  3. Predicting fruit fly's sensing rate with insect flight simulations

    National Research Council Canada - National Science Library

    Song Chang; Z. Jane Wang

    2014-01-01

    .... Interpreting our findings together with experimental results on fruit flies' reaction time and sensory motor reflexes, we conjecture that fruit flies sense their kinematic states every wing beat...

  4. Biomass fly ash in concrete: SEM, EDX and ESEM analysis

    Energy Technology Data Exchange (ETDEWEB)

    Shuangzhen Wang; Larry Baxter; Fernando Fonseca [Brigham Young University, Provo, UT (USA). Department of Chemical Engineering

    2008-03-15

    This document summarizes microscopy study of concrete prepared from cement and fly ash (25% fly ash and 75% cement by weight), which covers coal fly ash and biomass fly ash. All the fly ash concrete has the statistical equal strength from one day to one year after mix. Scanning electron microscopy (SEM), Energy dispersive X-ray (EDX) and environmental scanning electron microscopy (ESEM) analysis show that both coal and biomass fly ash particles undergo significant changes of morphology and chemical compositions in concrete due to pozzolanic reaction, although biomass fly ash differs substantially from coal fly ash in its fuel resources. 8 refs., 17 figs., 1 tab.

  5. Electrodialytic removal of heavy metals from fly ashes

    DEFF Research Database (Denmark)

    Pedersen, Anne Juul

    2002-01-01

    The aim of the Ph.D. work was to develop the electrodialytic remediation method for removal of heavy metals from fly ashes. The work was focused on two types of fly ashes: fly ashes from wood combustion and fly ashes from municipal solid waste incineration.......The aim of the Ph.D. work was to develop the electrodialytic remediation method for removal of heavy metals from fly ashes. The work was focused on two types of fly ashes: fly ashes from wood combustion and fly ashes from municipal solid waste incineration....

  6. Alkaline cement mortars. Chemical resistance to sulfate and seawater attack

    Directory of Open Access Journals (Sweden)

    Puertas, F.

    2002-09-01

    Full Text Available The durability and chemical resistance of alkali activated slag and fly ash/slag mortars in contact with sulfates and seawater media have been studied. Two methods were used in the evaluation of such durability: Kock-Steinegger and ASTM C1012. A mineralogical and a microstructural characterization of mortars were done at different ages of their conservation in aggressive media through XRD, SEM/ EDX and mercury porosimetry. Results showed a high durability of activated cement mortars in sulfates and seawater media. NaOH activated mortars are the most sensitive to environment attack with formation of expansive products as gypsum and ettringite, although in very low proportion.

    Se ha estudiado la estabilidad química en medios sulfáticos y de agua de mar de morteros de escorias activadas alcalinamente y morteros de mezclas de escoria y cenizas volantes activadas alcalinamente. Se han empleado dos métodos para evaluar dicha estabilidad: Kock-Steinegger y la norma ASTM C1012. Se ha realizado una caracterización mineralógica y micro estructural de los morteros (a diferentes edades de permanencia en los medios agresivos a través de DRX, SEM/EDX y porosimetría de mercurio. Los resultados obtenidos han demostrado la elevada durabilidad de todos los morteros de cementos activados estudiados frente a la agresividad de los sulfatos y del agua de mar Los morteros de escoria activada con NaOH son los más susceptibles al ataque por esos medios, conformación de productos expansivos como el yeso y la etringita, aunque en proporciones muy bajas.

  7. Trapping tsetse flies on water

    Directory of Open Access Journals (Sweden)

    Laveissière C.

    2011-05-01

    Full Text Available Riverine tsetse flies such as Glossina palpalis gambiensis and G. tachinoides are the vectors of human and animal trypanosomoses in West Africa. Despite intimate links between tsetse and water, to our knowledge there has never been any attempt to design trapping devices that would catch tsetse on water. In mangrove (Guinea one challenging issue is the tide, because height above the ground for a trap is a key factor affecting tsetse catches. The trap was mounted on the remains of an old wooden dugout, and attached with rope to nearby branches, thereby allowing it to rise and fall with the tide. Catches showed a very high density of 93.9 flies/”water-trap”/day, which was significantly higher (p < 0.05 than all the catches from other habitats where the classical trap had been used. In savannah, on the Comoe river of South Burkina Faso, the biconical trap was mounted on a small wooden raft anchored to a stone, and catches were compared with the classical biconical trap put on the shores. G. p. gambiensis and G. tachinoides densities were not significantly different from those from the classical biconical one. The adaptations described here have allowed to efficiently catch tsetse on the water, which to our knowledge is reported here for the first time. This represents a great progress and opens new opportunities to undertake studies on the vectors of trypanosomoses in mangrove areas of Guinea, which are currently the areas showing the highest prevalences of sleeping sickness in West Africa. It also has huge potential for tsetse control using insecticide impregnated traps in savannah areas where traps become less efficient in rainy season. The Guinean National control programme has already expressed its willingness to use such modified traps in its control campaigns in Guinea, as has the national PATTEC programme in Burkina Faso during rainy season.

  8. Cooperative Electronic Attack for Groups of Unmanned Air Vehicles based on Multi-agent Simulation and Evaluation

    Directory of Open Access Journals (Sweden)

    Yee Ming Chen

    2012-03-01

    Full Text Available In this paper, the issue of path planning is addressed for unmanned air vehicles (UAVs cooperative joint-forces electronic attack operating in a hostile environment. Specifically, the objective is to plan path to a target location in a way that minimizes exposure to threats while keeping fuel usage at acceptable levels. We consider a scenario where a group of UAVs flies in a close formation and cooperates in their use of jamming resources to prevent being tracked by Surface-to-Air Missile (SAM tracking radars. The main goal of this research effort is develop cooperating UAVs within multi-agent simulation environment. Simulations were generated to test the path planning and control strategies given UAVs/SAM tracking radar network scenarios, and overall UAVs cooperative electronic attack performance in each simulation was analyzed.

  9. Natural Parasitism in Fruit Fly (Diptera: Tephritidae) Populations in Disturbed Areas Adjacent to Commercial Mango Orchards in Chiapas and Veracruz, Mexico.

    Science.gov (United States)

    Montoya, Pablo; Ayala, Amanda; López, Patricia; Cancino, Jorge; Cabrera, Héctor; Cruz, Jassmin; Martinez, Ana Mabel; Figueroa, Isaac; Liedo, Pablo

    2016-04-01

    To determine the natural parasitism in fruit fly populations in disturbed areas adjacent to commercial mango orchards in the states of Chiapas and Veracruz, Mexico, we recorded over one year the fruit fly-host associations, fly infestation, and parasitism rates in backyard orchards and patches of native vegetation. We also investigated the relationship between fruit size, level of larval infestation, and percent of parasitism, and attempted to determine the presence of superparasitism. The most recurrent species in trap catches was Anastrepha obliqua (Macquart), followed by Anastrepha ludens (Loew), in both study zones. The fruit infestation rates were higher in Chiapas than in Veracruz, with A. obliqua again being the most conspicuous species emerging from collected fruits. The diversity of parasitoids species attacking fruit fly larvae was greater in Chiapas, with a predominance of Doryctobracon areolatus (Szépligeti) in both sites, although the exotic Diachasmimorpha longicaudata (Ashmead) was well established in Chiapas. Fruit size was positively correlated with the number of larvae per fruit, but this relationship was not observed in the level of parasitism. The number of oviposition scars was not related to the number of immature parasitoids inside the pupa of D. areolatus emerging from plum fruits. Mass releases of Di. longicaudata seem not to affect the presence or prevalence of the native species. Our findings open new research scenarios on the role and impact of native parasitoid species attacking Anastrepha flies that can contribute to the development of sound strategies for using these species in projects for augmentative biological control.

  10. Understanding how components of organisations contribute to attacks

    NARCIS (Netherlands)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors is difficul

  11. An Attack Modeling Based on Colored Petri Net

    Institute of Scientific and Technical Information of China (English)

    ZHOU Shijie; QIN Zhiguang; ZHANG Feng; LIU Jinde

    2004-01-01

    A color petri net (CPN) based attack modeling approach is addressed.Compared with graph-based modeling,CPN based attack model is fiexible enough to model Intemet intrusions,because of their static and dynamic features.The processes and rules of building CPN based attack model from attack tree are also presented.In order to evaluate the risk of intrusion,some cost elements are added to CPN based attack modeling.This extended model is useful in intrusion detection and risk evaluation.Experiences show that it is easy to exploit CPN based attack modeling approach to provide the controlling functions,such as intrusion response and intrusion defense.A case study given in this paper shows that CPN based attack model has many unique characters which attack tree model hasn't.

  12. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  13. New attacks on Wi-Fi Protected Setup

    Directory of Open Access Journals (Sweden)

    Hamed Mohtadi

    2015-09-01

    Full Text Available Wi-Fi Protected Setup (WPS is a network security standard that is used to secure networks in home and office, introduced in 2006 by the Wi-Fi Alliance. It provides easier configuration setup and is used in almost all recent Wi-Fi devices. In this paper we propose two attacks on this standard. The first attack is an offline brute force attack that uses imbalance on registration protocol. This attack needs user action, but it is more efficient than previous attacks. The second attack uses weaknesses in the implementation of WPS and provides an improved evil twin attack. This attack shows that even by completely disabling the WPS on the routers, all vulnerabilities are not covered.

  14. Aspirin to Prevent a First Heart Attack or Stroke

    Science.gov (United States)

    ... Aspirin to Prevent a First Heart Attack or Stroke Also known as aspirin primary prevention. Aspirin is ... taking aspirin to prevent another heart attack or stroke? The information discussed in Who may benefit? only ...

  15. Robustness of Complex Networks against Attacks Guided by Damage

    CERN Document Server

    Wang, Hui; Xu, Xiaomin; Xiao, Yanghua; Wang, Wei

    2011-01-01

    Extensive researches have been dedicated to investigating the performance of real networks and synthetic networks against random failures or intentional attack guided by degree (degree attack). Degree is one of straightforward measures to characterize the vitality of a vertex in maintaining the integrity of the network but not the only one. Damage, the decrease of the largest component size that was caused by the removal of a vertex, intuitively is a more destructive guide for intentional attack on networks since the network functionality is usually measured by the largest component size. However, it is surprising to find that little is known about behaviors of real networks or synthetic networks against intentional attack guided by damage (damage attack), in which adversaries always choose the vertex with the largest damage to attack. In this article, we dedicate our efforts to understanding damage attack and behaviors of real networks as well as synthetic networks against this attack. To this end, existing ...

  16. Flooding attack and defence in Ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    Yi Ping; Hou Yafei; Zhong Yiping; Zhang Shiyong; Dai Zhoulin

    2006-01-01

    Mobile ad hoc networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this paper, we present a new DOS attack and its defense in ad hoc networks. The new DOS attack, called Ad hoc Flooding Attack(AHFA), is that intruder broadcasts mass Route Request packets to exhaust the communication bandwidth and node resource so that the valid communication can not be kept. After analyzed Ad hoc Flooding Attack, we develop Flooding Attack Prevention (FAP), a generic defense against the Ad hoc Flooding Attack. When the intruder broadcasts exceeding packets of Route Request, the immediate neighbors of the intruder record the rate of Route Request. Once the threshold is exceeded, nodes deny any future request packets from the intruder. The results of our implementation show FAP can prevent the Ad hoc Flooding attack efficiently.

  17. Modelling Social-Technical Attacks with Timed Automata

    DEFF Research Database (Denmark)

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof

    2015-01-01

    in our model and perform analysis and simulation of both model and attack, revealing details about the specific interaction between attacker and victim. Using timed automata also allows for intuitive modelling of systems, in which quantities like time and cost can be easily added and analysed.......Attacks on a system often exploit vulnerabilities that arise from human behaviour or other human activity. Attacks of this type, so-called socio-technical attacks, cover everything from social engineering to insider attacks, and they can have a devastating impact on an unprepared organisation....... In this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible attacks...

  18. Comparative Analysis of Routing Attacks in Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Bipul Syam Purkayastha

    2012-03-01

    Full Text Available In the mobile ad hoc networks the major role is played by the routing protocols in order to route the data from one mobile node to another mobile node. But in such mobile networks, routing protocols are vulnerable to various kinds of security attacks such as blackhole node attacks. The routing protocols of MANET are unprotected and hence resulted into the network with the malicious mobile nodes in the network. These malicious nodes in the network are basically acts as attacks in the network. In this paper, we modify the existing DSR protocol with the functionality of attacks detection without affecting overall performance of the network. Also, we are considering the various attacks on mobile ad hoc network called blackhole attack, flooding attack and show the comparative analysis of these attacks using network simulator ns-2.

  19. Understanding How Components of Organisations Contribute to Attacks

    DEFF Research Database (Denmark)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors is diffi......Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors...... is difficult. Recently, system models have been used for automatically identifying possible attacks on the modelled organisation. The generated attacks consider all three layers, making the contribution of building infrastructure, computer infrastructure, and humans (insiders and outsiders) explicit. However...... components quickly results in a large quantity of interrelations, which are hard to grasp. In this work we present several approaches for visualising attributes of attacks such as likelihood of success, impact, and required time or skill level. The resulting visualisations provide a link between attacks...

  20. Treatment of fly ash for use in concrete

    Science.gov (United States)

    Boxley, Chett; Akash, Akash; Zhao, Qiang

    2013-01-08

    A process for treating fly ash to render it highly usable as a concrete additive. A quantity of fly ash is obtained that contains carbon and which is considered unusable fly ash for concrete based upon foam index testing. The fly ash is mixed with an activator solution sufficient to initiate a geopolymerization reaction and for a geopolymerized fly ash. The geopolymerized fly ash is granulated. The geopolymerized fly ash is considered usable fly ash for concrete according to foam index testing. The geopolymerized fly ash may have a foam index less than 35% of the foam index of the untreated fly ash, and in some cases less than 10% of the foam index of the untreated fly ash. The activator solution may contain an alkali metal hydroxide, carbonate, silicate, aluminate, or mixtures thereof.

