WorldWideScience

Sample records for initial attack success

  1. Predicting the effect of climate change on wildfire behavior and initial attack success

    Science.gov (United States)

    Jeremy S. Fried; J. Keith Gilless; William J. Riley; Tadashi J. Moody; Clara Simon de Blas; Katharine Hayhoe; Max Mortiz; Scott Stephens; Margaret Torn

    2008-01-01

    This study focused on how climate change-induced effects on weather will translate into changes in wildland fire severity and outcomes in California, particularly on the effectiveness of initial attack at limiting the number of fires that escape initial attack. The results indicate that subtle shifts in fire behavior of the sort that might be induced by the climate...

  2. Predicting the effect of climate change on wildfire behavior and initial attack success

    Energy Technology Data Exchange (ETDEWEB)

    Riley, William; Fried, Jeremy S.; Gilless, J. Keith; Riley, William J.; Moody, Tadashi J.; Simon de Blas, Clara; Hayhoe, Katharine; Moritz, Max; Stephens, Scott; Torn, Margaret

    2007-12-01

    This study focused on how climate change-induced effects on weather will translate into changes in wildland fire severity and outcomes in California, particularly on the effectiveness of initial attack at limiting the number of fires that escape initial attack. The results indicate that subtle shifts in fire behavior of the sort that might be induced by the climate changes anticipated for the next century are of sufficient magnitude to generate an appreciable increase in the number of fires that escape initial attack. Such escapes are of considerable importance in wildland fire protection planning, given the high cost to society of a catastrophic escape like those experienced in recent decades in the Berkeley-Oakland, Santa Barbara, San Diego, or Los Angeles areas. However, at least for the three study areas considered, it would appear that relatively modest augmentations to existing firefighting resources might be sufficient to compensate for change-induced changes in wildland fire outcomes.

  3. On the anatomy of social engineering attacks: A literature-based dissection of successful attacks

    OpenAIRE

    Bullée, Jan Willem Hendrik; Montoya, Lorena; Pieters, W.; Junger, M.; Hartel, P.H.

    2018-01-01

    The aim of this study was to explore the extent to which persuasion principles are used in successful social engineering attacks. Seventy-four scenarios were extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenario was split into attack steps, containing single interactions between offender and target. For each attack step, persuasion principles were identified. The main findings are that (a) persuasion principles are often used in social engineer...

  4. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullée, Jan Willem Hendrik; Montoya, Lorena; Pieters, W.; Junger, M.; Hartel, P.H.

    2018-01-01

    The aim of this study was to explore the extent to which persuasion principles are used in successful social engineering attacks. Seventy-four scenarios were extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenario was split into attack steps,

  5. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing

  6. Minimizing Expected Maximum Risk from Cyber-Attacks with Probabilistic Attack Success

    Energy Technology Data Exchange (ETDEWEB)

    Bhuiyan, Tanveer H.; Nandi, Apurba; Medal, Hugh; Halappanavar, Mahantesh

    2016-07-16

    The goal of our work is to enhance network security by generating partial cut-sets, which are a subset of edges that remove paths from initially vulnerable nodes (initial security conditions) to goal nodes (critical assets), on an attack graph given costs for cutting an edge and a limited overall budget.

  7. Analysing initial attack on wildland fires using stochastic simulation.

    Science.gov (United States)

    Jeremy S. Fried; J. Keith Gilless; James. Spero

    2006-01-01

    Stochastic simulation models of initial attack on wildland fire can be designed to reflect the complexity of the environmental, administrative, and institutional context in which wildland fire protection agencies operate, but such complexity may come at the cost of a considerable investment in data acquisition and management. This cost may be well justified when it...

  8. Successful attack on permutation-parity-machine-based neural cryptography.

    Science.gov (United States)

    Seoane, Luís F; Ruttor, Andreas

    2012-02-01

    An algorithm is presented which implements a probabilistic attack on the key-exchange protocol based on permutation parity machines. Instead of imitating the synchronization of the communicating partners, the strategy consists of a Monte Carlo method to sample the space of possible weights during inner rounds and an analytic approach to convey the extracted information from one outer round to the next one. The results show that the protocol under attack fails to synchronize faster than an eavesdropper using this algorithm.

  9. Privacy-Enhancing Security Protocol in LTE Initial Attack

    Directory of Open Access Journals (Sweden)

    Uijin Jang

    2014-12-01

    Full Text Available Long-Term Evolution (LTE is a fourth-generation mobile communication technology implemented throughout the world. It is the communication means of smartphones that send and receive all of the private date of individuals. M2M, IOT, etc., are the base technologies of mobile communication that will be used in the future cyber world. However, identification parameters, such as International Mobile Subscriber Identity (IMSI, Radio Network Temporary Identities (RNTI, etc., in the initial attach section for accessing the LTE network are presented with the vulnerability of being exposed as clear text. Such vulnerability does not end in a mere identification parameter, but can lead to a secondary attack using the identification parameter, such as replication of the smartphone, illegal use of the mobile communication network, etc. This paper proposes a security protocol to safely transmit identification parameters in different cases of the initial attach. The proposed security protocol solves the exposed vulnerability by encrypting the parameters in transmission. Using an OPNET simulator, it is shown that the average rate of delay and processing ratio are efficient in comparison to the existing process.

  10. Underlying Reasons for Success and Failure of Terrorist Attacks: Selected Case Studies

    National Research Council Canada - National Science Library

    McCleskey, Edward; McCord, Diana; Leetz, Jennifer; Markey, John

    2007-01-01

    .... This is the second of a two-phased effort: Phase I focused on assessing the underlying reasons for the success and failure of terrorist attacks against targets within the United States and against U.S. interests abroad...

  11. Attacking 22 entries in rugby union: running demands and differences between successful and unsuccessful entries.

    Science.gov (United States)

    Tierney, P; Tobin, D P; Blake, C; Delahunt, E

    2017-12-01

    Global Positioning System (GPS) technology is commonly utilized in team sports, including rugby union. It has been used to describe the average running demands of rugby union. This has afforded an enhanced understanding of the physical fitness requirements for players. However, research in team sports has suggested that training players relative to average demands may underprepare them for certain scenarios within the game. To date, no research has investigated the running demands of attacking 22 entries in rugby union. Additionally, no research has been undertaken to determine whether differences exist in the running intensity of successful and unsuccessful attacking 22 entries in rugby union. The first aim of this study was to describe the running intensity of attacking 22 entries. The second aim of this study was to investigate whether differences exist in the running intensity of successful and unsuccessful attacking 22 entries. Running intensity was measured using meters per minute (m min -1 ) for (a) total distance, (b) running distance, (c) high-speed running distance, and (d) very high-speed running distance. This study provides normative data for the running intensity of attacking 22 entries in rugby union. Forwards achieved greater high-speed running intensity in successful (3.6 m min -1 ) compared to unsuccessful (1.8 m min -1 ) attacking 22 entries. Forwards should try and achieve greater high-speed running intensity in attacking 22 entries to increase the likelihood of successful outcomes during this period of gameplay. © 2016 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  12. Panic attacks and hoarding disorder: an initial investigation.

    Science.gov (United States)

    Raines, Amanda M; Oglesby, Mary E; Short, Nicole A; Albanese, Brian J; Schmidt, Norman B

    2014-08-01

    Panic attacks (PAs) defined as a discrete period of intense fear or discomfort, occur in the context of numerous anxiety and mood related disorders. Research has suggested that PAs serve as a significant indicator and prognostic factor for overall symptom severity, course, and comorbidity within various conditions. Consequently, a PA specifier is now applicable to all DSM-5 disorders. Despite these clinical and nosological implications, no research to date has examined associations between PAs and hoarding disorder. The current investigation evaluated relationships between PA endorsement and hoarding severity within a sample of 32 patients with hoarding disorder. Findings suggested a high rate of panic history among those with hoarding disorder (56%). Hoarders with co-occurring PAs, compared to those without PAs, evidenced significantly higher symptom severity. Moreover, PAs continued to significantly predict hoarding severity even after controlling for relevant covariates. When examining the specific relationships among PAs and hoarding symptoms (i.e., acquiring, difficulty discarding, and clutter), the endorsement of PAs was associated with increased acquiring and difficulty discarding symptoms. These findings add considerably to a growing body of literature on hoarding disorder. Implications for the assessment and treatment of PAs that co-occur with hoarding disorder are discussed. Copyright © 2014 Elsevier Inc. All rights reserved.

  13. Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy Efficient WSNs

    DEFF Research Database (Denmark)

    Di Mauro, Alessio; Fafoutis, Xenofon; Mödersheim, Sebastian Alexander

    2013-01-01

    nodes, pretending to have a fake identity within the network. To prevent this attack we propose RAP, a challenge-response authentication protocol that is able to detect and prevent the beacon replay attack. The effectiveness of the protocol is formally verified using OFMC and ProVerif. Furthermore, we......In receiver-initiated MAC protocols for Wireless Sensor Networks (WSNs), communication is initiated by the receiver of the data through beacons containing the receiver's identity. In this paper, we consider the case of a network intruder that captures and replays such beacons towards legitimate...