  1. Treatment of fly ash for use in concrete

    Science.gov (United States)

    Boxley, Chett; Akash, Akash; Zhao, Qiang

    2012-05-08

    A process for treating fly ash to render it highly usable as a concrete additive. A quantity of fly ash is obtained that contains carbon and which is considered unusable fly ash for concrete based upon foam index testing. The fly ash is mixed with an activator solution sufficient to initiate a geopolymerization reaction and for a geopolymerized fly ash. The geopolymerized fly ash is granulated. The geopolymerized fly ash is considered usable fly ash for concrete according to foam index testing. The geopolymerized fly ash may have a foam index less than 35% of the foam index of the untreated fly ash, and in some cases less than 10% of the foam index of the untreated fly ash. The activator solution may contain an alkali metal hydroxide, carbonate, silicate, aluminate, or mixtures thereof.

  2. Treatment of fly ash for use in concrete

    Science.gov (United States)

    Boxley, Chett [Park City, UT

    2012-05-15

    A process for treating fly ash to render it highly usable as a concrete additive. A quantity of fly ash is obtained that contains carbon and which is considered unusable fly ash for concrete based upon foam index testing. The fly ash is mixed with a quantity of spray dryer ash (SDA) and water to initiate a geopolymerization reaction and form a geopolymerized fly ash. The geopolymerized fly ash is granulated. The geopolymerized fly ash is considered usable fly ash for concrete according to foam index testing. The geopolymerized fly ash may have a foam index less than 40%, and in some cases less than 20%, of the foam index of the untreated fly ash. An optional alkaline activator may be mixed with the fly ash and SDA to facilitate the geopolymerization reaction. The alkaline activator may contain an alkali metal hydroxide, carbonate, silicate, aluminate, or mixtures thereof.

  3. Effects of SO42- ions on the corrosion of GH3535 weld joint in FLiNaK molten salt

    Science.gov (United States)

    Zhu, Yasheng; Qiu, Jie; Hou, Juan; Liu, Wenguan; Chen, Huaican; Ai, Hua; Yu, Guojun; Wang, Jianqiang; Zhou, Xingtai

    2017-08-01

    The present work studied the impact of SO42- ions on the corrosion behaviors of GH3535 weld joint in FLiNaK molten salt. The concentration of SO42- ions in the FLiNaK molten salt was controlled by adjusting the quantity of Na2SO4 added into the salt. Results indicate that the SO42- ions in the FLiNaK salt speed up the corrosion rate remarkably by promoting the dissolution of Cr from the alloy matrix into the salt. With the concentration of SO42- ions in the FLiNaK salt increases from 100 ppm to 1000 ppm, the weight losses and the Cr depletion layer depths of the corroded specimens increase linearly. Even in the case of the heavy corrosion attack caused by the SO42- ions, the corrosion performance is similar between the base zone and fusion zone in the GH3535 weld joint. It is demonstrated that the structural diversity caused by the welding process has little impact on the corrosion performances of GH3535 alloy in FLiNaK molten salt.

  4. GNSS-based positioning: Attacks and Countermeasures

    CERN Document Server

    Papadimitratos, P

    2010-01-01

    Increasing numbers of mobile computing devices, user-portable, or embedded in vehicles, cargo containers, or the physical space, need to be aware of their location in order to provide a wide range of commercial services. Most often, mobile devices obtain their own location with the help of Global Navigation Satellite Systems (GNSS), integrating, for example, a Global Positioning System (GPS) receiver. Nonetheless, an adversary can compromise location-aware applications by attacking the GNSS-based positioning: It can forge navigation messages and mislead the receiver into calculating a fake location. In this paper, we analyze this vulnerability and propose and evaluate the effectiveness of countermeasures. First, we consider replay attacks, which can be effective even in the presence of future cryptographic GNSS protection mechanisms. Then, we propose and analyze methods that allow GNSS receivers to detect the reception of signals generated by an adversary, and then reject fake locations calculated because of ...

  5. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  6. Mitigation of Malicious Attacks on Networks

    CERN Document Server

    Schneider, Christian M; Andrade, Jose S; Havlin, Shlomo; Herrmann, Hans J; 10.1073/pnas.1009440108

    2011-01-01

    Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How and at which cost can one restructure the network such that it will become more robust against a malicious attack? We introduce a unique measure for robustness and use it to devise a method to mitigate economically and efficiently this risk. We demonstrate its efficiency on the European electricity system and on the Internet as well as on complex networks models. We show that with small changes in the network structure (low cost) the robustness of diverse networks can be improved dramatically while their functionality remains unchanged. Our results are useful not only for improving significantly with low cost the robustness of existing infrastructures but also for designing economically robust network systems.

  7. Two fatal tiger attacks in zoos.

    Science.gov (United States)

    Tantius, Britta; Wittschieber, Daniel; Schmidt, Sven; Rothschild, Markus A; Banaschak, Sibylle

    2016-01-01

    Two captive tiger attacks are presented that took place in Cologne and Münster zoos. Both attacks occurred when the handlers, intent on cleaning the enclosures, entered whilst the tigers accidently retained access to the location, and thus defended their territory against the perceived intruders. Both victims suffered fatal neck injuries from the bites. At Münster, colleagues managed to lure the tiger away from its victim to enable treatment, whilst the Cologne zoo tiger had to be shot in order to allow access to be gained. Whilst it was judged that human error led to the deaths of the experienced zookeepers, the investigation in Münster was closed as no third party was found to be at fault, whereas the Cologne zoo director was initially charged with being negligent. These charges were subsequently dismissed as safety regulations were found to be up to date.

  8. Making MANET secured against malicious attack

    Science.gov (United States)

    Kush, Ashwani; Taneja, Sunil; Kush, Shagun

    2011-12-01

    A Mobile Adhoc Network (MANET) is characterized by mobile nodes, multihop wireless connectivity, infrastructureless environment and dynamic topology. A recent trend in Ad Hoc network routing is the reactive ondemand philosophy where routes are established only when required. Stable Routing is of major concern in Ad hoc routing. Security and Power efficiency are the major concerns in this field. This paper is an effort to use security to achieve more reliable routing. The ad hoc environment is accessible to both legitimate network users and malicious attackers. The proposed scheme is intended to incorporate security aspect on existing protocols. The study will help in making protocol more robust against attacks to achieve stable routing in routing protocols.

  9. Quantifying Shannon's Work Function for Cryptanalytic Attacks

    CERN Document Server

    van Son, R J J H

    2010-01-01

    Attacks on cryptographic systems are limited by the available computational resources. A theoretical understanding of these resource limitations is needed to evaluate the security of cryptographic primitives and procedures. This study uses an Attacker versus Environment game formalism based on computability logic to quantify Shannon's work function and evaluate resource use in cryptanalysis. A simple cost function is defined which allows to quantify a wide range of theoretical and real computational resources. With this approach the use of custom hardware, e.g., FPGA boards, in cryptanalysis can be analyzed. Applied to real cryptanalytic problems, it raises, for instance, the expectation that the computer time needed to break some simple 90 bit strong cryptographic primitives might theoretically be less than two years.

  10. Optimal Attack Strategy in Random Scale-Free Networks Based on Incomplete Information

    Institute of Scientific and Technical Information of China (English)

    LI Jun; WU Jun; LI Yong; DENG Hong-Zhong; TAN Yue-Jin

    2011-01-01

    @@ We introduce an attack model based on incomplete information, which means that we can obtain the information from partial nodes.We investigate the optimal attack strategy in random scale-free networks both analytically and numerically.We show that the attack strategy can affect the attack effect remarkably and the OAS can achieve better attack effect than other typical attack strategies.It is found that when the attack intensity is small, the attacker should attack more nodes in the "white area" in which we can obtain attack information; when the attack intensity is greater, the attacker should attack more nodes in the "black area" in which we can not obtain attack information.Moreover, we show that there is an inflection point in the curve of optimal attack proportion.For a given magnitude of attack information, the optimal attack proportion decreases with the attack intensity before the inflection point and then increases after the inflection point.%We introduce an attack model based on incomplete information, which means that we can obtain the information from partial nodes. We investigate the optimal attack strategy in random scale-free networks both analytically and numerically. We show that the attack strategy can affect the attack effect remarkably and the OAS can achieve better attack effect than other typical attack strategies. It is found that when the attack intensity is small, the attacker should attack more nodes in the "white area" in which we can obtain attack information; when the attack intensity is greater, the attacker should attack more nodes in the "black area" in which we can not obtain attack information. Moreover, we show that there is an inflection point in the curve of optimal attack proportion. For a given magnitude of attack information, the optimal attack proportion decreases with the attack intensity before the inflection point and then increases after the inflection point.

  11. Sand Flies and Their Control Methods.

    Science.gov (United States)

    Çetin, Hüseyin; Özbel, Yusuf

    2017-06-01

    The main aim of managing arthropod vectors that carry the disease agents is interrupting the infection cycle. Therefore, the management of the disease implies that all precautions related to all elements (i.e., human, arthropod vector, and reservoir) in the infection cycle need to be taken. There are important points that need to be considered while dealing with sand flies (Diptera: Psychodidae: Phlebotominae), which in many regions worldwide, particularly in tropical and subtropical areas, are vectors of diseases such as leishmaniasis and sand fly fever and are the arthropods of the infection cycle. Because the larval control of the sand flies is very difficult and almost impossible, the management is mainly conducted for the adults. The most effective strategy for reducing both sand fly fever and leishmaniasis is managing sand flies, particularly in areas where humans are located. In this review, the morphology, biology, and taxonomy of sand flies; the integrated fighting and management methods such as insecticide-impregnated bed nets and use of curtains, zooprophylaxis, indoor and outdoor residual applications, larvicides, repellents, and insecticide-impregnated dog collars; and data regarding many issues such as insecticide resistance in sand flies have been emphasized on in the review.

  12. Fly ash-reinforced thermoplastic starch composites

    Energy Technology Data Exchange (ETDEWEB)

    Ma, X.F.; Yu, J.G.; Wang, N. [Tianjin University, Tianjin (China). School of Science

    2007-01-02

    As a by-product from the combustion of pulverized coal, fly ash was, respectively, used as the reinforcement for formamide and urea-plasticized thermoplastic starch (FUPTPS) and glycerol-plasticized thermoplastic starch (GPTPS). The introduction of fly ash improved tensile stress from 4.56 MPa to 7.78 MPa and Youngs modulus increased trebly from 26.8 MPa to 84.6 MPa for fly ash-reinforced FUPTPS (A-FUPTPS), while tensile stress increased from 4.55 MPa to 12.86 MPa and Youngs modulus increased six times from 76.4 MPa to 545 MPa for fly ash-reinforced GPTPS (A-GPTPS). X-ray diffractograms illustrated that fly ash destroyed the formation of starch ordered crystal structure, so both A-GPTPS and FUPTPS could resist the starch re-crystallization (retrogradation). Also fly ash improved water resistance of TPS. As shown by rheology, during the thermoplastic processing, the extruder screw speed effectively adjusted the flow behavior of A-FUPTPS, while the increasing of the processing temperature effectively ameliorated the flow behavior of A-GPTPS. However, superfluous ash contents (e.g., 20 wt%) worsened processing fluidity and resulted in the congregation of fly ash in FUPTPS matrix (tested by SEM) rather than in GPTPS matrix. This congregation decreased the mechanical properties and water resistance of the materials.

  13. Defending Against LDoS Attacks Using Fair AQM

    Directory of Open Access Journals (Sweden)

    Bianqin Wang

    2011-12-01

    Full Text Available According to the instant high rate and high intensity of LDoS attacks, this paper explores using fair queue management mechanism to mitigate their effect. We perform simulation experiments to evaluate the performance of fair AQM FRED and CHOKe under LDoS attacks. The simulation results show that they are able to reduce the impact of the attacks in various degrees. FRED outperforms CHOKe in throttling the attacks, but it is slightly inferior to CHOKe in time performance.

  14. Sulfate resistance of ordinary Portland cement with fly ash

    Directory of Open Access Journals (Sweden)

    Irassar, Edgardo F.

    1989-03-01

    Full Text Available Low calcium fly ash has demonstrated to be an effective pozzolan to improve sulfate resistance of ordinary portland cement (type I. In this paper physico-chemical effects that produce this pozzolan in the mortar exposed to sulfate attack are studied. Dilution and dispersion affects are analyzed using mixes of cement with an inert mineral admixture. Mineralogical changes of mortar are studied using X-ray diffraction and the help of scanning electron microscope. The results show that fly ash delays mortar cracking phenomenon due to less content of unstable compounds in sulfate environment, greater available space to be occupied by expansive compounds and less CH present in the mortars.

    La ceniza volante de bajo contenido de óxido de calcio ha demostrado ser una efectiva puzolana para mejorar la resistencia a los sulfatos del cemento portland normal (CRN. En el presente trabajo se estudian los efectos físico-químicos que produce esta puzolana en el mortero expuesto al ataque de sulfatos. Se analizan los efectos de dilución y dispersión utilizando mezclas de cemento con una adición mineral inactiva. Los cambios mineralógicos del mortero se estudian con difracción de rayos X (DRX y la ayuda del microscopio electrónico. Los resultados indican que la ceniza volante retarda el fenómeno de fisuración del mortero debido a la menor cantidad de compuestos inestables en ambiente con sulfatos, el mayor espacio disponible para albergar a los compuestos expansivos y la disminución del CH presente en la mezcla.

  15. Sharkonomics How to attack market leaders

    CERN Document Server

    Engeseth, Stefan

    2012-01-01

    Sharks are nature's most revered and feared killing machines. But if you study the behaviour of sharks, you will learn they are also highly strategic and efficient in the way they survive and thrive in nature's competitive environment. Inspired by the shark's evolved (over 420 million years) instincts and strategic moves, this book provides businesses with 10 ways on how to attack the market leaders, and take market share, in your sector.

  16. Fighting Through a Logistics Cyber Attack

    Science.gov (United States)

    2015-06-19

    cumulative cost of cyber-attacks was more than the combined global black market cost of cocaine, heroin and marijuana. These alarming figures raised...information (in many cases real-time) among many users at a very low cost . The number of networks the DoD uses to execute its mission has increased...the country to its knees. The Luftwaffe was uncontested in the Battle of Britain until radar’s ability to detect inbound aircraft provided the

  17. Coal Slag Attack-A Review

    Institute of Scientific and Technical Information of China (English)

    GUO Zongqi

    2004-01-01

    Although slagging coal gasifiers have served the commercial systems of electricity and chemical fertilizer productions for more than ten years, refractory service life still is a critical factor for gasifier availability. Some investigations were attracted, focusing on coal slag attack on high chromia refractories. A general introduction is made in order to have further understanding about slag corrosion in coal gasification environment. Microstructural deterioration and wear process of high chromia refractory in slagging gasifiers are discussed.

  18. Classifying network attack scenarios using an ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-03-01

    Full Text Available map: ? Security Policy & Short Term Time Scale o Social Engineering ? Information phishing ? Trojan ? Security Policy & Long Term Time Scale o Policy oversight ? Poor planning ? Poor control (weak passwords) ? Technology & Short Term Time... denial of service attacks and countermeasures. Princeton University Department of Electrical Engineering Technical Report CE-L2001-002, Kelley, P., Komanduri, S., Mazurek, M. L., Shay, R., Vidas, T., Bauer, L., et al. (2011). Guess again (and again...

  19. Afghanistan: Green-on-Blue Attacks

    Science.gov (United States)

    2013-05-02

    Afghanistan, December 2012, p 35 15 Yousafzai, Sami and Moreau , Ron, http://www.thedailybeast.com/newsweek/2012/08/26/ afghanistan-green-on-blue-killings...spike-insider-attacks- stress-ramadan-fasting, 24 August 2012 37 Yousafzai, Sami and Moreau , Ron, http://www.thedailybeast.com/newsweek/2012/08/26...afghanistan-green-on-blue-killings- explained.html, Afghanistan: ‘Green on Blue’ Killings Explained, 27 August 2012 38 Yousafzai, Sami and Moreau , Ron

  20. Smoking behaviour under intense terrorist attacks.

    Science.gov (United States)

    Keinan-Boker, Lital; Kohn, Robert; Billig, Miriam; Levav, Itzhak

    2011-06-01

    Smoking is one of the varied psychological reactions to stress. This study examined the rate and changes in cigarette smoking among former Gaza and current West Bank Jewish settlers subjected to direct and indirect terrorist attacks during the Al-Aksa Intifada. The relationship with degree of religious observance and emotional distress was explored as well. In this cross-sectional study, the respondents were settlers randomly selected and interviewed by telephone (N = 706). The interview schedule included socio-demographic items, information on direct exposure to terrorist attacks (e.g. threat to life or physical integrity, personal losses, property damage) and on steady and changes in smoking habits, and a scale to measure emotional distress. In contrast with the country population, a larger percentage of settlers who smoked increased the number of cigarettes consumed with exposure to terrorism (10 and 27%, respectively). Respondents who were injured or had their home damaged reported a higher rate of smoking during the preceding year (30 and 20%, respectively). Emotional distress was related to cigarette smoking, but not in the controlled analysis. Religious observance had no effect. Direct or indirect exposure to terrorist attacks had an impact on smoking prevalence rates and on changes in smoking habits. Studies investigating reactions to traumatic events should include a detailed section on smoking while mental health interventions should address the needs of smokers.

  1. Fuzzy Expert System for Heart Attack Diagnosis

    Science.gov (United States)

    Hassan, Norlida; Arbaiy, Nureize; Shah, Noor Aziyan Ahmad; Afizah Afif@Afip, Zehan

    2017-08-01

    Heart attack is one of the serious illnesses and reported as the main killer disease. Early prevention is significant to reduce the risk of having the disease. The prevention efforts can be strengthen through awareness and education about risk factor and healthy lifestyle. Therefore the knowledge dissemination is needed to play role in order to distribute and educate public in health care management and disease prevention. Since the knowledge dissemination in medical is important, there is a need to develop a knowledge based system that can emulate human intelligence to assist decision making process. Thereby, this study utilized hybrid artificial intelligence (AI) techniques to develop a Fuzzy Expert System for Diagnosing Heart Attack Disease (HAD). This system integrates fuzzy logic with expert system, which helps the medical practitioner and people to predict the risk and as well as diagnosing heart attack based on given symptom. The development of HAD is expected not only providing expert knowledge but potentially become one of learning resources to help citizens to develop awareness about heart-healthy lifestyle.

  2. Research and Implementation of Three HTTPS Attacks

    Directory of Open Access Journals (Sweden)

    Kefei Cheng

    2011-05-01

    Full Text Available With the rapid development of network applications, the issues of Network transmission security become very important. Therefore, SSL protocol is more and more widely used in a variety of network services. But the SSL protocol itself is not perfect, in practice, there are also problems. For the deficiencies of endpoint authentication in the SSL handshake process, the paper analyzes two kinds of defects existing in the SSL hand-shake process. Firstly, handshake process, in the first stage of the SSL connection, using plaintexts, existing the possibility of  being monitored and tampered. Secondly, SSL deployment of the actual application. Because of considering the factors about the performance of the network connection, that usually uses the way of switch connection based on HTTP protocol. In response to these deficiencies, this thesis adopts the two ways of forged certificates and converting the data stream from HTTPS to HTTP to attack them. In addition, a new attack mode against the data stream of HTTPS is designed and implemented. Experiments show that the above three methods cause significant security risks to HTTPS communications. Therefore, taking a static ARP table, enhanced certificate mechanism and mutual authentication of three different measures are proposed to enhance network security in the paper. It is shown that three ways can relative effectively defense against attacks on HTTPS in the experiments.

  3. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Yee Wei; Hartel, Pieter; Hartog, den Jerry; Havinga, Paul

    2005-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone. W

  4. Attacks Prevention and Detection Techniques In MANET: A Survey

    Directory of Open Access Journals (Sweden)

    Pranjali D. Nikam,

    2014-11-01

    Full Text Available Wireless sensor network is a set of distributed sensor nodes. Which are randomly deployed in geographical area to capture climatic changes like temperature, humidity and pressure. In Wireless Network MANET is a Mobile Ad-Hoc Networks which is a one self-configurable network. MANET is a collection of Wireless mobile node which is dynamically moves from one location to another location. Both attacks Active as well as Passive attacks is in MANET. It doesn’t have a static structure. Security for wireless network is much difficult as compare to wired networks. In last few years many security and attacks issue are face many researchers in MANET. Attacks like Packet dropping attack, Black-Hole attack, Denial of Service attack, wormhole attacks and Packet modification attacks found in MANET. At the time of data communication all the above mentioned attacks access data easily without permission. To solve the problem of attacks in MANET and secure data communication use Intrusion Detection System. In This paper propose the survey of different kinds of attacks on MANET and Wireless sensor networks. This paper helps to young researcher for implement new hybrid algorithm for secure intrusion detection in MANET.

  5. A Formal Classification of Internet Banking Attacks and Vulnerabilities

    Directory of Open Access Journals (Sweden)

    Laerte Peotta

    2011-02-01

    Full Text Available A formal classification of attacks and vulnerabilities that affect current internet banking systems is presented along with two attacks which demonstrate the insecurity of such systems. Based ona thoroughanalysis of current security models, we propose a guidelines for designing secure internet banking systems which are not affected by the presented attacks and vulnerabilities.

  6. Mapping of shoot fly tolerance loci in sorghum using SSR markers

    Indian Academy of Sciences (India)

    D. B. Apotikar; D. Venkateswarlu; R. B. Ghorade; R. M. Wadaskar; J. V. Patil; P. L. Kulwal

    2011-04-01

    Sorghum (Sorghum bicolor (L.) Moench) is one of the most important crops in the semiarid regions of the world. One of the important biotic constraints to sorghum production in India is the shoot fly which attacks sorghum at the seedling stage. Identification of the genomic regions containing quantitative trait loci (QTLs) for resistance to shoot fly and the linked markers can facilitate sorghum improvement programmes through marker-assisted selection. A simple sequence repeat (SSR) marker-based skeleton linkage map of two linkage groups of sorghum was constructed in a population of 135 recombinant inbred lines (RIL) derived from a cross between IS18551 (resistant to shoot fly) and 296B (susceptible to shoot fly). A total of 14 SSR markers, seven each on linkage groups A and C were mapped. Using data of different shoot fly resistance component traits, one QTL which is common for glossiness, oviposition and dead hearts was detected following composite interval mapping (CIM) on linkage group A. The phenotypic variation explained by this QTL ranged from 3.8%–6.3%. Besides the QTL detected by CIM, two more QTLs were detected following multi-trait composite interval mapping (MCIM), one each on linkage groups A and C for the combinations of traits which were correlated with each other. Results of the present study are novel as we could find out the QTLs governing more than one trait (pleiotropic QTLs). The identification of pleiotropic QTLs will help in improvement of more than one trait at a time with the help of the same linked markers. For all the QTLs, the resistant parent IS18551 contributed resistant alleles.

  7. Marijuana effects on simulated flying ability.

    Science.gov (United States)

    Janowsky, D S; Meacham, M P; Blaine, J D; Schoor, M; Bozzetti, L P

    1976-04-01

    The authors studied the effects of marijuana intoxication on the ability of 10 certified airplane pilots to operate a flight simulator. They used a randomized double-blind crossover design to compare the effect of active versus placebo marijuana. They found that all 10 pilots showed a significant decrease in measurements of flying performance 30 minutes after smoking active marijuana. For a group of 6 pilots tested sequentially for 6 hours, a nonsignificant decrease in flying performance continued for 2 hours after smoking the active drug. The authors conclude that the effects of marijuana on flying performance may represent a sensitive indicator of the drug's psychomotor effects.

  8. Influence of habitat pattern on orientation during host fruit location in the tomato fruit fly, Neoceratitis cyanescens.

    Science.gov (United States)

    Brévault, T; Quilici, S

    2007-12-01

    Fruit flies have evolved mechanisms using olfactory and visual signals to find and recognize suitable host plants. The objective of the present study was to determine how habitat patterns may assist fruit flies in locating host plants and fruit. The tomato fruit fly, Neoceratitis cyanescens (Bezzi), was chosen as an example of a specialized fruit fly, attacking plants of the Solanaceae family. A series of experiments was conducted in an outdoor field cage wherein flies were released and captured on sticky orange and yellow spheres displayed in pairs within or above potted host or non-host plants. Bright orange spheres mimicking host fruit were significantly more attractive than yellow spheres only when placed within the canopy of host plants and not when either within non-host plants or above both types of plants. Additional experiments combining sets of host and non-host plants in the same cage, or spraying leaf extract of host plant (bug weed) on non-host plants showed that volatile cues emitted by the foliage of host plants may influence the visual response of flies in attracting mature females engaged in a searching behaviour for a laying site and in assisting them to find the host fruit. Moreover, the response was specific to mature females with a high oviposition drive because starved mature females, immature females and males showed no significant preference for orange spheres. Olfactory signals emitted by the host foliage could be an indicator of an appropriate habitat, leading flies to engage in searching for a visual image.

  9. A NASA study of the impact of technology on future sea based attack aircraft

    Science.gov (United States)

    Hahn, Andrew S.

    1992-01-01

    A conceptual aircraft design study was recently completed evaluating carrier-based, subsonic attack aircraft using contemporary and future technology assumptions. The study examined a configuration matrix that was made up of light and medium bomb loads, one and two man crews, internal and external weapons carriage, as well as conventional and flying wing planforms. Use of common technology assumptions, engine cycle simulation code, design mission, and consistent application of methods allow for direct comparison of the aircraft. This paper describes the design study ground rules and the aircraft designed. The aircraft descriptions include weights, dimensions, layout, design mission, design constraints, maneuver performance, and fallout mission performance. The strengths, and weaknesses of each aircraft are highlighted.