  14. Leaf-cutting ant attack in initial pine plantations and growth of defoliated plants

    Directory of Open Access Journals (Sweden)

    Mariane Aparecida Nickele

    2012-07-01

    Full Text Available The objective of this work was to evaluate the natural attack by Acromyrmex crassispinus in initial Pinus taeda plantations without control measures against ants, as well as the effect of defoliation in seedlings of P. taeda. Evaluations of the attack of leaf-cutting ants on P. taeda plantations were done monthly in the first six months, then 9 and 12 months after planting. The percentages of plants that were naturally attacked by ants were registered. The effect of defoliation was evaluated by artificial defoliation, simulating the natural patterns of attack by A. crassispinus on P. taeda seedlings. The natural attack of A. crassispinus was greater during the first months after planting, being more intense in the first 30 days. Artificial defoliation indicated that there were no significant losses in diameter and height in plants with less than 75% defoliation. However, there were significant losses in diameter and height in plants with 100% defoliation, independently of the cut of the apical meristem, and also plant death. The control of leaf-cutting ants in P. taeda plantings, in which A. crassispinus is the most frequent leaf-cutting ant, should be intense only at the beginning of planting, since the most severe attacks occur during this time.

  15. Initial crisis risk communications: A success story

    International Nuclear Information System (INIS)

    Goldman, S.B.; Traverso, D.K.

    1992-01-01

    Federal regulations require nuclear facilities to be prepared for the risk communication aspects of a catastrophic emergency. Thus, all nuclear plants have provisions for a Joint Public Information Center (JPIC). The JPICs are designed to handle more than 300 media for 24 hours a day; to coordinate information among utility, federal, state, and local agencies; to provide spokespersons; etc. For a large-scale emergency, JPICs can work very well. However, some utilities - indeed, most companies - appear to have only two modes of emergency communication response: normal staff and JPIC. Experience has shown that normal staffing is inadequate to handle the risk communication response for media-intensive low-level emergencies and for the initial stages of an escalating emergency. It is clear that initial response will determine how well a company fares in its overall emergency response and in its long-term relations with the media and public. A solution to this risk communication challenge was developed by Cleveland Electric Illuminating Company's Perry Nuclear Plant - the Public Information Response Team. Using existing facilities and staff - only one of whom works regularly with the media - the Perry plant proactively manages its initial risk communication response

  16. Thinking Tools for Successful Collaborative Initiatives - 13351

    International Nuclear Information System (INIS)

    Boucher, Laurel A.

    2013-01-01

    Successful collaboration requires effective communication and collective problem solving. Regardless of the subject area --- environmental remediation, waste management, program planning and budgeting --- those involved must focus their efforts in an orderly and cooperative manner. A thinking tool is a technique used to get individuals to focus on specific components of the task at the same time and to eliminate the 'noise' that accompanies communications among individuals with different objectives and different styles of communicating. For example, one of these thinking tools is a technique which enables a working group to delineate its roles, responsibilities and communication protocols so that it can deliver the right information to the right people at the right time. Another enables a group to objectively and collectively evaluate and improve a policy, plan, or program. A third technique enables a group to clarify its purpose and direction while generating interest and buy-in. A fourth technique makes it possible for a group with polarized opinions to acknowledge their differences as well as what they have in common. A fifth technique enables a group to consider a subject of importance from all perspectives so as to produce a more comprehensive and sustainable solution. These thinking tools make effective communication and collective problem solving possible in radioactive waste management and remediation. They can be used by a wide spectrum of professionals including policy specialists, program administrators, program and project managers, and technical specialists. (author)

  17. Understanding success and failure of anti-corruption initiatives

    OpenAIRE

    Heeks, Richard; Mathisen, Harald

    2012-01-01

    This paper focuses on the success and failure of anti-corruption initiatives; focusing mainly on those in developing countries. Through a review of extant evidence, it finds a very mixed picture within which there is widespread failure; albeit sometimes only partial failure. As a result, anti-corruption as a field can struggle to gain attention and resources among competing development initiatives. In reviewing that field we find that, while some progress has been made - for example in integr...

  18. Ensuring That Family Engagement Initiatives Are Successful, Sustainable, and Scalable

    Science.gov (United States)

    Geller, Joanna D.

    2016-01-01

    In 2009, the U.S. Department of Education launched the highly competitive Investing in Innovation (i3) initiative. School districts and nonprofit partners nationwide have competed for coveted funds to develop a new program, validate an existing program with some evidence of success, or scale up a program backed by ample evidence. Very quickly,…

  19. Identifying Risk of Future Asthma Attacks Using UK Medical Record Data : A Respiratory Effectiveness Group Initiative

    NARCIS (Netherlands)

    Blakey, John D.; Price, David B.; Pizzichini, Emilio; Popov, Todor A.; Dimitrov, Borislav D.; Postma, Dirkje S.; Josephs, Lynn K.; Kaplan, Alan; Papi, Alberto; Kerkhof, Marjan; Hillyer, Elizabeth V.; Chisholm, Alison; Thomas, Mike

    BACKGROUND: Asthma attacks are common, serious, and costly. Individual factors associated with attacks, such as poor symptom control, are not robust predictors. OBJECTIVE: We investigated whether the rich data available in UK electronic medical records could identify patients at risk of recurrent

  20. Symptom-based, algorithmic approach for handling the initial encounter with victims of a potential terrorist attack.

    Science.gov (United States)

    Subbarao, Italo; Johnson, Christopher; Bond, William F; Schwid, Howard A; Wasser, Thomas E; Deye, Greg A; Burkhart, Keith K

    2005-01-01

    This study intended to create symptom-based triage algorithms for the initial encounter with terror-attack victims. The goals of the triage algorithms include: (1) early recognition; (2) avoiding contamination; (3) early use of antidotes; (4) appropriate handling of unstable, contaminated victims; and (5) provisions of force protection. The algorithms also address industrial accidents and emerging infections, which have similar clinical presentations and risks for contamination as weapons of mass destruction (WMD). The algorithms were developed using references from military and civilian sources. They were tested and adjusted using a series of theoretical patients from a CD-ROM chemical, biological, radiological/nuclear, and explosive victim simulator. Then, the algorithms were placed into a card format and sent to experts in relevant fields for academic review. Six inter-connected algorithms were created, described, and presented in figure form. The "attack" algorithm, for example, begins by differentiating between overt and covert attack victims (A covert attack is defined by epidemiological criteria adapted from the Centers for Disease Control and Prevention (CDC) recommendations). The attack algorithm then categorizes patients either as stable or unstable. Unstable patients flow to the "Dirty Resuscitation" algorithm, whereas, stable patients flow to the "Chemical Agent" and "Biological Agent" algorithms. The two remaining algorithms include the "Suicide Bomb/Blast/Explosion" and the "Radiation Dispersal Device" algorithms, which are inter-connected through the overt pathway in the "Attack" algorithm. A civilian, symptom-based, algorithmic approach to the initial encounter with victims of terrorist attacks, industrial accidents, or emerging infections was created. Future studies will address the usability of the algorithms with theoretical cases and utility in prospective, announced and unannounced, field drills. Additionally, future studies will assess the

  1. The successful implementation of STEM initiatives in lower income schools

    Science.gov (United States)

    Bakshi, Leena

    The purpose of this study was to examine the leadership strategies utilized by superintendents, district administrators and school principals and the impact of these identified strategies on implementing STEM initiatives specifically for lower-income students. This study set out to determine (a) What role does district leadership play in the implementation of STEM initiatives in lower income secondary schools; (b) What internal systems of accountability exist in successful lower income secondary schools' STEM programs; (c) What leadership strategies are used to implement STEM curriculum initiatives; (d) How do school and district leadership support staff in order to achieve student engagement in STEM Initiative curriculum. This study used a mixed-methods approach to determine the impact of leadership strategies utilized by superintendents, district administrators and school principals on implementing STEM initiatives. Quantitative data analyzed survey questionnaires to determine the degree of correlation between the school districts that have demonstrated the successful implementation of STEM initiatives at the school and district levels. Qualitative data was collected using highly structured participant interviews and purposeful sampling of four district superintendents, one district-level administrator and five school leaders to capture the key strategies in implementing STEM initiatives in lower income secondary schools. Through the process of triangulation, the results of the study revealed that superintendents and principals should consider the characteristics of effective STEM initiatives that have shown a considerable degree of correlation with positive outcomes for lower income students. These included the leadership strategies of personnel's making decisions about the district's and school's instructional direction and an emphasis on the conceptual development of scientific principles using the Next Generation Science Standards coupled with the Common Core

  2. Identifying Risk of Future Asthma Attacks Using UK Medical Record Data: A Respiratory Effectiveness Group Initiative.

    Science.gov (United States)

    Blakey, John D; Price, David B; Pizzichini, Emilio; Popov, Todor A; Dimitrov, Borislav D; Postma, Dirkje S; Josephs, Lynn K; Kaplan, Alan; Papi, Alberto; Kerkhof, Marjan; Hillyer, Elizabeth V; Chisholm, Alison; Thomas, Mike

    Asthma attacks are common, serious, and costly. Individual factors associated with attacks, such as poor symptom control, are not robust predictors. We investigated whether the rich data available in UK electronic medical records could identify patients at risk of recurrent attacks. We analyzed anonymized, longitudinal medical records of 118,981 patients with actively treated asthma (ages 12-80 years) and 3 or more years of data. Potential risk factors during 1 baseline year were evaluated using univariable (simple) logistic regression for outcomes of 2 or more and 4 or more attacks during the following 2-year period. Predictors with significant univariable association (P attacks included baseline-year markers of attacks (acute oral corticosteroid courses, emergency visits), more frequent reliever use and health care utilization, worse lung function, current smoking, blood eosinophilia, rhinitis, nasal polyps, eczema, gastroesophageal reflux disease, obesity, older age, and being female. The number of oral corticosteroid courses had the strongest association. The final cross-validated models incorporated 19 and 16 risk factors for 2 or more and 4 or more attacks over 2 years, respectively, with areas under the curve of 0.785 (95% CI, 0.780-0.789) and 0.867 (95% CI, 0.860-0.873), respectively. Routinely collected data could be used proactively via automated searches to identify individuals at risk of recurrent asthma attacks. Further research is needed to assess the impact of such knowledge on clinical prognosis. Copyright © 2016 American Academy of Allergy, Asthma & Immunology. Published by Elsevier Inc. All rights reserved.