  10. Flying Through Dust From Asteroids

    Science.gov (United States)

    Kohler, Susanna

    2016-11-01

    How can we tell what an asteroid is made of? Until now, weve relied on remote spectral observations, though NASAs recently launched OSIRIS-REx mission may soon change this by landing on an asteroid and returning with a sample.But what if we could learn more about the asteroids near Earth without needing to land on each one? It turns out that we can by flying through their dust.The aerogel dust collector of the Stardust mission. [NASA/JPL/Caltech]Ejected CluesWhen an airless body is impacted by the meteoroids prevalent throughout our solar system, ejecta from the body are flung into the space around it. In the case of small objects like asteroids, their gravitational pull is so weak that most of the ejected material escapes, forming a surrounding cloud of dust.By flying a spacecraft through this cloud, we could perform chemical analysis of the dust, thereby determining the asteroids composition. We could even capture some of the dust during a flyby (for example, by using an aerogel collector like in the Stardust mission) and bring it back home to analyze.So whats the best place to fly a dust-analyzing or -collecting spacecraft? To answer this, we need to know what the typical distribution of dust is around a near-Earth asteroid (NEA) a problem that scientists Jamey Szalay (Southwest Research Institute) and Mihly Hornyi (University of Colorado Boulder) address in a recent study.The colors show the density distribution for dust grains larger than 0.3 m around a body with a 10-km radius. The distribution is asymmetric, with higher densities on the apex side, shown here in the +y direction. [Szalay Hornyi 2016]Moon as a LaboratoryTo determine typical dust distributions around NEAs, Szalay and Hornyi first look at the distribution of dust around our own Moon, caused by the same barrage of meteorites wed expect to impact NEAs. The Moons dust cloud was measured in situ in 2013 and 2014 by the Lunar Dust Experiment (LDEX) on board the Lunar Atmosphere and Dust Environment

  11. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that

  12. Link-layer jamming attacks on S-MAC

    OpenAIRE

    Law, Yee Wei; Hartel, Pieter; Hartog, den, D.N.; Havinga, Paul

    2005-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone. In this paper, we investigate some jamming attacks on S-MAC, the level of effectiveness and efficiency the attacks can potentially achieve, and a countermeasure that can be implemented against one o...

  13. Unified communications forensics anatomy of common UC attacks

    CERN Document Server

    Grant, Nicholas Mr

    2013-01-01

    Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures

  14. Black Hole and Greyhole Attack in Wireless Mesh Network

    Directory of Open Access Journals (Sweden)

    Rupinder Kaur

    2014-10-01

    Full Text Available Security is an important need in wireless mesh networks to give safe and shared information between wireless non-static nodes. In wireless network nodes has ability to act correctly and route the packets. Wireless mesh networks unusual method of producing,keeping and sharing information ability of mobile objects to show spontaneous and cheap adjusting arrangement itself.There are different types of communication devices in technology by which performance is measured.There is a major issue which take part in network and provide security from various kinds of malicious attacks.There are various attacks such as black hole attack,wormhole attack,Greyhole attack, and evesdropping attack.Black hole and Greyhole attacks are network layer attacks that spoils the performance by falling the packets.The black hole and Grey hole are the problem of security that consider in wireless networks.Black hole and Greyhole attack is one type of way of interrupting attack and can cause large amount of damage to network.Black hole attack is act like ad-hoc network; which create network and attack on packets.In black hole attack where a false node not make correct paths in public to receiver node during the direction finding process. Theattacker achieves this attack when all the similar kinds of nodes communicate and make network to each other. It is very important to protectthe network layer from these attack which is also a great issues in wireless mesh network. Greyhole attack is very difficult to detect in wireless mesh network.In this paper,its an overview about black hole attack and grey hole in wireless mesh network and define problem statement about them. Secondly, its take study about related work in which many authors perform on these attacks and then its discuss about proposed method.Thirdly,the results are simulated carried out in OPNET simulator where black hole attack and grey hole attack shows the performance and Its analysis the throughput in network.

  15. Snowballing and flying under the radar

    DEFF Research Database (Denmark)

    Pötz, Katharina Anna; Hjortsø, Carsten Nico Portefée

    2013-01-01

    management and venture development paths. More specifically, flying under radar in terms of operating under lower institutional requirements, and slowly accumulating resources (snowballing) are major leveraging strategies. We integrate our results into a hypothesized framework for resource management in East...

  16. Tsetse fly microbiota: form and function

    Directory of Open Access Journals (Sweden)

    Jingwen eWang

    2013-10-01

    Full Text Available Tsetse flies are the primary vectors of African trypanosomes, which cause Human and Animal African trypanosomiasis in 36 countries in sub-Saharan Africa. These flies have also established symbiotic associations with bacterial and viral microorganisms. Laboratory-reared tsetse flies harbor up to four vertically transmitted organisms - obligate Wigglesworthia, commensal Sodalis, parasitic Wolbachia and Salivary Gland Hypertrophy Virus (SGHV. Field-captured tsetse can harbor these symbionts as well as environmentally acquired commensal bacteria. This microbial community influences several aspects of tsetse’s physiology, including nutrition, fecundity and vector competence. This review provides a detailed description of tsetse’s microbiome, and describes the physiology underlying host-microbe, and microbe-microbe, interactions that occur in this fly.

  17. Dynamic Optimization Algorithm for Flying Trajectory of a Free-flying Space Robot

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    A new method of dynamic optimization for the flying trajectory of a free-flying space robot based on its flying motion characteristics is presented. The continuous flying trajectory is broken into a number of segment and the control efforts and the duration of the segment are chosen as the optimization parameters. The objective function is made by using the weighted sum of the fuel used and the time spent, and the constraint equations are selected. Finally, the internal point punishment function method is adopted in the optimization program, and the results of computer simulation are given.

  18. Effect of Fly Ash on the Electrical Conductivity of Concretes

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    The fly ash occasionally has high content of iron oxide and carbon that are good electrical conducting components. This paper investigates the effect of the fly ash used as mineral admixtures on the electrical conductivity of concretes. The electrical properties of concretes using 3 kinds of fly ash with different iron oxide contents have been studied. Experimental results show that at the same fly ash dosage the resistivity of concrete using fly ash with high content of iron oxide is slightly lower than that with low content of iron oxide. However, the concrete resistivity after 14d increases as fly ash dosage increases regardless of iron oxide content in fly ash.

  19. Relativistic Tennis Using Flying Mirror

    Science.gov (United States)

    Pirozhkov, A. S.; Kando, M.; Esirkepov, T. Zh.; Ma, J.; Fukuda, Y.; Chen, L.-M.; Daito, I.; Ogura, K.; Homma, T.; Hayashi, Y.; Kotaki, H.; Sagisaka, A.; Mori, M.; Koga, J. K.; Kawachi, T.; Daido, H.; Bulanov, S. V.; Kimura, T.; Kato, Y.; Tajima, T.

    2008-06-01

    Upon reflection from a relativistic mirror, the electromagnetic pulse frequency is upshifted and the duration is shortened by the factor proportional to the relativistic gamma-factor squared due to the double Doppler effect. We present the results of the proof-of-principle experiment for frequency upshifting of the laser pulse reflected from the relativistic "flying mirror", which is a wake wave near the breaking threshold created by a strong driver pulse propagating in underdense plasma. Experimentally, the wake wave is created by a 2 TW, 76 fs Ti:S laser pulse from the JLITE-X laser system in helium plasma with the electron density of ≈4-6×1019 cm-3. The reflected signal is observed with a grazing-incidence spectrograph in 24 shots. The wavelength of the reflected radiation ranges from 7 to 14 nm, the corresponding frequency upshifting factors are ˜55-115, and the gamma-factors are y = 4-6. The reflected signal contains at least 3×107 photons/sr. This effect can be used to generate coherent high-frequency ultrashort pulses that inherit temporal shape and polarization from the original (low-frequency) ones. Apart from this, the reflected radiation contains important information about the wake wave itself, e.g. location, size, phase velocity, etc.

  20. Biomass fly ash in concrete: Mixture proportioning and mechanical properties

    Energy Technology Data Exchange (ETDEWEB)

    Shuangzhen Wang; Amber Miller; Emilio Llamazos; Fernando Fonseca; Larry Baxter [Brigham Young University, Provo, UT (USA). Department of Chemical Engineering

    2008-03-15

    ASTM C 618 prohibits use of biomass fly ashes in concrete. This document compares the properties of biomass fly ashes from cofired (herbaceous with coal), pure wood combustion and blended (pure wood fly ash blended with coal fly ash) to those of coal fly ash in concrete. The results illustrate that with 25% replacement (wt%) of cement by fly ash, the compressive strength (one day to one year) and the flexure strength (at 56th day curing) of cofired and blended biomass fly ash concrete is statistically equal to that of two coal fly ash concrete in this investigation (at 95% confidence interval). This implies that biomass fly ash with co-firing concentration within the concentration interest to commercial coal-biomass co-firing operations at power plants and blended biomass fly ash within a certain blending ratio should be considered in concrete. 37 refs., 10 figs., 2 tabs.

  1. My Friendship with the Flying Tigers

    Institute of Scientific and Technical Information of China (English)

    Jiang; Yingshan

    2015-01-01

    "I believe I owe a debt to the Chinese people...It’s so huge there’s no way I can pay it back."This is what Flying Tigers pilot Glen Beneda said to his family time and again.I have been working in the CPAFFC for over 10 years now,and my feelings for the Flying Tigers have deepened over time.I had heard of its

  2. Settling characteristics of some Indian fly ash

    Energy Technology Data Exchange (ETDEWEB)

    Jain, M.K.; Sastry, B.S. [Indian Institute of Technology, Kharapur (India). Dept. of Mining Engineering

    2003-07-01

    The paper examines the aspects of the solid liquid separation (settling characteristics) of some of the fly ash obtained from coal-fired power plants in India. The application of a coagulating or flocculating agent (polymer) to improve the two properties as indicated is a typical industrial practice. The sources for this study comprise of fly ash, pond ash, and bottom ash and the settling characteristics are studied in conjunction with the flocculating agent polyacrylamide. 4 refs., 4 figs., 3 tabs.

  3. As and Se interactions with fly ashes

    Directory of Open Access Journals (Sweden)

    M. Díaz-Somoano

    2012-03-01

    Full Text Available Arsenic and selenium are toxic elements present incoal in trace concentrations that may be emitted tothe environment during coal conversion processes.However, it is possible to retain volatile arsenic andselenium compounds in the fly ashes originated bythe process, the proportions retained depending onthe characteristics of the ashes and processconditions. This work is focused on the capture ofthese elements in fly ashes in simulated coalcombustion and gasification atmospheres inlaboratory scale reactors.

  4. Web Forms and Untraceable DDoS Attacks

    Science.gov (United States)

    Jakobsson, Markus; Menczer, Filippo

    We analyze a Web vulnerability that allows an attacker to perform an email-based attack on selected victims, using standard scripts and agents. What differentiates the attack we describe from other, already known forms of distributed denial of service (DDoS) attacks is that an attacker does not need to infiltrate the network in any manner - as is normally required to launch a DDoS attack. Thus, we see this type of attack as a poor man's DDoS. Not only is the attack easy to mount, but it is also almost impossible to trace back to the perpetrator. Along with descriptions of our attack, we demonstrate its destructive potential with (limited and contained) experimental results. We illustrate the potential impact of our attack by describing how an attacker can disable an email account by flooding its inbox; block competition during on-line auctions; harm competitors with an on-line presence; disrupt phone service to a given victim; disconnect mobile corporate leaders from their networks; and disrupt electronic elections. Finally, we propose a set of countermeasures that are light-weight, do not require modifications to the infrastructure, and can be deployed in a gradual manner.

  5. PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK

    Directory of Open Access Journals (Sweden)

    Mohammad Abdus Salam

    2016-03-01

    Full Text Available Wireless sensor network (WSN is highly used in many fields. The network consists of tiny lightweight sensor nodes and is largely used to scan or detect or monitor environments. Since these sensor nodes are tiny and lightweight, they put some limitations on resources such as usage of power, processing given task, radio frequency range. These limitations allow network vulnerable to many different types of attacks such as hello flood attack, black hole, Sybil attack, sinkhole, and many more. Among these attacks, hello flood is one of the most important attacks. In this paper,we have analyzed the performance of hello flood attack and compared the network performance as number of attackers increases. Network performance is evaluated by modifying the ad-hoc on demand distance vector (AODV routing protocol by using NS2 simulator. It has been tested under different scenarios like no attacker, single attacker, and multiple attackers to know how the network performance changes. The simulation results show that as the number of attackers increases the performance in terms of throughput and delay changes.

  6. Machine Learning Methods for Attack Detection in the Smart Grid.

    Science.gov (United States)

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  7. Mitigating App-DDoS Attacks on Web Servers

    Directory of Open Access Journals (Sweden)

    Manisha M. Patil

    2011-07-01

    Full Text Available In this paper, a lightweight mechanism is proposed to mitigate session flooding and request flooding app-DDoS attacks on web servers. App-DDoS attack is Application layer Distributed Denial of Service attack. This attack prevents legitimate users from accessing services. Numbers of mechanisms are available and can be installed on routers and firewalls to mitigate network layer DDoS attacks like SYNflood attack, ping of death attack. But Network layer solution is not applicable because App-DDoS attacks are indistinguishable based on packets and protocols. A lightweight mechanism is proposed which uses trust to differentiate legitimate users and attackers. Trust to client is evaluated based on his visiting history and requests are scheduled in decreasing order of trust. In this mechanism trust information is stored at client side in the form of cookies. This mitigation mechanism can be implemented as a java package which can run separately and forward valid requests to server. This mechanism also mitigates request flooding attacks by using Client Puzzle Protocol. When server is under request flooding attack source throttling is done by imposing cost on client. Cost is collected in terms of CPU cycles.

  8. Efficient certificate-based signcryption secure against public key replacement attacks and insider attacks.

    Science.gov (United States)

    Lu, Yang; Li, Jiguo

    2014-01-01

    Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. We show that an existing certificate-based signcryption scheme is insecure in our model. We also propose a new certificate-based signcryption scheme that achieves security against both public key replacement attacks and insider attacks. We prove in the random oracle model that the proposed scheme is chosen-ciphertext secure and existentially unforgeable. Performance analysis shows that the proposed scheme outperforms all the previous certificate-based signcryption schemes in the literature.

  9. Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks

    Directory of Open Access Journals (Sweden)

    Yang Lu

    2014-01-01

    Full Text Available Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. We show that an existing certificate-based signcryption scheme is insecure in our model. We also propose a new certificate-based signcryption scheme that achieves security against both public key replacement attacks and insider attacks. We prove in the random oracle model that the proposed scheme is chosen-ciphertext secure and existentially unforgeable. Performance analysis shows that the proposed scheme outperforms all the previous certificate-based signcryption schemes in the literature.

  10. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    We analyze a simple dynamic model of the interaction between terrorists and authorities. Our primary aim is to study optimal counterterrorism and its consequences when large terrorist attacks lead to a temporary increase in terrorist recruitment. First, we show that an increase in counterterrorism...... makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore......, in periods following large attacks a new attack is more likely to be small compared to other periods. Finally, we analyze the long-run consequences of the recruitment effect. We show that it leads to more counterterrorism, more small attacks, and a higher sum of terrorism damage and counterterrorism costs...

  11. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    which guarantee or optimise some quantitative property, such as the probability of a successful attack, the expected cost incurred, or some multi-objective trade-off between the two. We implement our approach, building upon the PRISM-games model checker, and apply it to a case study of an RFID goods...... analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack......-defence trees to two-player stochastic games, and then employ probabilistic model checking techniques to formally analyse these models. This provides a means to both verify formally specified security properties of the attack-defence scenarios and, dually, to synthesise strategies for attackers or defenders...

  12. Replication Attack Mitigations for Static and Mobile WSN

    CERN Document Server

    Manjula, V; 10.5121/ijnsa.2011.3210

    2011-01-01

    Security is important for many sensor network applications. Wireless Sensor Networks (WSN) are often deployed in hostile environments as static or mobile, where an adversary can physically capture some of the nodes. once a node is captured, adversary collects all the credentials like keys and identity etc. the attacker can re-program it and replicate the node in order to eavesdrop the transmitted messages or compromise the functionality of the network. Identity theft leads to two types attack: clone and sybil. In particularly a harmful attack against sensor networks where one or more node(s) illegitimately claims an identity as replicas is known as the node replication attack. The replication attack can be exceedingly injurious to many important functions of the sensor network such as routing, resource allocation, misbehavior detection, etc. This paper analyzes the threat posed by the replication attack and several novel techniques to detect and defend against the replication attack, and analyzes their effect...

  13. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure......Applications of wireless sensor networks (WSNs) are growing tremendously in the domains of habitat, tele-health, industry monitoring, vehicular networks, home automation and agriculture. This trend is a strong motivation for malicious users to increase their focus on WSNs and to develop...

  14. Wolbachia in Anastrepha fruit flies (Diptera: Tephritidae).

    Science.gov (United States)

    Coscrato, Virginia E; Braz, Antônio S K; P Perondini, André L; Selivon, Denise; Marino, Celso L

    2009-09-01

    Endosymbiotic bacteria of the genus Wolbachia are widespread among arthropods and cause a variety of reproductive abnormalities, such as cytoplasmic incompatibility, thelytokous parthenogenesis, male-killing, and host feminization. In this study, we used three sets of Wolbachia-specific primers (16S rDNA, ftsZ, and wsp) in conjunction with the polymerase chain reaction (PCR), cloning and sequencing to study the infection of fruit flies (Anastrepha spp. and Ceratitis capitata) by Wolbachia. The flies were collected at several localities in Brazil and at Guayaquil, Ecuador. All of the fruit flies studied were infected with Wolbachia supergroup A, in agreement with the high prevalence of this group in South America. Phylogenetic analysis showed that the wsp gene was the most sensitive gene for studying the relationships among Wolbachia strains. The Wolbachia sequences detected in these fruit flies were similar to those such as wMel reported for other fruit flies. These results show that the infection of Anastrepha fruit flies by Wolbachia is much more widespread than previously thought.

  15. 76 FR 26654 - Movement of Hass Avocados From Areas Where Mediterranean Fruit Fly or South American Fruit Fly Exist

    Science.gov (United States)

    2011-05-09

    ... Avocados From Areas Where Mediterranean Fruit Fly or South American Fruit Fly Exist AGENCY: Animal and... from Mediterranean fruit fly quarantined areas in the United States with a certificate if the fruit is... quarantine regulations to remove trapping requirements for Mediterranean fruit fly for Hass avocados...

  16. LAN attack detection using Discrete Event Systems.

    Science.gov (United States)

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed.

  17. A global transcriptional switch between the attack and growth forms of Bdellovibrio bacteriovorus.

    Directory of Open Access Journals (Sweden)

    Iris Karunker

    Full Text Available Bdellovibrio bacteriovorus is an obligate predator of bacteria ubiquitously found in the environment. Its life cycle is composed of two essential phases: a free-living, non-replicative, fast swimming attack phase (AP wherein the predator searches for prey; and a non-motile, actively dividing growth phase (GP in which it consumes the prey. The molecular regulatory mechanisms governing the switch between AP and GP are largely unknown. We used RNA-seq to generate a single-base-resolution map of the Bdellovibrio transcriptome in AP and GP, revealing a specific "AP" transcriptional program, which is largely mutually exclusive of the GP program. Based on the expression map, most genes in the Bdellovibrio genome are classified as "AP only" or "GP only". We experimentally generated a genome-wide map of 140 AP promoters, controlling the majority of AP-specific genes. This revealed a common sigma-like DNA binding site highly similar to the E. coli flagellar genes regulator sigma28 (FliA. Further analyses suggest that FliA has evolved to become a global AP regulator in Bdellovibrio. Our results also reveal a non-coding RNA that is massively expressed in AP. This ncRNA contains a c-di-GMP riboswitch. We suggest it functions as an intracellular reservoir for c-di-GMP, playing a role in the rapid switch from AP to GP.

  18. Intrinsic Membrane Targeting of the Flagellar Export ATPase FliI: Interaction with Acidic Phospholipids and FliH

    OpenAIRE

    Auvray, Frédéric; Ozin, Amanda J.; Claret, Laurent; Hughes, Colin

    2002-01-01

    The specialised ATPase FliI is central to export of flagellar axial protein subunits during flagellum assembly. We establish the normal cellular location of FliI and its regulatory accessory protein FliH in motile Salmonella typhimurium, and ascertain the regions involved in FliH2/FliI heterotrimerisation. Both FliI and FliH localised to the cytoplasmic membrane in the presence and in the absence of proteins making up the flagellar export machinery and basal body. Membrane association was tig...

  19. Quantum attacks on public-key cryptosystems

    CERN Document Server

    Yan, Song Y

    2013-01-01

    The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists.Quantum Attacks on Public-Key Cryptosystems presemts almost all?known quantum comput

  20. Suicide bomb attack causing penetrating craniocerebral injury

    Institute of Scientific and Technical Information of China (English)

    Manzar Hussain; Muhammad Ehsan Bari

    2013-01-01

    Penetrating cerebral injuries caused by foreign bodies are rare in civilian neurosurgical trauma,although there are various reports of blast or gunshot injuries in warfare due to multiple foreign bodies like pellets and nails.In our case,a 30-year-old man presented to neurosurgery clinic with signs and symptoms of right-sided weakness after suicide bomb attack.The skull X-ray showed a single intracranial nail.Small craniotomy was done and the nail was removed with caution to avoid injury to surrounding normal brain tissue.At 6 months' follow-up his right-sided power improved to against gravity.

  1. Bobcat attack on a cottontail rabbit

    Science.gov (United States)

    Biggins, D.E.; Biggins, D.M.

    2006-01-01

    We observed an attack by a bobcat (Lynx rufus) on a cottontail rabbit (Sylvilagus) that involved stealthy approach by the cat for >1 h, followed by a 12.3-s chase covering 116.0 m for the cat and 128.4 m for the rabbit. During the chase, the route of the cat from starting point to kill site was more direct than the semi-circular route of the rabbit. Stride lengths for the cat and total distance covered by the chase were longer than those previously reported for bobcats.

  2. SQL Injection Attacks: Techniques and Protection Mechanisms

    Directory of Open Access Journals (Sweden)

    Santosh Soni

    2011-01-01

    Full Text Available When an internet user interacts in web environment by surfing the Net, sending electronic mail messages and participating in online forums lot of data is generated which may have user’s private information. If this information is captured by third party tools and techniques; it may cause a breach in end user privacy. In the Web environment, end user privacy is one of the most controversial legal issues. In this paper issues related to information leakage through SQL injection attacks are presented and protection mechanisms are also discussed.

  3. Cooperative Guidance for Multimissile Salvo Attack

    Institute of Scientific and Technical Information of China (English)

    Zhao Shiyu; Zhou Rui

    2008-01-01

    Cooperative guidance problems of multiple missiles are considered in this article. A cooperative guidance scheme, where coordi-nation algorithms and local guidance laws are combined together, is proposed. This scheme actually builds up a hierarchical cooperative guidance architecture, which may provide a general solution to the multimissile cooperative guidance problems. In the case of salvo attacks which require missiles to hit the target simultaneously, both centralized and distributed coordination algorithms are derived based on the impact-time-control guidance (ITCG) law. Numerical simulations are performed to demonstrate the effectiveness of the proposed approaches.

  4. Analysis of signature wrapping attacks and countermeasures

    DEFF Research Database (Denmark)

    Gajek, Sebastian; Jensen, Meiko; Liao, Lijun

    2009-01-01

    In recent research it turned out that Boolean verification, of digital signatures in the context of WSSecurity, is likely to fail: If parts of a SOAP message, are signed and the signature verification applied to, the whole document returns true, then nevertheless the, document may have been...... significantly altered., In this paper, we provide a detailed analysis on the, possible scenarios that enable these signature wrapping, attacks. Derived from this analysis, we propose, a new solution that uses a subset of XPath instead of, ID attributes to point to the signed subtree, and show...

  5. A Method to Defend File-Attacking

    Institute of Scientific and Technical Information of China (English)

    HE Hongjun; LUO Li; CAO Sihua; FENG Tao; PAN Li; ZOU Zhiji

    2006-01-01

    The paper points out that the deep reason why modern computer system fails to defense malware lies in that user has no right to control the access of information, and proposes an explicit authorization mechanism. Its basic idea is that user explicitly authorizes program the file set it can access, and monitor all file access operations; once program requests to access file out of the authorized file set, refuse it, and this means that the program is malicious or has design errors. Computers based on this novel mechanism can protect information from attacking reliably, and have good software and hardware compatibility. A testing system is presented to validate our theory.

  6. Cardiogenic embolism producing crescendo transient ischemic attacks.

    Science.gov (United States)

    Geraghty, Patrick J; Oak, Jack; Choi, Eric T

    2005-09-01

    Lateralizing, repetitive transient ischemic attacks are characteristic of symptomatic carotid bifurcation atherosclerotic plaques. We report a case in which a cardiogenic embolus, after lodging at the left carotid bifurcation, produced crescendo episodes of expressive aphasia and mild right upper extremity weakness. Complete neurological recovery was achieved following emergent carotid embolectomy and endarterectomy. This case demonstrates that the laminar nature of internal carotid blood flow may result in the localization of embolic events to a single region of the cerebral vasculature, regardless of the source lesion in the carotid artery. The role of endoluminal techniques in the diagnosis and management of such lesions is discussed.

  7. Trait-Mediated Indirect Effects of Phorid Flies on Ants

    Directory of Open Access Journals (Sweden)

    Hsun-Yi Hsieh

    2012-01-01

    Full Text Available This paper provides a synthesis of the ecological impact of phorid fly parasitoids on ants. We find the most important impact of phorids on ants to be trait-mediated effects. Phorids diminish the foraging activity of ants, frequently reducing the number and average size of foragers and reducing the amount of food retrieved by a colony. However, ants' coping mechanisms include changing foraging site and time. Phorids can also affect competition, especially through changes in the ability of the host to win in exploitative competition. Factors such as microclimate, resource size, and habitat complexity interact with phorids to change their effect on competition. By being highly specific and attacking ants high in the competitive hierarchy, phorids can alter the linear nature of the competitive transitivity, and by reducing the number of foragers, they can change the discovery-dominance tradeoff that is observed in some ant communities. Trait-mediated effects of phorids also cascade to other trophic levels. As an example, we discuss the trait-mediated cascade of phorids on the Azteca instabilis system in coffee. In this system, by reducing the foraging activity of A. instabilis, phorids reduce the direct and indirect biological control impact of the ant in the coffee agroecosystem.

  8. Simulation of expansion in cement based materials subjected to external sulfate attack

    Directory of Open Access Journals (Sweden)

    O.A. Hodhod

    2014-03-01

    Full Text Available The standard test for length change in hydraulic-cement mortars exposed to sulfate solution, ASTM C1012-95, has been widely used by researchers to study the sulfate resistance of cement based materials. However, there are deficiencies in this test method including lengthy measuring period, insensitivity of the measurement tool to sulfate attack, effect of curing and pH change. So, in this study, a model will be built by artificial neural networks (ANNs to simulate this test and overcome these defects. This model will deal with different types of cement in the presence of blast-furnace slag (GGBFS or fly ash (PFA. From the results of simulations, it is possible to understand the impact of cement chemistry and these two types of additions on resistance of sulfate attack more readily, faster, and accurately. Such an understanding improves the decision making process in every stage of construction and maintenance and will help in better administration of resources.

  9. Direct regulation of BCL-2 by FLI-1 is involved in the survival of FLI-1-transformed erythroblasts

    OpenAIRE

    Lesault, Isabelle; Tran Quang, Christine; Frampton, Jon; Ghysdael, Jacques

    2002-01-01

    Rearrangement of the FLI-1 locus with ensuing overexpression of FLI-1 is an early event in Friend murine leukemia virus-induced disease. When overexpressed in primary erythroblasts, FLI-1 blocks erythropoeitin (Epo)-induced terminal differentiation and inhibits apoptosis normally induced in response to Epo withdrawal. We show here that the survival-inducing property of FLI-1 is associated with increased transcription of BCL-2. We further show that FLI-1 binds BCL-2 promoter sequences in trans...