  3. How effective leaders achieve success in critical change initiatives, Part 2: why change leadership must transcend project management for complex initiatives to be successful.

    Science.gov (United States)

    King, Sharon; Peterson, Larry

    2007-01-01

    This article is the second in a series outlining how effective leaders achieve success in critical change initiatives. This article focuses on why change leadership must transcend project management for complex initiatives to be successful.

  4. Academic Success and Initial Labor Market Outcomes for Pharmacy Graduates

    Directory of Open Access Journals (Sweden)

    Sean Murphy

    2011-01-01

    Full Text Available Purpose: This study examines the relationship between academic success and labor market outcomes among graduating pharmacy students. Unlike previous studies, this paper characterizes labor market outcome not only as an individual's starting salary, but also whether or not the student had a position secured at the time of graduation, whether or not a signing bonus was received, and the setting in which (she will practice. Methods: A standard exit survey was administered to graduating Doctor of Pharmacy students at a Midwestern, public university within two weeks of graduation. The relationship between academic success and initial labor market outcome was assessed using cross-tabulations, chi-square and Fisher exact tests. Results: There were no significant relationships between grade point averages and signing bonuses, starting salaries or employment offers. Students with higher grade point averages were less likely to work in chain community pharmacies, and more likely to work in a hospital or other health-system setting. Conclusions: The relationships between academic and direct measures of labor market outcomes (salary and bonuses were not necessarily positive, as standard economic theory predicts. Rather, the relationship is indirect, as it appears that students with greater academic success obtained employment in more clinical settings, which carry a different mix of pecuniary and non-pecuniary benefits. Type: Original Research

  5. Cytoskeleton reorganization/disorganization is a key feature of induced inaccessibility for defence to successive pathogen attacks.

    Science.gov (United States)

    Moral, Juan; Montilla-Bascón, Gracia; Canales, Francisco J; Rubiales, Diego; Prats, Elena

    2017-06-01

    In this work, we investigated the involvement of the long-term dynamics of cytoskeletal reorganization on the induced inaccessibility phenomenon by which cells that successfully defend against a previous fungal attack become highly resistant to subsequent attacks. This was performed on pea through double inoculation experiments using inappropriate (Blumeria graminis f. sp. avenae, Bga) and appropriate (Erysiphe pisi, Ep) powdery mildew fungi. Pea leaves previously inoculated with Bga showed a significant reduction of later Ep infection relative to leaves inoculated only with Ep, indicating that cells had developed induced inaccessibility. This reduction in Ep infection was higher when the time interval between Bga and Ep inoculation ranged between 18 and 24 h, although increased penetration resistance in co-infected cells was observed even with time intervals of 24 days between inoculations. Interestingly, this increase in resistance to Ep following successful defence to the inappropriate Bga was associated with an increase in actin microfilament density that reached a maximum at 18-24 h after Bga inoculation and very slowly decreased afterwards. The putative role of cytoskeleton reorganization/disorganization leading to inaccessibility is supported by the suppression of the induced resistance mediated by specific actin (cytochalasin D, latrunculin B) or general protein (cycloheximide) inhibitors. © 2016 BSPP AND JOHN WILEY & SONS LTD.

  6. Efficient reconfigurable hardware architecture for accurately computing success probability and data complexity of linear attacks

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Kavun, Elif Bilge; Tischhauser, Elmar

    2012-01-01

    An accurate estimation of the success probability and data complexity of linear cryptanalysis is a fundamental question in symmetric cryptography. In this paper, we propose an efficient reconfigurable hardware architecture to compute the success probability and data complexity of Matsui's Algorithm...... block lengths ensures that any empirical observations are not due to differences in statistical behavior for artificially small block lengths. Rather surprisingly, we observed in previous experiments a significant deviation between the theory and practice for Matsui's Algorithm 2 for larger block sizes...

  7. Fungal Succession and Decomposition of Acacia mangium Leaf Litters in Health and Ganoderma Attacked Standings

    Directory of Open Access Journals (Sweden)

    SAMINGAN

    2009-09-01

    Full Text Available Leaf litters of Acacia mangium play an important functional role in ecosystem, producing sources of nutrients and giving diversity of microorganisms. Understanding the variation in fungal populations in A. mangium forest is important due to the roles of fungi in regulating populations of other organisms and ecosystem processes. For these purposes, the tests were conducted under two years old of health standing (2S and Ganoderma attacked standing (2G using litterbag method. Litter weight loss and lignin, cellulose, C, N contents were measured each month during eight months of decomposition, as well as fungal community involved was observed. Litter weight loss and lignin, cellulose, C, N contents were measured each month during eight months of decomposition, as well as fungal community involved was observed. After eight months of decomposition, litter weight losses were low up to 34.61% (k = 0.7/year in 2S and 30.64% (k = 0.51/year in 2G, as well as lignin weight losses were low up to 20.05% in 2S and 13.87% in 2G. However, cellulose weight losses were 16.34% in 2S and 14.71% in 2G. In both standings, the numbers of fungal species were 21 and 20 respectively, while the total of fungal populations tends to increase after one month of decomposition and tend to decrease in the last three months. In the first and second months of decomposition fungal species were dominated by genera of Penicillium and Aspergillus and the last three months by Trichoderma, Phialophora, and Pythium.

  8. Africa's Great Green Wall Initiative: a model for restoration success

    Science.gov (United States)

    Berrahmouni, Nora; Sacande, Moctar

    2014-05-01

    The Great Green Wall for the Sahara and the Sahel Initiative was launched to address the increasing challenges of land degradation, desertification and drought, climate change, food insecurity and poverty in more than 20 countries. Restoration of agro-sylvo-pastoral landscapes and degraded lands is one of the priority interventions initiated, enabling the springing up of green nests of life. When complete, the Great Green Wall of Africa will reverse the seemingly unstoppable desertification and address the development of its drylands' inhabitant rural communities. Today's planting of modest seedlings will grow into vast mosaics of forest and agroforestry landscapes and grasslands, which will provide essential ecosystem goods and services, restore lost livelihoods and create new wealth. The ambition of reforestation efforts within this initiative - the like of which the world has never seen before - sounds like an impossible dream. However, learning from past mistakes and capitalising on current advancement in science and technology, it is a reality that is taking root. Following a successful restoration model that RBG Kew experts have devised, we are helping to mobilise, train and support communities in four border regions in Burkina Faso, Mali and Niger. In collaboration with FAO, the Millennium Seed Bank Partnership is using its unique expertise to ensure that seeds of environmentally well-adapted and economically useful local species are collected and planted in communal gardens and village agroforestry systems managed by the communities themselves. In our first year, an estimated total of 162,000 seedlings and 61 kg of seeds from 40 useful native species, including grasses for livestock, have been planted to cover 237 ha of farmer-managed land in 19 villages. The keen interest it has created has indicated that these figures will rise five-fold in the second year. These green bricks are the foundations of the living wall that will eventually reach across the

  9. A Mitigation Approach to Counter Initial Ranging Based DoS Attacks on IEEE 802.16-2009

    International Nuclear Information System (INIS)

    Saleem, Y.; Asif, K.H.; Ahmad, T.; Bashir, K.

    2013-01-01

    In recent years increase in wireless accessed devices does not prerequisite any evidence. Security is the main concern for the researchers in 802.16e now-a-days. The layer structures defines that the security sub-layer resides over the physical layer and provides security on the link layer. This paper discusses the security threats present and still unsolved at the initial network entry stage. A mitigation approach to counter Initial Ranging Based DoS attacks on IEEE 802.16-2009 are particularized in this paper. Furthermore the existing solutions of initial ranging vulnerability are analyzed and their limitations are discussed. Proposed solution was checked against these limitations to ensure their absence. Moreover the solution was implemented in OMNET++ and results were analyzed to ensure the practicality and efficiency. (author)

  10. EPA Lean Government Initiative: How to Replicate Lean Successes

    Science.gov (United States)

    This Lean Replication Primer describes how EPA Offices and Regions can identify and adapt successful practices from previous Lean projects to “replicate” their successes and generate further improvements.

  11. Successful integration of ergonomics into continuous improvement initiatives.

    Science.gov (United States)

    Monroe, Kimberly; Fick, Faye; Joshi, Madina

    2012-01-01

    Process improvement initiatives are receiving renewed attention by large corporations as they attempt to reduce manufacturing costs and stay competitive in the global marketplace. These initiatives include 5S, Six Sigma, and Lean. These programs often take up a large amount of available time and budget resources. More often than not, existing ergonomics processes are considered separate initiatives by upper management and struggle to gain a seat at the table. To effectively maintain their programs, ergonomics program managers need to overcome those obstacles and demonstrate how ergonomics initiatives are a natural fit with continuous improvement philosophies.