  10. Public knowledge of heart attack symptoms in Beijing residents

    Institute of Scientific and Technical Information of China (English)

    ZHANG Qing-tan; HU Da-yi; YANG Jin-gang; ZHANG Shou-yan; ZHANG Xin-quan; LIU Shu-shan

    2007-01-01

    Background Definitive treatment for heart attack is early reperfusion with either angioplasty or thrombolytic therapy,and the benefit is strictly time-dependent. Patient outcomes are improved with either therapy when initiated as soon as possible. Recognition of heart attack symptoms is logically tied to taking action to receive prompt emergency care.Inadequate knowledge of heart attack symptoms may prolong delay. The purpose of this study was to document knowledge about heart attack symptoms in Beijing residents and to identify the characteristics associated with increased knowledge of heart attack.Methods A structured survey was conducted in 18 communities in Beijing from March 1 through June 10 in 2006.Addresses and participants were selected randomly following a stratification. The survey was designed to collect knowledge of heart attack symptoms from sampled adults in each community.Results A total of 4627 respondents completed the questionnaires correctly, and 50.29% of them were female. Totally 64.15% of the respondents reported chest pain or discomfort (common symptoms) as a symptom of heart attack; 75.38% reported at least one of the following eight symptoms as a symptom of heart attack: back pain, shortness of breath, arm pain or numbness, nausea or vomiting, neck, jaw or shoulder pain, epigastric pain, sweating, weakness (less common symptoms); 20.36% correctly reported four or more heart attack symptoms, only 7.4% knew all the correct heart attack symptoms, and 28.94% knew about reperfusion therapy for heart attack; 31.7% reported to call 120 or 999 while having a heart attack themselves; however 89.6% reported to call 120 or 999 when someone else is suffering from a heart attack. Very old persons and those with health insurance coverage, high education level, high household income, longer living in Beijing and previous experience with heart disease had greater knowledge of heart attack symptoms.Conclusions Public knowledge of common heart attack

  11. Swarm Flooding Attack against Directed Diffusion in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ibrahim S. I. Abuhaiba

    2012-11-01

    Full Text Available The objective of this paper is to study the vulnerabilities of sensor networks, design, and implement new approaches for routing attack. As one of the cornerstones of network infrastructure, routing systems are facing more threats than ever; they are vulnerable by nature and challenging to protect. We present a new attack, Swarm Flooding Attack, against Directed Diffusion based WSNs, which targets the consumption of sensors computational resources, such as bandwidth, disk space, or processor time. Two variants of swarm attack have been introduced: Bee and Ant. Both approaches are inspired from the natural swarming difference between bees and ants. In all cases, the strategy used to mount an attack is the same. An attack consists of a set of malicious user queries represented by interests that are inserted into the network. However, the two forms of attack vary in the synchronization aspects among attackers. These types of attacks are hard to defend against as illustrated. For each of the proposed attack models, we present analysis, simulation, and experimental measurements. We show that the system achieves maximal damage on system performance represented by many metrics.

  12. Gemcitabine-induced gouty arthritis attacks.

    Science.gov (United States)

    Bottiglieri, Sal; Tierson, Neil; Patel, Raina; Mo, Jae-Hyun; Mehdi, Syed

    2013-09-01

    In this case report, we review the experience of a patient who presented with early stage pancreatic cancer (Stage IIb) who underwent a Whipple procedure and adjuvant chemoradiation. The patient's past medical history included early stage colon cancer in remission, post-traumatic-stress-disorder, hypertension, hyperlipidemia, osteoarthritis, gout, and pre-diabetes. Chemotherapy initially consisted of weekly gemcitabine. The patient developed acute gouty attacks after his second dose of gemcitabine, which brought him to the emergency room for emergent treatment on several occasions. Gemcitabine was held and treatment began with fluorouracil and concurrent radiation. After completion of his chemoradiation with fluorouracil, he was again treated with weekly gemcitabine alone. As soon as the patient started gemcitabine chemotherapy the patient developed gouty arthritis again, requiring discontinuation of chemotherapy. The patient received no additional treatment until his recent recurrence 8 months later where gemcitabine chemotherapy was again introduced with prophylactic medications consisting of allopurinol 100 mg by mouth daily and colchicine 0.6 mg by mouth daily throughout gemcitabine chemotherapy, and no signs of gouty arthritis occurred. To our knowledge, this is the first case report describing gout attacks associated with gemcitabine therapy. There is limited data available describing the mechanism that gouty arthritis may be precipitated from gemcitabine chemotherapy. Further monitoring and management may be required in patients receiving gemcitabine chemotherapy with underlying gout.

  13. Enhancing network robustness for malicious attacks

    CERN Document Server

    Zeng, An

    2012-01-01

    In a recent work [Proc. Natl. Acad. Sci. USA 108, 3838 (2011)], the authors proposed a simple measure for network robustness under malicious attacks on nodes. With a greedy algorithm, they found the optimal structure with respect to this quantity is an onion structure in which high-degree nodes form a core surrounded by rings of nodes with decreasing degree. However, in real networks the failure can also occur in links such as dysfunctional power cables and blocked airlines. Accordingly, complementary to the node-robustness measurement ($R_{n}$), we propose a link-robustness index ($R_{l}$). We show that solely enhancing $R_{n}$ cannot guarantee the improvement of $R_{l}$. Moreover, the structure of $R_{l}$-optimized network is found to be entirely different from that of onion network. In order to design robust networks resistant to more realistic attack condition, we propose a hybrid greedy algorithm which takes both the $R_{n}$ and $R_{l}$ into account. We validate the robustness of our generated networks a...

  14. Recent computer attacks via Instant Messaging

    CERN Multimedia

    IT Department

    2008-01-01

    Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. Several computers at CERN have recently been broken into by attackers who have tricked users of Instant Messaging applications (e.g. MSN, Yahoo Messenger, etc.) into clicking on web links which appeared to come from known contacts. The links appeared to be photos from ‘friends’ and requested software to be installed. In practice, attacker software was installed and the messages did not come from real contacts. In the past such fake messages were mainly sent by email but now a wider range of applications are being targeted, including Instant Messaging. Cybercriminals are making growing use of fake messages to try to trick you into clicking on Web links which will help them to install malicious software on your computer. Anti-virus software cann...

  15. Expression of defensin paralogs across house fly life history: insights into fly-microbe interactions

    Science.gov (United States)

    House flies have a life-long association with microbe-rich environments. Larvae directly ingest bacteria in decaying substrates utilizing them for nutritional purposes. Adult house flies ephemerally associate with microbes, ingesting them either by direct feeding or indirectly during grooming. The h...

  16. Oral and Topical Toxicity of Fipronil to Melon Fly and Oriental Fruit Fly (Diptera: Tephritidae)

    Science.gov (United States)

    BACKGROUND: The objective of this study was to develop basic oral and topical toxicity data for Fipronil in Solulys protein bait to wild melon fly, Bactrocera cucurbitae (Coquillett) and the oriental fruit fly, Bactrocera dorsalis (Hendel). RESULTS: For the oral study, both females and males were ...

  17. Simulation of Attacks for Security in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Alvaro Diaz

    2016-11-01

    Full Text Available The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node’s software execution time and power consumption estimation. After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  18. Simulation of Attacks for Security in Wireless Sensor Network.

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-11-18

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  19. PROBA-3: Precise formation flying demonstration mission

    Science.gov (United States)

    Llorente, J. S.; Agenjo, A.; Carrascosa, C.; de Negueruela, C.; Mestreau-Garreau, A.; Cropp, A.; Santovincenzo, A.

    2013-01-01

    Formation Flying (FF) has generated a strong interest in many space applications, most of them involving a significant complexity for building for example on-board large "virtual structures or distributed observatories". The implementation of these complex formation flying missions with critical dependency on this new, advanced and critical formation technology requires a thorough verification of the system behaviour in order to provide enough guarantees for the target mission success. A significant number of conceptual or preliminary designs, analyses, simulations, and HW on-ground testing have been performed during the last years, but still the limitations of the ground verification determine that enough confidence of the behaviour of the formation flying mission will only be possible by demonstration in flight of the concept and the associated technologies. PROBA-3 is the mission under development at ESA for in-flight formation flying demonstration, dedicated to obtain that confidence and the necessary flight maturity level in the formation flying technologies for those future target missions. PROBA-3 will demonstrate technologies such as formation metrology sensors (from very coarse to highest accuracy), formation control and GNC, system operability, safety, etc. During the last years, PROBA-3 has evolved from the initial CDF study at ESA, to two parallel phase A studies, followed by a change in the industrial configuration for the Bridging step between A and B phases. Currently the SRR consolidation has been completed, and the project is in the middle of the phase B. After the phase A study SENER and GMV were responsible for the Formation Flying System, within a mission core team completed by OHB-Sweden, QinetiQ Space and CASA Espacio. In this paper an overview of the PROBA-3 mission is provided, with a more detailed description of the formation flying preliminary design and results.

  20. Dishonest Behaviors in Online Rating Systems: Cyber Competition, Attack Models, and Attack Generator

    Institute of Scientific and Technical Information of China (English)

    Ya-Fei Yang; Qin-Yuan Feng; Yen(Lindsay)Sun; Ya-Fei Dai

    2009-01-01

    Recently,online rating systems are gaining popularity.Dealing with unfair ratings in such systems has been recognized as an important but challenging problem.Many unfair rating detection approaches have been developed and evaluated against simple attack models.However,the lack of unfair rating data from real human users and realistic attack behavior models has become an obstacle toward developing reliable rating systems.To solve this problem,we design and launch a rating challenge to coHect anfair rating data from real human users.In order to broaden the scope of the data collection,we also develop a comprehensive signal-based unfair rating detection system.Based on the analysis of real attack data,we discover important features in unfair ratings,build attack models,and develop an unfair rating generator.The models and generator developed in this paper can be directly used to test current rating aggregation systems,as well as to assist the design of future rating systems.

  1. Minimizing Expected Maximum Risk from Cyber-Attacks with Probabilistic Attack Success

    Energy Technology Data Exchange (ETDEWEB)

    Bhuiyan, Tanveer H.; Nandi, Apurba; Medal, Hugh; Halappanavar, Mahantesh

    2016-07-16

    The goal of our work is to enhance network security by generating partial cut-sets, which are a subset of edges that remove paths from initially vulnerable nodes (initial security conditions) to goal nodes (critical assets), on an attack graph given costs for cutting an edge and a limited overall budget.

  2. An Attack Investigation, Characterization and Simulation of Various Attacks in MANET

    Directory of Open Access Journals (Sweden)

    Pratik Gite

    2015-01-01

    Full Text Available Mobile Ad-hoc Network is one of the most popular network technology in the field of research and development community. Due to their dynamic and ad-hoc nature, the network suffers from the various performance and security issues. The main objective of this paper is to evaluate the performance of Ad-hoc On Demand Distance Vector (AODV routing protocol under normal condition and attacks conditions on the basis of different performance metrics. This paper is also concerned about the different kinds of attacks formation viz. Black Hole, Worm Hole, Gray Hole and Denial of Service attacks on MANET environment. In addition of that different kinds of approaches available for detection and prevention of such attacks are also investigated. Finally using different experimentation and simulations through NS-2, the effort is made to identify the effective network characteristics. After concluding the effects and simulation the need of a new Intrusion Detection System (IDS model is presented for future implementation.

  3. Wing and body kinematics of forward flight in drone-flies.

    Science.gov (United States)

    Meng, Xue Guang; Sun, Mao

    2016-08-15

    Here, we present a detailed analysis of the wing and body kinematics in drone-flies in free flight over a range of speeds from hovering to about 8.5 m s(-1). The kinematics was measured by high-speed video techniques. As the speed increased, the body angle decreased and the stroke plane angle increased; the wingbeat frequency changed little; the stroke amplitude first decreased and then increased; the ratio of the downstroke duration to the upstroke duration increased; the mean positional angle increased at lower speeds but changed little at speeds above 3 m s(-1). At a speed above about 1.5 m s(-1), wing rotation at supination was delayed and that at pronation was advanced, and consequently the wing rotations were mostly performed in the upstroke. In the downstroke, the relative velocity of the wing increased and the effective angle of attack decreased with speed; in the upstroke, they both decreased with speed at lower speeds, and at higher speeds, the relative velocity became larger but the effective angle of attack became very small. As speed increased, the increasing inclination of the stroke plane ensured that the effective angle of attack in the upstroke would not become negative, and that the wing was in suitable orientations for vertical-force and thrust production.

  4. Corrosion Behavior of Steel Reinforcement in Concrete with Recycled Aggregates, Fly Ash and Spent Cracking Catalyst

    Directory of Open Access Journals (Sweden)

    Hebé Gurdián

    2014-04-01

    Full Text Available The main strategy to reduce the environmental impact of the concrete industry is to reuse the waste materials. This research has considered the combination of cement replacement by industrial by-products, and natural coarse aggregate substitution by recycled aggregate. The aim is to evaluate the behavior of concretes with a reduced impact on the environment by replacing a 50% of cement by industrial by-products (15% of spent fluid catalytic cracking catalyst and 35% of fly ash and a 100% of natural coarse aggregate by recycled aggregate. The concretes prepared according to these considerations have been tested in terms of mechanical strengths and the protection offered against steel reinforcement corrosion under carbonation attack and chloride-contaminated environments. The proposed concrete combinations reduced the mechanical performance of concretes in terms of elastic modulus, compressive strength, and flexural strength. In addition, an increase in open porosity due to the presence of recycled aggregate was observed, which is coherent with the changes observed in mechanical tests. Regarding corrosion tests, no significant differences were observed in the case of the resistance of these types of concretes under a natural chloride attack. In the case of carbonation attack, although all concretes did not stand the highly aggressive conditions, those concretes with cement replacement behaved worse than Portland cement concretes.

  5. AN INTEGRATED APPROACH AGAINST APP-DDoS FOR MITIGATING IP SPOOFED ATTACKS AND MAC ATTACKS

    Directory of Open Access Journals (Sweden)

    S.PRABHA

    2013-06-01

    Full Text Available The nature of data traffic flow from wired network is extremely different from wireless network. Therefore as the DDoS application service attacks from the wired ones are produced from IP frame and wireless ones from Media Access Control (MAC frame. The variant in the frames motivates the requirement of enhanced resistive mechanism for application DDoS attacks for interfaced internet application servers enabled with both wired and wireless infrastructure. With the wired and wireless interface access in internet application services made us to present an Application Service Network Request Identification (ASNRI scheme in this work. ASNRI scheme first identifies the type of data stream frame and input it to the IHBCM method. In Bayes packet classifier, separated data frames are verified for its malicious characteristic in its data frame attributes to filter out the malicious data packet frames. Simulations are carried out to evaluate the performance of ASNRI to conventional application DDoS attack resistance schemes by measuring its true positive and true negative of data frame classification and its malicious attack resistance rate at different traffic volumes.In the process of applying Bayes has been planned to provide insight into the behavior of this technique itself. In this paper has been illustrated the sensitivity of the algorithm to its initial assumptions and demonstrated the use of two techniques, one to break the Gaussian assumptions and the other to improve the quality of discriminators as input, It leads to significant improvements in the accuracy of the Bayes technique. Integrated Hidden Markov Model (HMM and Bayes Packet Classifier based Gaussian distribution factor to detect and respond to the App-DDoS attacks if they occur during a flash crowd event for both dynamic and stationary objects.

  6. Characteristics of MSWI fly ash during vitrification

    Institute of Scientific and Technical Information of China (English)

    TIAN Shu-lei; WANG Qi; WANG Qun-hui; MA Hong-zhi

    2009-01-01

    The vitrification characteristics of municipal solid waste incinerator (MSWI) fly ash were investigated. Effects of temperature on the binding efficiency of heavy metals, the change of chemical compositions and the weight loss of fly ash in the range of 800 - 1350 ℃ were studied. Toxicity Characteristic Leaching Procedure (TCLP) of the United States was used to analyze the leaching characteristics of heavy metals in fly ash and molten slag. Results indicate that chemical compositions, the weight loss of fly ash and the binding efficiency of heavy metals in fly ash have a tremendous change in the range of 1150 - 1260 ℃. The percentage of CaO, SiO2and AI203 increases with the increasing temperature, whereas it is contrary for SO3 , K2O, Na20 and CI; especially when the temperature is 1260 ℃, the percentage of these four elements decreases sharply from 43.72%to 0. 71%. The weight loss occurs obviously in the range of 1150 - 1260 ℃. Heavy metals of Pb and Cd are almost vaporized above 1000 ℃. Cr is not volatile and its binding efficiency can reach 100% below 1000 ℃. Resuits of TCLP indicate that the heavy metal content of molten slag is beyond stipulated limit values.

  7. Social attraction mediated by fruit flies' microbiome.

    Science.gov (United States)

    Venu, Isvarya; Durisko, Zachary; Xu, Jianping; Dukas, Reuven

    2014-04-15

    Larval and adult fruit flies are attracted to volatiles emanating from food substrates that have been occupied by larvae. We tested whether such volatiles are emitted by the larval gut bacteria by conducting tests under bacteria-free (axenic) conditions. We also tested attraction to two bacteria species, Lactobacillus brevis, which we cultured from larvae in our lab, and L. plantarum, a common constituent of fruit flies' microbiome in other laboratory populations and in wild fruit flies. Neither larvae nor adults showed attraction to axenic food that had been occupied by axenic larvae, but both showed the previously reported attraction to standard food that had been occupied by larvae with an intact microbiome. Larvae also showed significant attraction to volatiles from axenic food and larvae to which we added only either L. brevis or L. plantarum, and volatiles from L. brevis reared on its optimal growth medium. Controlled learning experiments indicated that larvae experienced with both standard and axenic used food do not perceive either as superior, while focal larvae experienced with simulated used food, which contains burrows, perceive it as superior to unused food. Our results suggest that flies rely on microbiome-derived volatiles for long-distance attraction to suitable food patches. Under natural settings, fruits often contain harmful fungi and bacteria, and both L. brevis and L. plantarum produce compounds that suppress the growth of some antagonistic fungi and bacteria. The larval microbiome volatiles may therefore lead prospective fruit flies towards substrates with a hospitable microbial environment.

  8. Why cryptography should not rely on physical attack complexity

    CERN Document Server

    Krämer, Juliane

    2015-01-01

    This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two indepe...

  9. Detection and Isolation of Packet Dropping Attacker in MANETs

    Directory of Open Access Journals (Sweden)

    Ahmed Mohamed Abdalla

    2013-05-01

    Full Text Available Several approaches have been proposed for Intrusion Detection Systems (IDS in Mobile Ad hoc Networks (MANETs. Due to lack of MANETs infrastructure and well defined perimeter MANETs are susceptible to a variety of attacker types. To develop a strong security mechanism it is necessary to understand how malicious nodes can attack the MANETs. A new IDS mechanism is presented based on End-to-End connection for securing Optimized Link State Routing (OLSR routing protocol. This new mechanism is named as Detection and Isolation Packet Dropped Attackers in MANETs (DIPDAM. DIPDAM mechanism based on three ID messages Path Validation Message (PVM , Attacker Finder Message (AFM and Attacker Isolation Message (AIM. DIPDAM mechanism based on End-to-End (E2E communication between the source and the destination is proposed. The simulation results showed that the proposed mechanism is able to detect any number of attackers while keeping a reasonably low overhead in terms of network traffic.

  10. Preventing Recommendation Attack in Trust-Based Recommender Systems

    Institute of Scientific and Technical Information of China (English)

    Fu-Guo Zhang

    2011-01-01

    Despite its success,similarity-based collaborative filtering suffers from some limitations,such as scalability,sparsity and recommendation attack.Prior work has shown incorporating trust mechanism into traditional collaborative filtering recommender systems can improve these limitations.We argue that trust-based recommender systems are facing novel recommendation attack which is different from the profile injection attacks in traditional recommender system.To the best of our knowledge,there has not any prior study on recommendation attack in a trust-based recommender system.We analyze the attack problem,and find that "victim" nodes play a significant role in the attack.Furthermore,we propose a data provenance method to trace malicious users and identify the "victim" nodes as distrust users of recommender system.Feasibility study of the defend method is done with the dataset crawled from Epinions website.

  11. Attacks on Web Based Software and Modelling Defence Mechanisms

    Directory of Open Access Journals (Sweden)

    D.R. Ingle

    2012-08-01

    Full Text Available The software life cycle was in use to develop the good software. Now a day’s the software development life cycle should incorporate the security features. Input Validation Attacks are one of the most wide spread forms of vulnerability on the Web application. Our main intention is to focuses on detection and prevention of Input Validation attacks like SQL Injection, Cross Site Scripting and Buffer Overflow by incorporating security in software development life cycle. We have introduced a novel approach of preclusion and uncovering of Input Validation Attacks. SQL Injection , Cross Site Scripting, A buffer overflow attacks, experimentations are made to do these attacks on various sides and the defense mechanism model is proposed to avoid these attacks on the code.

  12. Attacker Control and Impact for Confidentiality and Integrity

    CERN Document Server

    Askarov, Aslan

    2011-01-01

    Language-based information flow methods offer a principled way to enforce strong security properties, but enforcing noninterference is too inflexible for realistic applications. Security-typed languages have therefore introduced declassification mechanisms for relaxing confidentiality policies, and endorsement mechanisms for relaxing integrity policies. However, a continuing challenge has been to define what security is guaranteed when such mechanisms are used. This paper presents a new semantic framework for expressing security policies for declassification and endorsement in a language-based setting. The key insight is that security can be characterized in terms of the influence that declassification and endorsement allow to the attacker. The new framework introduces two notions of security to describe the influence of the attacker. Attacker control defines what the attacker is able to learn from observable effects of this code; attacker impact captures the attacker's influence on trusted locations. This ap...

  13. A Secure Localization Approach against Wormhole Attacks Using Distance Consistency

    Directory of Open Access Journals (Sweden)

    Lou Wei

    2010-01-01

    Full Text Available Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or wireless link to another point, and the other relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization and propose a novel distance-consistency-based secure localization scheme against wormhole attacks, which includes three phases of wormhole attack detection, valid locators identification and self-localization. The theoretical model is further formulated to analyze the proposed secure localization scheme. The simulation results validate the theoretical results and also demonstrate the effectiveness of our proposed scheme.

  14. Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication

    Science.gov (United States)

    Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru

    In this paper, we propose password recovery attacks against challenge-response authentication protocols. Our attacks use a message difference for a MD5 collision attack proposed in IEICE 2008. First, we show how to efficiently find a message pair that collides with the above message difference. Second, we show that a password used in authenticated post office protocol (APOP) can be recovered practically. We also show that the password recovery attack can be applied to a session initiation protocol (SIP) and digest authentication. Our attack can recover up to the first 31 password characters in a short time and up to the first 60 characters faster than the naive search method. We have implemented our attack and confirmed that 31 characters can be successfully recovered.

  15. Variability of clinical features in attacks of migraine with aura

    DEFF Research Database (Denmark)

    Hansen, Jakob M; Goadsby, Peter J; Charles, Andrew C

    2016-01-01

    BACKGROUND: There is significant variability in the clinical presentation of migraine, both among patients, and between attacks in an individual patient. We examined clinical features of migraine with aura in a large group of patients enrolled in a clinical trial, and compared retrospective...... migraine attack characteristics reported upon enrollment in the trial with those recorded prospectively in the trial. METHODS: Patients with migraine (n = 267) with typical visual aura in more than 30% of their attacks were enrolled from 16 centers for a clinical trial. Upon enrollment, patients provided...... a detailed retrospective description of the clinical features of their attacks of migraine. During the trial, clinical symptoms in migraine attacks starting with aura were recorded prospectively in 861 attacks. RESULTS: Retrospectively reported visual aura symptoms were variable and often overlapping...

  16. Attack and Vulnerability Penetration Testing: FreeBSD

    Directory of Open Access Journals (Sweden)

    Abdul Hanan Abdullah

    2013-07-01

    Full Text Available Computer system security has become a major concern over the past few years. Attacks, threasts or intrusions, against computer system and network have become commonplace events. However, there are some system devices and other tools that are available to overcome the threat of these attacks. Currently, cyber attack is a major research and inevitable. This paper presents some steps of penetration in FreeBSD operating system, some tools and new steps to attack used in this experiment, probes for reconnaissance, guessing password via brute force, gaining privilege access and flooding victim machine to decrease availability. All these attacks were executed and infiltrate within the environment of Intrusion Threat Detection Universiti Teknologi Malaysia (ITD UTM data set. This work is expected to be a reference for practitioners to prepare their systems from Internet attacks.

  17. Detection and Defense Against Packet Drop Attack in MANET

    Directory of Open Access Journals (Sweden)

    Tariq Ahamad

    2016-02-01

    Full Text Available MANET is a temporary network for a specified work and with the enormous growth MANETs it is becoming important and simultaneously challenging to protect this network from attacks and other threats. Packet drop attack or gray hole attack is the easiest way to make a denial of service in these dynamic networks. In this attack the malicious node reflects itself as the shortest path and receives all the packets and drops the selected packets in order to give the user the service that that is not correct. It is a specific kind of attack and protects the network and user from detecting this malicious activity. In this article I have proposed an efficient for step technique that confirms that this attack can be detected and defended with least efforts and resource consumption.

  18. Relating Admissibility Standards for Digital Evidence to Attack Scenario Reconstruction

    Directory of Open Access Journals (Sweden)

    Changwei Liu

    2014-09-01

    Full Text Available Attackers tend to use complex techniques such as combining multi-step, multi-stage attack with anti-forensic tools to make it difficult to find incriminating evidence and reconstruct attack scenarios that can stand up to the expected level of evidence admissibility in a court of law. As a solution, we propose to integrate the legal aspects of evidence correlation into a Prolog based reasoner to address the admissibility requirements by creating most probable attack scenarios that satisfy admissibility standards for substantiating evidence. Using a prototype implementation, we show how evidence extracted by using forensic tools can be integrated with legal reasoning to reconstruct network attack scenarios. Our experiment shows this implemented reasoner can provide pre-estimate of admissibility on a digital crime towards an attacked network.

  19. The Impact of Black-Hole Attack on ZRP Protocol

    Directory of Open Access Journals (Sweden)

    CHAHIDI Badr

    2016-07-01

    Full Text Available lack of infrastructure in ad hoc networks makes their deployment easier. Each node in an ad hoc network can route data using a routing protocol, which decreases the level of security. Ad hoc networks are exposed to several attacks such as the blackhole attack. In this article, a study has been made on the impact of the attack on the hybrid routing protocol ZRP (Zone Routing Protocol. In this attack a malicious node is placed between two or more nodes in order to drop data. The trick of the attack is simple, the malicious node declares to have the most reliable way to the destination so that the wife destination chooses this path. In this study, NS2 is used to assess the impact of the attack on ZRP. Two metrics measure, namely the packet delivered ratio and end to end delay.