  12. Innovating and Entrepreneurial Initiatives: Some Cases of Success

    Directory of Open Access Journals (Sweden)

    Carmen De Pablos Heredero

    2017-05-01

    An entrepreneur cannot be guided by his own interests. He has to invest in order to know the needs of the potential customers Impact on Society\t: Customer experience is key to have success in new business models

  13. An Attack on Inclusive Education in Secondary Education. Limitations in Initial Teacher Training in Spain

    Directory of Open Access Journals (Sweden)

    Manuel López-Torrijo

    2015-01-01

    Full Text Available Inclusive education is hard to implement in secondary schools. Probably, one of the determining factors lies in teachers' initial  training that determines their attitude, identity and professional practice. This research analyses the initial teacher education programmes for Secondary Education, Higher Secondary Education, called bachillerato in Spain, and Vocational and Artistic training in the five best valued Spanish universities in the education field, according to the ranking I-UGR, after the European convergence process in the European Higher Education Area. The study analyses the national regulations that govern this training. A quantitative study was conducted to examine the number of credits dedicated to inclusive education and also a review of the contents of these subjects was carried out. The study concludes that this initial teacher training provides sufficient theoretical basis regarding the conceptualization of inclusive education and the skills to deal with the tutorship and academic and professional orientation. However, important limitations in training prevent future teachers from identifying students’ and context’s special educational needs, and the attention to diversity through different methods and curriculum adaptations.

  14. Appliance Call Center: A Successful Mixed-Initiative Case Study

    OpenAIRE

    Cheetham, William E.; Goebel, Kai

    2007-01-01

    Customer service is defined as the ability of a company to afford the service requestor with the expressed need. Due to the increasing importance of service offerings as a revenue source and increasing competition among service providers, it is important for companies to optimize both the customer experience as well as the associated cost of providing the service. For more complex interactions with higher value, mixed-initiative systems provide an avenue that gives a good balance between the ...

  15. Personality Factors and Nuclear Power Plant Operators: Initial License Success

    Science.gov (United States)

    DeVita-Cochrane, Cynthia

    Commercial nuclear power utilities are under pressure to effectively recruit and retain licensed reactor operators in light of poor candidate training completion rates and recent candidate failures on the Nuclear Regulatory Commission (NRC) license exam. One candidate failure can cost a utility over $400,000, making the successful licensing of new operators a critical path to operational excellence. This study was designed to discover if the NEO-PI-3, a 5-factor measure of personality, could improve selection in nuclear utilities by identifying personality factors that predict license candidate success. Two large U.S. commercial nuclear power corporations provided potential participant contact information and candidate results on the 2014 NRC exam from their nuclear power units nation-wide. License candidates who participated (n = 75) completed the NEO-PI-3 personality test and results were compared to 3 outcomes on the NRC exam: written exam, simulated operating exam, and overall exam result. Significant correlations were found between several personality factors and both written and operating exam outcomes on the NRC exam. Further, a regression analysis indicated that personality factors, particularly Conscientiousness, predicted simulated operating exam scores. The results of this study may be used to support the use of the NEO-PI-3 to improve operator selection as an addition to the current selection protocol. Positive social change implications from this study include support for the use of a personality measure by utilities to improve their return-on-investment in candidates and by individual candidates to avoid career failures. The results of this study may also positively impact the public by supporting the safe and reliable operation of commercial nuclear power utilities in the United States.

  16. Documenting success of energy management cost reduction initiatives

    International Nuclear Information System (INIS)

    Stewart, A.

    1993-01-01

    The scope of this paper is to offer methods to document energy saving projects. The examples used are based on actual industrial facilities. I will define concepts to be used in the analysis of the industrial work place energy consumption. With the concepts defined we can begin to apply the documentation strategy for some specific examples. Why should we be interested in auditing the results of energy projects? Nearly every industrial facility has embarked on the road to energy efficiency. As one of my plant engineer associates relates open-quotes If all our energy saving programs were working as stated the power company would be paying us.close quotes The underlying principles in this statement are true. Does it mean we as technicians, engineers and managers of energy projects have failed? No, we have however failed to finish the job and document there results. My experience has shown there is good support and enthusiasm for those energy projects we begin. It is also my experience that a well documented successful project provides many levels of satisfaction. Large energy management projects involve a major financial commitment. Documenting the results provides all those who supported the project from finance, management and the technical staff the positive reinforcement to support your future projects. We should begin by defining what an energy audit is and what is the expected result of an audit

  17. Plasmodium falciparum clinical malaria in Dielmo, a holoendemic area in Senegal: no influence of acquired immunity on initial symptomatology and severity of malaria attacks.

    Science.gov (United States)

    Rogier, C; Ly, A B; Tall, A; Cissé, B; Trape, J F

    1999-03-01

    Six hundred eighty-nine Plasmodium falciparum malaria attacks were observed during a three-year period among 226 inhabitants of the village of Dielmo, Senegal, an area of high malaria transmission. Malaria attacks were defined as clinical episodes with fever (body temperature > or = 38.0 degrees C) or reporting of fever or headache or vomiting, associated with a parasite:leukocyte ratio above an age-dependent pyrogenic threshold identified in this population. The symptom frequencies were tested against age, gender, and parasite density using a random-effect logistic regression model and the study of distinguishable clinical presentations was carried out by multi-correspondence analysis. There was little difference between the severity of symptoms during the initial course of attacks in young children and adults, and this severity was not correlated with the duration of the pathologic episode. It was not possible to distinguish objectively different malaria attack types according to the severity of clinical manifestations. In contrast, the duration of fever, symptoms, and parasite clearance were significantly longer among the youngest children than among the oldest children and adults. These findings suggest that of the two components of protective immunity, anti-parasite immunity and anti-toxic immunity, only the first would play a major role as age increases. They suggest also that the initial clinical presentation of malaria attacks is not predictive of the level of protective immunity.

  18. Success factors for strategic change initiatives: a qualitative study of healthcare administrators' perspectives.

    Science.gov (United States)

    Kash, Bita Arbab; Spaulding, Aaron; Johnson, Christopher E; Gamm, Larry

    2014-01-01

    Success factors related to the implementation of change initiatives are well documented and discussed in the management literature, but they are seldom studied in healthcare organizations engaged in multiple strategic change initiatives. The purpose of this study was to identify key success factors related to implementation of change initiatives based on rich qualitative data gathered from health leader interviews at two large health systems implementing multiple change initiatives. In-depth personal interviews with 61 healthcare leaders in the two large systems were conducted and inductive qualitative analysis was employed to identify success factors associated with 13 change initiatives. Results from this analysis were compared to success factors identified in the literature, and generalizations were drawn that add significantly to the management literature, especially to that in the healthcare sector. Ten specific success factors were identified for the implementation of change initiatives. The top three success factors were (1) culture and values, (2) business processes, and (3) people and engagement. Two of the identified success factors are unique to the healthcare sector and not found in the literature on change models: service quality and client satisfaction (ranked fourth of 10) and access to information (ranked ninth). Results demonstrate the importance of human resource functions, alignment of culture and values with change, and business processes that facilitate effective communication and access to information to achieve many change initiatives. The responses also suggest opportunities for leaders of healthcare organizations to more formally recognize the degree to which various change initiatives are dependent on one another.

  19. Rising from failure and learning from success: The role of past experience in radical initiative taking

    NARCIS (Netherlands)

    D. Deichmann (Dirk); J.C.M. van den Ende (Jan)

    2014-01-01

    markdownabstract__Abstract__ We investigate how the successes and failures of people who initiate radical ideas influence (a) the inclination to take new personal initiatives and (b) the outcome of those initiatives. Using the data of 1,792 radical ideas suggested by 908 employees in a

  20. Rising from failure and learning from success: the role of past experience in radical initiative taking

    NARCIS (Netherlands)

    Deichmann, D.; van den Ende, J..

    2014-01-01

    We investigate how the successes and failures of people who initiate radical ideas influence (a) the inclination to take new personal initiatives and (b) the outcome of those initiatives. Using the data of 1,792 radical ideas suggested by 908 employees in a multinational firm's idea and innovation

  1. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  2. Colonization of weakened trees by mass-attacking bark beetles: no penalty for pioneers, scattered initial distributions and final regular patterns.

    Science.gov (United States)

    Toffin, Etienne; Gabriel, Edith; Louis, Marceau; Deneubourg, Jean-Louis; Grégoire, Jean-Claude

    2018-01-01

    Bark beetles use aggregation pheromones to promote group foraging, thus increasing the chances of an individual to find a host and, when relevant, to overwhelm the defences of healthy trees. When a male beetle finds a suitable host, it releases pheromones that attract potential mates as well as other 'spying' males, which result in aggregations on the new host. To date, most studies have been concerned with the use of aggregation pheromones by bark beetles to overcome the defences of living, well-protected trees. How insects behave when facing undefended or poorly defended hosts remains largely unknown. The spatio-temporal pattern of resource colonization by the European eight-toothed spruce bark beetle, Ips typographus , was quantified when weakly defended hosts (fallen trees) were attacked. In many of the replicates, colonization began with the insects rapidly scattering over the available surface and then randomly filling the gaps until a regular distribution was established, which resulted in a constant decrease in nearest-neighbour distances to a minimum below which attacks were not initiated. The scattered distribution of the first attacks suggested that the trees were only weakly defended. A minimal theoretical distance of 2.5 cm to the earlier settlers (corresponding to a density of 3.13 attacks dm -2 ) was calculated, but the attack density always remained lower, between 0.4 and 1.2 holes dm -2 , according to our observations.

  3. Predictability of successful trans-arterial embolization in pelvic fracture bleeding based on patient initial presentation.

    Science.gov (United States)

    Tung, Cheng-Cheng; Yu, Jei-Feng; Lan, Shou-Jen

    2017-12-24

    Pelvic fracture bleeding generally leads to hemorrhagic shock. Trans-arterial embolization (TAE) is regarded as the most useful treatment; however, the initial presentation of the patient can impact the effectiveness of TAE for pelvic fracture bleeding. The aim of this retrospective study is to explore whether the patient data at the initial presentation can predict the success of TAE for pelvic fracture bleeding. Twenty-seven charts were retrospectively reviewed. TAE failure was defined as any patient who eventually received an exigent laparotomy or who died due to uncontrolled bleeding after TAE. For patients who received TAE, we analyzed factors recorded at the initial presentation, including age, gender, systolic blood pressure, heart rate, respiratory rate, body temperature, Glasgow coma scale (GCS) score, injury severity score (ISS) and associated injuries, using Pearson's correlation and independent t-tests. The odds ratio was used to determine the cut-off values for the patient presentation findings related to successful TAE and thus was used to assess congruity. Successful TAE was not correlated with age or gender. The hierarchical order of statistically significant associations between successful TAE and initial presentation data was as follows: the patient's body temperature, associated injury, respiratory rate, systolic blood pressure, GCS score, and ISS. The odds ratios for all statistically significant initial presentation factors were within a 95% confidence interval. The findings upon initial presentation of a patient with pelvic fracture bleeding that were related to the predictability of successful TAE include the following: hypothermia prevention with maintenance of the body temperature above 36°C, associated injuries limited to two organ systems, maintenance of the respiratory rate at approximately twenty-two breaths per minute, a sustained systolic blood pressure of approximately 90mmHg, maintenance of a heart rate of approximately one hundred

  4. Gas in Attack and Gas in Defense

    National Research Council Canada - National Science Library

    Fries, Amos A

    1919-01-01

    Carrying out a gas attack is the most technical and dangerous of war's attacks, not only to those on board the airplane that is initiating the attack, but also to those friendly troops on the ground for miles around...

  5. Successive substitution one-leg hybrid P-stable LMM for initial value ...

    African Journals Online (AJOL)

    This paper derives P-stable successive substitution one-leg hybrid linear multistep methods for the numerical solution of second order initial value problems in ordinary differential equations without explicit first order derivative. The methods are demonstrated by a numerical example also considered by Fatunla, et al (1997) ...

  6. Roles High School Principals Play in Establishing a Successful Character Education Initiative

    Science.gov (United States)

    Francom, Jacob A.

    2016-01-01

    Principal leadership is crucial to the success of a high school character education initiative. The purpose of this qualitative grounded theory research was to identify the roles that high school principals play in developing, implementing, and sustaining a high functioning character education program. Data were collected through interviews and…

  7. Faculty Social Capital at Work in a Community College Student Success and Completion Initiative

    Science.gov (United States)

    Funaro, Janette

    2017-01-01

    The purpose of this case study was to examine the role of social capital in the enactment of a faculty-based initiative designed to improve student success and completion at one community college. The concept of social capital--or the actual and potential resources that are embedded in relationships--has been examined in research studies in many…

  8. Differences in Attack Avoidance and Mating Success between Strains Artificially Selected for Dispersal Distance in Tribolium castaneum.

    Directory of Open Access Journals (Sweden)

    Kentarou Matsumura

    Full Text Available Individuals of both dispersal and non-dispersal types (disperser and non-disperser are found in a population, suggesting that each type has both costs and benefits for fitness. However, few studies have examined the trade-off between the costs and benefits for the types. Here, we artificially selected for walking distance, i.e., an indicator of dispersal ability, in the red flour beetle Tribolium castaneum and established strains with longer (L-strains or shorter (S-strains walking distances. We then compared the frequency of predation by the assassin bug Amphibolus venator and the mating frequency of the selected strains. L-strain beetles suffered higher predation risk, than did S-strain beetles. L-strain males had significantly increased mating success compared to S-strain males, but females did not show a significant difference between the strains. The current results showed the existence of a trade-off between predation avoidance and mating success associated with dispersal types at a genetic level only in males. This finding can help to explain the maintenance of variation in dispersal ability within a population.

  9. Heart Attack

    Science.gov (United States)

    Each year almost 800,000 Americans have a heart attack. A heart attack happens when blood flow to the heart suddenly ... it's important to know the symptoms of a heart attack and call 9-1-1 if you or ...

  10. Why cryptography should not rely on physical attack complexity

    CERN Document Server

    Krämer, Juliane

    2015-01-01

    This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two indepe...

  11. THE ANALYSIS OF THE COMMODITY PRICE FORECASTING SUCCESS CONSIDERING DIFFERENT LENGTHS OF THE INITIAL CONDITION DRIFT

    Directory of Open Access Journals (Sweden)

    Marcela Lascsáková

    2015-09-01

    Full Text Available In the paper the numerical model based on the exponential approximation of commodity stock exchanges was derived. The price prognoses of aluminium on the London Metal Exchange were determined as numerical solution of the Cauchy initial problem for the 1st order ordinary differential equation. To make the numerical model more accurate the idea of the modification of the initial condition value by the stock exchange was realized. By having analyzed the forecasting success of the chosen initial condition drift types, the initial condition drift providing the most accurate prognoses for the commodity price movements was determined. The suggested modification of the original model made the commodity price prognoses more accurate.

  12. Analysis of attacks success in three matchup of soccer clubs Partisan and Cukaricki during the season 2014/2015: A case study

    Directory of Open Access Journals (Sweden)

    Živanović Vladimir

    2016-01-01

    Full Text Available The aim of this research was to determine the differences in performance between the variables door attacks in a soccer game, and that have a statistically significant contribution to the achievement of positive results in the competition. We analyzed three matches played between the two elite soccer clubs in Serbia 'Partisan' Belgrade, and 'Cukaricki' Belgrade in the season 2014/2015. An analysis has been done of attack types (continuous, fast attack and counter attack and their finals at goal or achieving a goal. Results of the analysis showed that the highest representation are interrupted and unrealized continuous team attacks (CTA compared to a much smaller number of efficient fast attacks (FA and the counter-attack (CA, i.e. prevailed a lot slower transfer mode (transition balls, compared to its much faster the flow, the observed matches. It can be concluded that the greatest statistical differences were found in the variables ineffective attacks (IA, value of 10.5 and effective attacks (EA, value of 9, while the lowest statistical difference was found in the variable ineffective attacks with kick the ball outside the goal ICA(KBOTG, value of 1.5. These data correspond to the practical situation, because the observation of which, with the greatest certainty determines the winner of a soccer match.

  13. Succession of transiently active tumor?initiating cell clones in human pancreatic cancer xenografts

    OpenAIRE

    Ball, Claudia R; Oppel, Felix; Ehrenberg, Karl Roland; Dubash, Taronish D; Dieter, Sebastian M; Hoffmann, Christopher M; Abel, Ulrich; Herbst, Friederike; Koch, Moritz; Werner, Jens; Bergmann, Frank; Ishaque, Naveed; Schmidt, Manfred; von Kalle, Christof; Scholl, Claudia

    2017-01-01

    Abstract Although tumor?initiating cell (TIC) self?renewal has been postulated to be essential in progression and metastasis formation of human pancreatic adenocarcinoma (PDAC), clonal dynamics of TICs within PDAC tumors are yet unknown. Here, we show that long?term progression of PDAC in serial xenotransplantation is driven by a succession of transiently active TICs producing tumor cells in temporally restricted bursts. Clonal tracking of individual, genetically marked TICs revealed that ind...

  14. Neural Correlates of User-initiated Motor Success and Failure - A Brain-Computer Interface Perspective.

    Science.gov (United States)

    Yazmir, Boris; Reiner, Miriam

    2016-11-02

    Any motor action is, by nature, potentially accompanied by human errors. In order to facilitate development of error-tailored Brain-Computer Interface (BCI) correction systems, we focused on internal, human-initiated errors, and investigated EEG correlates of user outcome successes and errors during a continuous 3D virtual tennis game against a computer player. We used a multisensory, 3D, highly immersive environment. Missing and repelling the tennis ball were considered, as 'error' (miss) and 'success' (repel). Unlike most previous studies, where the environment "encouraged" the participant to perform a mistake, here errors happened naturally, resulting from motor-perceptual-cognitive processes of incorrect estimation of the ball kinematics, and can be regarded as user internal, self-initiated errors. Results show distinct and well-defined Event-Related Potentials (ERPs), embedded in the ongoing EEG, that differ across conditions by waveforms, scalp signal distribution maps, source estimation results (sLORETA) and time-frequency patterns, establishing a series of typical features that allow valid discrimination between user internal outcome success and error. The significant delay in latency between positive peaks of error- and success-related ERPs, suggests a cross-talk between top-down and bottom-up processing, represented by an outcome recognition process, in the context of the game world. Success-related ERPs had a central scalp distribution, while error-related ERPs were centro-parietal. The unique characteristics and sharp differences between EEG correlates of error/success provide the crucial components for an improved BCI system. The features of the EEG waveform can be used to detect user action outcome, to be fed into the BCI correction system. Copyright © 2016 IBRO. Published by Elsevier Ltd. All rights reserved.

  15. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  16. Determinants of successful breastfeeding initiation in healthy term singletons: a Swiss university hospital observational study.

    Science.gov (United States)

    Gubler, Tabea; Krähenmann, Franziska; Roos, Malgorzata; Zimmermann, Roland; Ochsenbein-Kölble, Nicole

    2013-05-01

    Breastfeeding significantly benefits mothers and infants. We aimed to identify the determinants of its successful initiation. A retrospective study of 1893 mothers delivering healthy term singletons at a Swiss university hospital from 1/2008 to 3/2009 determined the associations between multiple breastfeeding and early postpartum parameters by univariate and multiple regression analysis. Multiparity was associated with nursing exclusively at the breast at discharge (Ppacifier use (P<0.05). Among obese mothers, nursing exclusively at the breast at discharge was less frequent, and use of all feeding aids more frequent, than among normal-weight women (both P<0.001). Neuraxial anesthesia was associated with use of maltodextrin and bottle (both P<0.05) compared to no anesthesia. Delayed first skin-to-skin contact and rooming-in for <24 h/day were each associated with maltodextrin and cup (P<0.05). Nursing exclusively at the breast at discharge was less frequent (P<0.001), and bottle use more frequent (P<0.05), in women with sore nipples than in those without. Obesity is a potent inhibitor of breastfeeding initiation. Delivery without anesthesia by a multiparous normal-weight mother, followed by immediate skin-to-skin contact, rooming-in for 24 h/day, and dedicated nipple care, provides the best conditions for successful early postpartum breastfeeding without the need for feeding aids or nutritional supplements

  17. Heart Attack

    Science.gov (United States)

    ... pain Fatigue Heart attack Symptoms & causes Diagnosis & treatment Advertisement Mayo Clinic does not endorse companies or products. ... a Job Site Map About This Site Twitter Facebook Google YouTube Pinterest Mayo Clinic is a not- ...