  20. REVIEW CLUSTERING MECHANISMS OF DISTRIBUTED DENIAL OF SERVICE ATTACKS

    Directory of Open Access Journals (Sweden)

    Wesam Bhaya

    2014-01-01

    Full Text Available Distributed Denial of Service attacks (DDoS overwhelm network resources with useless or harmful packets and prevent normal users from accessing these network resources. These attacks jeopardize the confidentiality, privacy and integrity of information on the internet. Since it is very difficult to set any predefined rules to correctly identify genuine network traffic, an anomaly-based Intrusion Detection System (IDS for network security is commonly used to detect and prevent new DDoS attacks. Data mining methods can be used in intrusion detection systems, such as clustering k-means, artificial neural network. Since the clustering methods can be used to aggregate similar objects, they can detect DDoS attacks to reduce false-positive rates. In this study, a review of DDoS attacks using clustering data mining techniques is presented. A review illustrates the most recent, state-of-the art science for clustering techniques to detect DDoS attacks.

  1. Breakdown of an Inhomogeneous Scale- Free Network Under Intentional Attack

    Institute of Scientific and Technical Information of China (English)

    LIN Guo-Ji; CHENG Xiang; OU-YANG Qi

    2003-01-01

    Using a recently introduced network model with node and connection diversity, we study the breakdown of different scale-free networks under intentional attacks. Our simulation results show that inhomogeneous networks are more sensitive to intentional attack than the homogeneous ones and that the centralization of the networks is an important variable, reflecting the characteristics of the network under intentional attack. Using a recently introduced method we can theoretically develop the critical point of the inhomogeneous networks.

  2. Vulnerabilities and Attacks Targeting Social Networks and Industrial Control Systems

    OpenAIRE

    Singh, Dharmendra; Sinha, Rakhi; Songara, Pawan; Rathi, Dr. Rakesh

    2014-01-01

    Vulnerability is a weakness, shortcoming or flaw in the system or network infrastructure which can be used by an attacker to harm the system, disrupt its normal operation and use it for his financial, competitive or other motives or just for cyber escapades. In this paper, we re-examined the various types of attacks on industrial control systems as well as on social networking users. We have listed which all vulnerabilities were exploited for executing these attacks and their effects on these...

  3. Non-harmful insertion of data mimicking computer network attacks

    Science.gov (United States)

    Neil, Joshua Charles; Kent, Alexander; Hash, Jr, Curtis Lee

    2016-06-21

    Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.

  4. New trends in Internet attacks: Clickjacking in detail

    OpenAIRE

    Thoresen, Torgeir Dahlqvist

    2009-01-01

    While the complexity of web applications and their functionality continually increase, so do the number of opportunities for an attacker to launch successful attacks against a web application's users. In this thesis we investigate and describe clickjacking in great detail. To our knowledge, this work represent the first systematic scientific approach to assess clickjacking that also consider the attack's social consequences for users' security through an experiment and survey. We address the...

  5. The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network

    Science.gov (United States)

    2014-02-01

    ping-o-death. html. [40] S. Savage, N. Cardwell, D. Wetherall, and T. Anderson, “TCP Con- gestion Control with a Misbehaving Receiver,” ACM SIGCOMM CCR...forcing them to choose guard nodes in control of the adversary. Finally, we discuss defenses against the Sniper Attack that provably render the attack...in control of the adversary. Our attack thus imposes real, significant threats to Tor’s users,1 and we believe it constitutes the most devastating

  6. Cooperative Defense Against DDoS Attack using GOSSIP Protocol

    OpenAIRE

    Sohail, Imran; Hayat,Sikandar

    2009-01-01

    The ability to detect and prevent a network from DDoS attack and to ensure the high quality infrastructure is a back bone of today’s network security issues. In this thesis, we have successfully validated an algorithm using OmNet++ Ver. 4.0 simulation to show how a DDoS attack can be detected and how the nodes can be protected from such an attack using GOSSIP protocol.

  7. Participant attack on quantum secret sharing based on entanglement swapping

    Institute of Scientific and Technical Information of China (English)

    Song Ting-Ting; Zhang Jie; Gao Fei; Wen Qiao-Yan; Zhu Fu-Chen

    2009-01-01

    The security of quantum secret sharing based on entanglement swapping is revisited and a participant attack is presented.In this attack two dishonest agents together can illegally recover the secret quantum state without the help of any other controller,and it will not be detected by any othcr users.Furthermore,by modifying the distribution process of particles and adding a detection step after each distribution process,we propose an improved protocol which can resist this kind of attack.

  8. High chromosomal variation in wild horn fly Haematobia irritans (Linnaeus (Diptera, Muscidae populations

    Directory of Open Access Journals (Sweden)

    Natalia Forneris

    2015-02-01

    Full Text Available The horn fly, Haematobia irritans is an obligate haematophagous cosmopolitan insect pest. The first reports of attacks on livestock by H. irritans in Argentina and Uruguay occurred in 1991, and since 1993 it is considered an economically important pest. Knowledge on the genetic characteristics of the horn fly increases our understanding of the phenotypes resistant to insecticides that repeatedly develop in these insects. The karyotype of H. irritans, as previously described using flies from an inbred colony, shows a chromosome complement of 2n=10 without heterochromosomes (sex chromosomes. In this study, we analyze for the first time the chromosome structure and variation of four wild populations of H. irritans recently established in the Southern Cone of South America, collected in Argentina and Uruguay. In these wild type populations, we confirmed and characterized the previously published “standard” karyotype of 2n=10 without sex chromosomes; however, surprisingly a supernumerary element, called B-chromosome, was found in about half of mitotic preparations. The existence of statistically significant karyotypic diversity was demonstrated through the application of orcein staining, C-banding and H-banding. This study represents the first discovery and characterization of horn fly karyotypes with 2n=11 (2n=10+B. All spermatocytes analyzed showed 5 chromosome bivalents, and therefore, 2n=10 without an extra chromosome. Study of mitotic divisions showed that some chromosomal rearrangements affecting karyotype structure are maintained as polymorphisms, and multiple correspondence analyses demonstrated that genetic variation was not associated with geographic distribution. Because it was never observed during male meiosis, we hypothesize that B-chromosome is preferentially transmitted by females and that it might be related to sex determination.

  9. High chromosomal variation in wild horn fly Haematobia irritans (Linnaeus) (Diptera, Muscidae) populations

    Science.gov (United States)

    Forneris, Natalia S.; Otero, Gabriel; Pereyra, Ana; Repetto, Gustavo; Rabossi, Alejandro; Quesada-Allué, Luis A.; Basso, Alicia L.

    2015-01-01

    Abstract The horn fly, Haematobia irritans is an obligate haematophagous cosmopolitan insect pest. The first reports of attacks on livestock by Haematobia irritans in Argentina and Uruguay occurred in 1991, and since 1993 it is considered an economically important pest. Knowledge on the genetic characteristics of the horn fly increases our understanding of the phenotypes resistant to insecticides that repeatedly develop in these insects. The karyotype of Haematobia irritans, as previously described using flies from an inbred colony, shows a chromosome complement of 2n=10 without heterochromosomes (sex chromosomes). In this study, we analyze for the first time the chromosome structure and variation of four wild populations of Haematobia irritans recently established in the Southern Cone of South America, collected in Argentina and Uruguay. In these wild type populations, we confirmed and characterized the previously published “standard” karyotype of 2n=10 without sex chromosomes; however, surprisingly a supernumerary element, called B-chromosome, was found in about half of mitotic preparations. The existence of statistically significant karyotypic diversity was demonstrated through the application of orcein staining, C-banding and H-banding. This study represents the first discovery and characterization of horn fly karyotypes with 2n=11 (2n=10+B). All spermatocytes analyzed showed 5 chromosome bivalents, and therefore, 2n=10 without an extra chromosome. Study of mitotic divisions showed that some chromosomal rearrangements affecting karyotype structure are maintained as polymorphisms, and multiple correspondence analyses demonstrated that genetic variation was not associated with geographic distribution. Because it was never observed during male meiosis, we hypothesize that B-chromosome is preferentially transmitted by females and that it might be related to sex determination. PMID:25893073

  10. An Improved Model of Attack Probability Prediction System

    Institute of Scientific and Technical Information of China (English)

    WANG Hui; LIU Shufen; ZHANG Xinjia

    2006-01-01

    This paper presents a novel probability generation algorithm to predict attacks from an insider who exploits known system vulnerabilities through executing authorized operations. It is different from most intrusion detection systems (IDSs) because these IDSs are inefficient to resolve threat from authorized insiders. To deter cracker activities, this paper introduces an improved structure of augmented attack tree and a notion of "minimal attack tree", and proposes a new generation algorithm of minimal attack tree. We can provide a quantitative approach to help system administrators make sound decision.

  11. Impact Analysis of Recent DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Ketki Arora

    2011-02-01

    Full Text Available In the present era Internet has changed the way of traditional essential services such as banking, transportation, power, health, and defence being operated. These operations are being replacedby cheaper, more efficient Internet-based applications. It is all because of rapid growth and success of Internet in every sector. Unfortunately with the growth of Internet, count of attacks on Internet has also increased incredibly fast. Denial-of-service attack is one of them, which poses immense threat on the availability. Since, the World is highly dependent on the Internet, availability of the Internet is very critical for the socio-economic growth of the society. Denial-of-service attacks occur almost every day,and the frequency and the volume of these attacks are increasing day by day. One of the biggest challenges before researchers is to find the details of such attacks because due to damaging reputationissues, most of the commercial sites do not even disclose that they were blitzed by such attacks. Details of attacks can guide very well in the formulation of comprehensive defensive solution for such attacks. In this paper, an overview on DDoS problem, major factors causing DDoS attacks are demonstrated, brief detail of most recent DDoS incidents on online organizations is outlined and finally, the need for a comprehensive distributed solution is highlighted.

  12. Software test attacks to break mobile and embedded devices

    CERN Document Server

    Hagar, Jon Duncan

    2013-01-01

    Address Errors before Users Find Them Using a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of ""smart"" devices driven by software, the book focuses on attack-based testing that can be used by individuals and teams. The numerous test attacks show you when a software product does not work (i.e., has bugs) and provide you with information about the software product under test. The book guides you step by step starting with the basics. It

  13. Application distribution model and related security attacks in VANET

    Science.gov (United States)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  14. Intrusions into Privacy in Video Chat Environments: Attacks and Countermeasures

    CERN Document Server

    Xing, Xinyu; Han, Richard; Liu, Xue; Mishra, Shivakant

    2010-01-01

    Video chat systems such as Chatroulette have become increasingly popular as a way to meet and converse one-on-one via video and audio with other users online in an open and interactive manner. At the same time, security and privacy concerns inherent in such communication have been little explored. This paper presents one of the first investigations of the privacy threats found in such video chat systems, identifying three such threats, namely de-anonymization attacks, phishing attacks, and man-in-the-middle attacks. The paper further describes countermeasures against each of these attacks.

  15. Network attacks and defenses a hands-on approach

    CERN Document Server

    Trabelsi, Zouheir; Al Braiki, Arwa; Mathew, Sujith Samuel

    2012-01-01

    The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both offensive and defensive techniques. Using step-by-step processes to build and generate attacks using offensive techniques, Network Attacks and Defenses: A Hands-on Approach enables students to implement appropriate network security solutions within a laborat

  16. Fake BTS Attacks of GSM System on Software Radio Platform

    Directory of Open Access Journals (Sweden)

    Yubo Song

    2012-02-01

    Full Text Available The 2G GSM communication system only provides one-way authentication mechanism which just authenticate the identities of mobile users. As we know, this is not resistant to fake BTS attack. But for the huge cost for building a fake BTS before, this kind of attack were not really implemented before. This paper presents an implement of fake BTS based on software radio technologies. Furthermore, this paper discusses two types of fake BTS attacks on our software radio platform. The first attack is IMSI/IMEI catch attack, which can get the mobile phone’s IMSI and IMEI. With this information, attacker can got the track of the man with this phone. The second attack is selective jamming attack. After get the IMSI and IMEI of the mobile phone, the attackers can decide whether the mobile phone is blocked or not. We will analyze the GSM protocol which is relevant to the interception system and later present the performance of such a system by real tests and demonstrate its feasibility.

  17. Cyber-physical attacks a growing invisible threat

    CERN Document Server

    Loukas, George

    2015-01-01

    Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road,  or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral

  18. Flooding Distributed Denial of Service Attacks-A Review

    Directory of Open Access Journals (Sweden)

    Khadijah W.M. Ghazali

    2011-01-01

    Full Text Available Problem statement: Flaws either in users’ implementation of a network or in the standard specification of protocols has resulted in gaps that allow various kinds of network attack to be launched. Of the kinds of network attacks, denial-of-service flood attacks have caused the most severe impact. Approach: This study reviews recent researches on flood attacks and their mitigation, classifying such attacks as either high-rate flood or low-rate flood. Finally, the attacks are compared against criteria related to their characteristics, methods and impacts. Results: Denial-of-service flood attacks vary in their rates, traffic, targets, goals and impacts. However, they have general similarities that are the methods used are flooding and the main purpose is to achieve denial of service to the target. Conclusion/Recommendations: Mitigation of the denial-of-service flood attacks must correspond to the attack rates, traffic, targets, goals and impacts in order to achieve effective solution.

  19. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  20. Counting equations in algebraic attacks on block ciphers

    DEFF Research Database (Denmark)

    Knudsen, Lars Ramkilde; Miolane, Charlotte Vikkelsø

    2010-01-01

    This paper is about counting linearly independent equations for so-called algebraic attacks on block ciphers. The basic idea behind many of these approaches, e.g., XL, is to generate a large set of equations from an initial set of equations by multiplication of existing equations by the variables...... independent equations which can be generated in algebraic attacks within each of these sets of a certain degree. While this does not give us a direct formula for the success of algebraic attacks on block ciphers, it gives some interesting bounds on the number of equations one can obtain from a given block...... to the algebraic attacks as defined here....