  18. RESISTANCE TO CHANGE AND ERP IMPLEMENTATION SUCCESS: THE MODERATING ROLE OF CHANGE MANAGEMENT INITIATIVES

    Directory of Open Access Journals (Sweden)

    Zafar U. Ahmed

    2006-01-01

    Full Text Available Enterprise Resource Planning (ERP is a useful tool that builds strong capabilities, improves performance, supports better decision making, and provides competitive advantage for businesses. ERP aims to help the management by setting better business practices and equipping them with the right information to take timely decision. In any new technology implementation, one of the issues that need to be addressed is the resistance to change. Many implementations have failed due to strong resistance from the end users. Thus, the main purpose of this paper is to test the impact of resistance to change on ERP's implementation success and how change management initiatives acts in the capacity of a moderating role. Using data collected from 69 manufacturing organizations through a mail survey, it was found that resistance to change is negatively related to achievement of predetermined goals (b = –0.930, p < 0.01 and usersatisfaction (b = –0.952, p < 0.01. Further, change management initiatives did not moderate the relationship between resistance and predetermined goals but it moderated the relationship between resistance and user satisfaction. In addition, change management initiatives have a direct positive impact on user satisfaction. This research concludes that the human factor is very important in ERP's implementation.

  19. Can community change be measured for an outcomes-based initiative? A comparative case study of the success by 6 initiative.

    Science.gov (United States)

    Minich, Lisa; Howe, Steven; Langmeyer, Daniel; Corcoran, Kevin

    2006-12-01

    One of the challenges facing nonprofit organizations today is the demand for measurable results. Increasingly, these organizations are focusing less on program outputs and program outcomes in favor of community outcomes or changes demonstrated in the larger community. Success by 6(R) is a popular United Way initiative that emphasizes defining and measuring community outcomes. In this paper, we describe our work with 24 Success by 6(R) initiatives around the country. It is clear that not all of these initiatives are measuring community outcomes. Of those initiatives that are experiencing some success measuring community outcomes, similar measurement strategies are reported. Additionally, our experience suggests several United Way employees express dissatisfaction with the logic model as a framework for defining and measuring community outcomes although no preferred alternative model is identified. Evaluators working with community-wide initiatives must find ways to communicate the differences between program and community outcomes to key stakeholders and funders.

  20. Successful Reconstruction of Tooth Germ with Cell Lines Requires Coordinated Gene Expressions from the Initiation Stage

    Directory of Open Access Journals (Sweden)

    Yasuhiro Tomooka

    2012-10-01

    Full Text Available Tooth morphogenesis is carried out by a series of reciprocal interactions between the epithelium and mesenchyme in embryonic germs. Previously clonal dental epithelial cell (epithelium of molar tooth germ (emtg lines were established from an embryonic germ. They were odontogenic when combined with a dental mesenchymal tissue, although the odontogenesis was quantitatively imperfect. To improve the microenvironment in the germs, freshly isolated dental epithelial cells were mixed with cells of lines, and germs were reconstructed in various combinations. The results demonstrated that successful tooth construction depends on the mixing ratio, the age of dental epithelial cells and the combination with cell lines. Analyses of gene expression in these germs suggest that some signal(s from dental epithelial cells makes emtg cells competent to communicate with mesenchymal cells and the epithelial and mesenchymal compartments are able to progress  odontogenesis from the initiation stage.

  1. The Value of Attack-Defence Diagrams

    NARCIS (Netherlands)

    Hermanns, H.; Krämer, Julia; Krčál, Jan; Stoelinga, Mariëlle Ida Antoinette; Piessens, Frank; Viganò, Luca

    Success or failure of attacks on high-security systems, such as hacker attacks on sensitive data, depend on various situational conditions, including the timing and success chances of single attack steps, and concurrent countermeasures of the defender. With the existing state-of-the-art modelling

  2. Measures of student success with textbook transformations: the Affordable Learning Georgia Initiative

    Directory of Open Access Journals (Sweden)

    Emily Croteau

    2017-03-01

    Full Text Available In 2014, the state of Georgia’s budget supported a University System of Georgia (USG initiative: Affordable Learning Georgia (ALG. The initiative was implemented via Textbook Transformation Grants, which provided grants to USG faculty, libraries and librarians, and institutions to “transform their use of textbooks and other learning materials into using lower cost options”, in other words to use open educational resources (OER in lieu of a traditional bound textbook. The Round One Textbook Transformation Grants have already shown to be successful in that they saved students approximately $760,000.  What is not known, is the collective impact on student learning. This study examines the learning gains or losses pre- and post-transformation in ALG Round One courses where traditional resources were replaced with OER.  It estimates differences between pre- and post- textbook transformation across the following outcomes: 1 Drop Fail Withdraw (DFW rates, 2 rates of completion, 3 numbers of students receiving a final grade of A or B, C and D, 4 numerical final grades as a percent, 5 final exam grades as a percent, and, 6 course-specific assessment grades measured in percent. Twenty-four data sets were analyzed for DFW rate, eight data sets for completion rate, fourteen data sets for grade distribution, three data sets for final exam grades, three data sets for course specific assessment and one data set for final grades. The null hypothesis that there would be no differences between pre- and post-transformation rates in these learning outcomes was supported.  Thus, this study demonstrates that the USG’s ALG initiative helped students save money without negatively impacting learning outcomes. In addition, it is the first of its kind to measure some of these learning outcomes (e.g. final exam grade, assessment grade, and distribution of letter grades at this scale.

  3. Implementation of oral health initiatives by Australian rural communities: Factors for success.

    Science.gov (United States)

    Taylor, Judy; Carlisle, Karen; Farmer, Jane; Larkins, Sarah; Dickson-Swift, Virginia; Kenny, Amanda

    2018-01-01

    In this paper, we consider factors significant in the success of community participation in the implementation of new oral health services. Our analysis draws on data from the Rural Engaging Communities in Oral Health (Rural ECOH) study (2014-2016). We aimed to assess the Australian relevance of a Scottish community participation framework for health service development; Remote Service Futures. Internationally, community participation in planning of health initiatives is common, but less common in new service implementation. Health managers query the legitimacy of "lay" community members, whether they will persist, and whether they can act as change agents. Our data provide evidence that helps answer these queries. Six communities, located within regions covered by two large rural primary healthcare organisations (Medicare Locals), were selected in two Australian states. Two university-based facilitators worked with a group of local residents (for each community) to monitor implementation of new oral health initiatives designed through participatory processes. Data about implementation were collected through interviews with 28 key stakeholders at the beginning of implementation and 12 months later. Data were coded, themed and analysed abductively. Five themes emerged; the inter-relationship between community motivation to participate with the fortunes of the oral health initiatives, having the "right" people involved, continuing involvement of sponsors and/or significant people, trusting working relationships between participants and perceiving benefits from participation. Findings provide evidence of a role for community participation in implementing new community services if solid partnerships with relevant providers can be negotiated and services are seen to be relevant and useful to the community. © 2017 John Wiley & Sons Ltd.

  4. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  5. About Heart Attacks

    Science.gov (United States)

    ... Artery Disease Venous Thromboembolism Aortic Aneurysm More About Heart Attacks Updated:Jan 11,2018 A heart attack is ... coronary artery damage leads to a heart attack . Heart Attack Questions and Answers What is a heart attack? ...

  6. Heart Attack

    Science.gov (United States)

    ... Pressure, tightness, pain, or a squeezing or aching sensation in your chest or arms that may spread to your neck, jaw or back Nausea, indigestion, heartburn or abdominal pain Shortness of breath Cold sweat Fatigue Lightheadedness or sudden dizziness Heart attack ...

  7. Heart attack

    Science.gov (United States)

    ... part in support groups for people with heart disease . Outlook (Prognosis) After a heart attack, you have a higher ... P, Bonow RO, Braunwald E, eds. Braunwald's Heart Disease: A Textbook of Cardiovascular Medicine . 10th ed. Philadelphia, PA: Elsevier Saunders; 2014: ...

  8. Shark attack.

    Science.gov (United States)

    Guidera, K J; Ogden, J A; Highhouse, K; Pugh, L; Beatty, E

    1991-01-01

    Shark attacks are rare but devastating. This case had major injuries that included an open femoral fracture, massive hemorrhage, sciatic nerve laceration, and significant skin and muscle damage. The patient required 15 operative procedures, extensive physical therapy, and orthotic assistance. A review of the literature pertaining to shark bites is included.

  9. Improving Attack Graph Visualization through Data Reduction and Attack Grouping

    Energy Technology Data Exchange (ETDEWEB)

    John Homer; Ashok Varikuti; Xinming Ou; Miles A. McQueen

    2008-09-01

    Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions. This paper presents methodologies that can 1) automatically identify portions of an attack graph that do not help a user to understand the core security problems and so can be trimmed, and 2) automatically group similar attack steps as virtual nodes in a model of the network topology, to immediately increase the understandability of the data. We believe both methods are important steps toward improving visualization of attack graphs to make them more useful in configuration management for large enterprise networks. We implemented our methods using one of the existing attack-graph toolkits. Initial experimentation shows that the proposed approaches can 1) significantly reduce the complexity of attack graphs by trimming a large portion of the graph that is not needed for a user to understand the security problem, and 2) significantly increase the accessibility and understandability of the data presented in the attack graph by clearly showing, within a generated visualization of the network topology, the number and type of potential attacks to which each host is exposed.

  10. Resolving the paradox for protein aggregation diseases: a common mechanism for aggregated proteins to initially attack membranes without needing aggregates [v1; ref status: indexed, http://f1000r.es/221

    Directory of Open Access Journals (Sweden)

    Haina Qin

    2013-10-01

    Full Text Available Paradoxically, aggregation of specific proteins is characteristic of many human diseases and aging, yet aggregates have been found to be unnecessary for initiating pathogenesis. Here we determined the NMR topology and dynamics of a helical mutant in a membrane environment transformed from the 125-residue cytosolic all-β MSP by the ALS-causing P56S mutation. Unexpectedly, despite its low hydrophobicity, the P56S major sperm protein (MSP domain becomes largely embedded in the membrane environment with high backbone rigidity. Furthermore it is composed of five helices with amphiphilicity comparable to those of the partly-soluble membrane toxin mellitin and α-synuclein causing Parkinson's disease. Consequently, the mechanism underlying this chameleon transformation becomes clear: by disrupting the specific tertiary interaction network stabilizing the native all-β MSP fold to release previously-locked amphiphilic segments, the P56S mutation acts to convert the classic MSP fold into a membrane-active protein that is fundamentally indistinguishable from mellitin and α-synuclein which are disordered in aqueous solution but spontaneously partition into membrane interfaces driven by hydrogen-bond energetics gained from forming α-helix in the membrane environments. As segments with high amphiphilicity exist in all proteins, our study successfully resolves the paradox by deciphering that the proteins with a higher tendency to aggregate have a stronger potential to partition into membranes through the same mechanism as α-synuclein to initially attack membranes to trigger pathogenesis without needing aggregates. This might represent the common first step for various kinds of aggregated proteins to trigger familiar, sporadic and aging diseases. Therefore the homeostasis of aggregated proteins in vivo is the central factor responsible for a variety of human diseases including aging. The number and degree of the membrane attacks by aggregated proteins may

  11. Counting equations in algebraic attacks on block ciphers

    DEFF Research Database (Denmark)

    Knudsen, Lars Ramkilde; Miolane, Charlotte Vikkelsø

    2010-01-01

    This paper is about counting linearly independent equations for so-called algebraic attacks on block ciphers. The basic idea behind many of these approaches, e.g., XL, is to generate a large set of equations from an initial set of equations by multiplication of existing equations by the variables...... in the system. One of the most difficult tasks is to determine the exact number of linearly independent equations one obtain in the attacks. In this paper, it is shown that by splitting the equations defined over a block cipher (an SP-network) into two sets, one can determine the exact number of linearly...... independent equations which can be generated in algebraic attacks within each of these sets of a certain degree. While this does not give us a direct formula for the success of algebraic attacks on block ciphers, it gives some interesting bounds on the number of equations one can obtain from a given block...

  12. An integrated mission approach to the space exploration initiative will ensure success

    International Nuclear Information System (INIS)

    Coomes, E.P.; Dagle, J.E.; Bamberger, J.A.; Noffsinger, K.E.

    1991-01-01

    The direction of the American space program, as defined by President Bush and the National Commission on Space, is to expand human presence into the solar system. Landing an American on Mars by the 50th anniversary of the Apollo 11 lunar landing is the goal. This challenge has produced a level of excitement among young Americans not seen for nearly three decades. The exploration and settlement of the space frontier will occupy the creative thoughts and energies of generations of Americans well into the next century. The return of Americans to the moon and beyond must be viewed as a national effort with strong public support if it is to become a reality. Key to making this an actuality is the mission approach selected. Developing a permanent presence in space requires a continual stepping outward from Earch in a logical progressive manner. If we seriously plan to go and to stay, then not only must we plan what we are to do and how we are to do it, we must address the logistic support infrastructure that will allow us to stay there once we arrive. A fully integrated approach to mission planning is needed if the Space exploration Initiative (SEI) is to be successful. Only in this way can a permanent human presence in space be sustained. An integrated infrastructure approach would reduce the number of new systems and technologies requiring development. The resultant horizontal commonality of systems and hardware would reduce the direct economic impact of SEI while an early return on investment through technology spin-offs would be an economic benefit by greatly enhancing our international technical competitiveness. If the exploration, development, and colonization of space is to be affordable and acceptable, careful consideration must be given to such things as ''return on investment'' and ''commercial product potential'' of the technologies developed

  13. Preoperative short hookwire placement for small pulmonary lesions: evaluation of technical success and risk factors for initial placement failure.

    Science.gov (United States)

    Iguchi, Toshihiro; Hiraki, Takao; Matsui, Yusuke; Fujiwara, Hiroyasu; Masaoka, Yoshihisa; Tanaka, Takashi; Sato, Takuya; Gobara, Hideo; Toyooka, Shinichi; Kanazawa, Susumu

    2018-05-01

    To retrospectively evaluate the technical success of computed tomography fluoroscopy-guided short hookwire placement before video-assisted thoracoscopic surgery and to identify the risk factors for initial placement failure. In total, 401 short hookwire placements for 401 lesions (mean diameter 9.3 mm) were reviewed. Technical success was defined as correct positioning of the hookwire. Possible risk factors for initial placement failure (i.e., requirement for placement of an additional hookwire or to abort the attempt) were evaluated using logistic regression analysis for all procedures, and for procedures performed via the conventional route separately. Of the 401 initial placements, 383 were successful and 18 failed. Short hookwires were finally placed for 399 of 401 lesions (99.5%). Univariate logistic regression analyses revealed that in all 401 procedures only the transfissural approach was a significant independent predictor of initial placement failure (odds ratio, OR, 15.326; 95% confidence interval, CI, 5.429-43.267; p failure (OR 0.793, 95% CI 0.631-0.996; p = 0.046). The technical success of preoperative short hookwire placement was extremely high. The transfissural approach was a predictor initial placement failure for all procedures and small lesion size was a predictor of initial placement failure for procedures performed via the conventional route. • Technical success of preoperative short hookwire placement was extremely high. • The transfissural approach was a significant independent predictor of initial placement failure for all procedures. • Small lesion size was a significant independent predictor of initial placement failure for procedures performed via the conventional route.

  14. Ciclovía initiatives: engaging communities, partners, and policy makers along the route to success.

    Science.gov (United States)

    Zieff, Susan G; Hipp, J Aaron; Eyler, Amy A; Kim, Mi-Sook

    2013-01-01

    Recent efforts to increase physical activity through changes to the built environment have led to strategies and programs that use existing public space, including bicycle lanes, temporary parks, and the ciclovia initiative (scheduled events in which streets are closed to motorized vehicles and opened for recreational activities) popularized in South America. This article describes and compares the processes and structures involved in developing and implementing a ciclovia-type program in 2 US urban contexts: San Francisco, California, and St Louis, Missouri. Considering the current growth of and interest in ciclovia initiatives, important outcomes, lessons learned are offered for application in other, similar settings. Primary sources from both initiatives and from published research on ciclovias constitute the body of evidence and include year-end reports, grant applications, meeting minutes, budgets, published ciclovia guidelines, evaluation studies and Web sites, media sources, and interviews and personal communication with the organizers. Primary source documents were reviewed and included in this analysis if they offered information on 3 grounded questions: What processes were used in developing the initiative? What are the current structures and practices used in implementation of initiatives? What are important lessons learned and best practices from initiatives for recommendations to stakeholders and policy makers in other contexts? Among the categories compared, the structures and processes for implementation regarding buy-in and city department collaboration, route selection, programming, partnerships, media promotion, community outreach, and merchant support were relatively similar among the 2 initiatives. The categories that differed included staffing and volunteer engagement and funding. Buy-in from community partners, merchants, residents, and city agencies is critical for a positive experience in developing and implementing ciclovia-type initiatives

  15. Entrepreneurial Choices of Initial Human Capital Endowments and New Venture Success

    DEFF Research Database (Denmark)

    Rocha, Vera; Van Praag, Mirjam; B. Folta, Timothy

    The founder (team)'s human capital is a vital determinant of future firm performance. This is a stylized fact. Less is known about the effect of the human capital of the initial workforce hired by the founder(s). We study the performance consequences of a founder's choice of the initial workforce......'s human capital (quantity and quality), besides the human capital of the founder(s). The analysis is based on matched employer-employee data and covers about 5,300 startups in manufacturing industries founded by individuals coming from employment between 1992 and 2007. We acknowledge that initial hiring...... decisions are endogenous and correlated with the human capital of the founders and the ownership structure of startups (single founder versus team of founders). Given the stickiness of initial choices, human capital decisions at entry turn out to be a close to irreversible matter with significant...

  16. Organizational and individual determinants of using initiatives conducive to successful work-life balance

    Directory of Open Access Journals (Sweden)

    Aleksandra Andysz

    2014-02-01

    Full Text Available Appropriate distribution of time and energy between work and personal life poses a challenge to many working people. Unfortunately, many professionally active people experience work-family conflict. In order to minimize it, employees are offered various solutions aimed at reconciling professional and private spheres (work-life balance (WLB initiatives. The authors attempt to answer what makes employees use WLB initiatives and what influences the decision to reject the available options. The review is based on the articles published after 2000, searched by Google Scholar and Web of Knowledge with use of the key words: work-life balance, work-family conflict, work-life balance initiatives, work-life balance initiatives use, use of WLB solutions. We focused on organizational and individual determinants of WLB initiatives use, such as organizational culture, stereotypes and values prevailing in the work environment that may result in stigmatization of workers - flexibility stigma. We discuss the reasons why supervisors and co-workers stigmatize their colleagues, and what are the consequences of experiencing such stigmatization. Among the individual determinants of WLB initiatives use, we have inter alia focused on the preference for integration vs. separation of the spheres of life. The presented material shows that social factors - cultural norms prevailing in a society, relationships in the workplace and individual factors, such as the level of self-control - are of equal importance for decisions of using WLB initiatives as their existence. Our conclusion is that little attention has been paid to the research on determinants of WLB initiatives use, especially to individual ones. Med Pr 2014;65(1:119–129

  17. [Organizational and individual determinants of using initiatives conducive to successful work-life balance].

    Science.gov (United States)

    Andysz, Aleksandra; Najder, Anna; Merecz-Kot, Dorota

    2014-01-01

    Appropriate distribution of time and energy between work and personal life poses a challenge to many working people. Unfortunately, many professionally active people experience work-family conflict. In order to minimize it, employees are offered various solutions aimed at reconciling professional and private spheres (work-life balance (WLB) initiatives). The authors attempt to answer what makes employees use WLB initiatives and what influences the decision to reject the available options. The review is based on the articles published after 2000, searched by Google Scholar and Web of Knowledge with use of the key words: work-life balance, work-family conflict, work-life balance initiatives, work-life balance initiatives use, use of WLB solutions. We focused on organizational and individual determinants of WLB initiatives use, such as organizational culture, stereotypes and values prevailing in the work environment that may result in stigmatization of workers - flexibility stigma. We discuss the reasons why supervisors and co-workers stigmatize their colleagues, and what are the consequences of experiencing such stigmatization. Among the individual determinants of WLB initiatives use, we have inter alia focused on the preference for integration vs. separation of the spheres of life. The presented material shows that social factors - cultural norms prevailing in a society, relationships in the workplace and individual factors, such as the level of self-control - are of equal importance for decisions of using WLB initiatives as their existence. Our conclusion is that little attention has been paid to the research on determinants of WLB initiatives use, especially to individual ones.

  18. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  19. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-01-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  20. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  1. The Occurrence and the Success Rate of Self-Initiated Self-Repair

    Science.gov (United States)

    Sato, Rintaro; Takatsuka, Shigenobu

    2016-01-01

    Errors naturally appear in spontaneous speeches and conversations. Particularly in a second or foreign language, it is only natural that mistakes happen as a part of the learning process. After an inappropriate expression is detected, it can be corrected. This act of correcting can be initiated either by the speaker (non-native speaker) or the…

  2. Successful interdisciplinary intervention with an initially treatment-resistant social phobic.

    Science.gov (United States)

    Laguna, L B; Healey, E C; Hope, D A

    1998-07-01

    Despite very successful treatments for social phobia, with many studies reporting as many as 75% of social phobics making clinically significant gains with 3 months of treatment or less, some social phobics fail to respond to treatment. This case presents a women with social phobia who received several trials of treatment for severe public-speaking fears but failed to improve, as demonstrated by persistent reports of fear and avoidance equal to those before treatment. With the assistance of a speech language pathologist, this client received combined therapy that included cognitive-behavioral therapy to treat her public-speaking fear and avoidance and voice therapy to treat excessive muscle contractions in the respiratory and phonatory systems. Overall, the combined treatment was successful, with the client's self-reported levels of fear and avoidance of public speaking decreasing dramatically. Specific improvements during voice therapy and implications for the treatment of social phobia are also discussed.

  3. Initial species composition predicts the progress in the spontaneous succession on post-mining sites

    Czech Academy of Sciences Publication Activity Database

    Mudrák, Ondřej; Doležal, Jiří; Frouz, J.

    2016-01-01

    Roč. 95, č. 11 (2016), s. 665-670 ISSN 0925-8574 R&D Projects: GA ČR GA13-13368S; GA ČR GA13-10377S; GA ČR(CZ) GAP505/11/0256 Institutional support: RVO:67985939 Keywords : Spontaneous succession * Ecological restoration * Calamagrostis epigejos Subject RIV: EH - Ecology, Behaviour Impact factor: 2.914, year: 2016

  4. Global mobility orientation and the success of self-initiated expatriates in greater China

    DEFF Research Database (Denmark)

    Lauring, Jakob; Selmer, Jan

    2014-01-01

    to proficiency, performance and satisfaction. We also explored the associations between global mobility orientation and these four work outcomes and examined to what extent the demographic characteristics differentiated the relationships. Results support most hypothesized differences. We found that a global...... mobility orientation was associated with all the work outcomes, except satisfaction. For inherent demographic characteristics, we found support for our hypotheses that for individuals with less successful demographics (younger, male), there was a stronger relationship between global mobility orientation...

  5. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  6. Healthy competition drives success in results-based aid: Lessons from the Salud Mesoamérica Initiative.

    Science.gov (United States)

    El Bcheraoui, Charbel; Palmisano, Erin B; Dansereau, Emily; Schaefer, Alexandra; Woldeab, Alexander; Moradi-Lakeh, Maziar; Salvatierra, Benito; Hernandez-Prado, Bernardo; Mokdad, Ali H

    2017-01-01

    The Salud Mesoamérica Initiative (SMI) is a three-operation strategy, and is a pioneer in the world of results-based aid (RBA) in terms of the success it has achieved in improving health system inputs following its initial operation. This success in meeting pre-defined targets is rare in the world of financial assistance for health. We investigated the influential aspects of SMI that could have contributed to its effectiveness in improving health systems, with the aim of providing international donors, bilateral organizations, philanthropies, and recipient countries with new perspectives that can help increase the effectiveness of future assistance for health, specifically in the arena of RBA. Qualitative methods based on the criteria of relevance and effectiveness proposed by the Development Assistance Committee of the Organization for Economic Co-operation and Development. Our methods included document review, key informant interviews, a focus group discussion, and a partnership analysis. A purposive sample of 113 key informants, comprising donors, representatives from the Inter-American Development Bank, ministries of health, technical assistance organizations, evaluation organizations, and health care providers. During May-October 2016, we interviewed regarding the relevance and effectiveness of SMI. Themes emerged relative to the topics we investigated, and covered the design and the drivers of success of the initiative. The success is due to 1) the initiative's regional approach, which pressured recipient countries to compete toward meeting targets, 2) a robust and flexible design that incorporated the richness of input from stakeholders at all levels, 3) the design-embedded evaluation component that created a culture of accountability among recipient countries, and 4) the reflective knowledge environment that created a culture of evidence-based decision-making. A regional approach involving all appropriate stakeholders, and based on knowledge sharing and

  7. Healthy competition drives success in results-based aid: Lessons from the Salud Mesoamérica Initiative.

    Directory of Open Access Journals (Sweden)

    Charbel El Bcheraoui

    Full Text Available The Salud Mesoamérica Initiative (SMI is a three-operation strategy, and is a pioneer in the world of results-based aid (RBA in terms of the success it has achieved in improving health system inputs following its initial operation. This success in meeting pre-defined targets is rare in the world of financial assistance for health. We investigated the influential aspects of SMI that could have contributed to its effectiveness in improving health systems, with the aim of providing international donors, bilateral organizations, philanthropies, and recipient countries with new perspectives that can help increase the effectiveness of future assistance for health, specifically in the arena of RBA.Qualitative methods based on the criteria of relevance and effectiveness proposed by the Development Assistance Committee of the Organization for Economic Co-operation and Development. Our methods included document review, key informant interviews, a focus group discussion, and a partnership analysis.A purposive sample of 113 key informants, comprising donors, representatives from the Inter-American Development Bank, ministries of health, technical assistance organizations, evaluation organizations, and health care providers.During May-October 2016, we interviewed regarding the relevance and effectiveness of SMI. Themes emerged relative to the topics we investigated, and covered the design and the drivers of success of the initiative. The success is due to 1 the initiative's regional approach, which pressured recipient countries to compete toward meeting targets, 2 a robust and flexible design that incorporated the richness of input from stakeholders at all levels, 3 the design-embedded evaluation component that created a culture of accountability among recipient countries, and 4 the reflective knowledge environment that created a culture of evidence-based decision-making.A regional approach involving all appropriate stakeholders, and based on knowledge

  8. Explaining the success or failure of quality improvement initiatives in long-term care organizations from a dynamic perspective.

    Science.gov (United States)

    Etheridge, Francis; Couturier, Yves; Denis, Jean-Louis; Tremblay, Lucie; Tannenbaum, Cara

    2014-09-01

    The purpose of this study was to better understand why change initiatives succeed or fail in long-term care organizations. Four case studies from Québec, Canada were contrasted retrospectively. A constipation and restraints program succeeded, while an incontinence and falls program failed. Successful programs were distinguished by the use of a change strategy that combined "let-it happen," "help-it happen," and "make-it happen" interventions to create senses of urgency, solidarity, intensity, and accumulation. These four active ingredients of the successful change strategies propelled their respective change processes forward to completion. This paper provides concrete examples of successful and unsuccessful combinations of "let-it happen," "help-it happen," and "make-it happen" change management interventions. Change managers (CM) can draw upon these examples to best tailor and energize change management strategies in their own organizations. © The Author(s) 2013.

  9. Initial Sleep Time Predicts Success in Manual-Guided Cognitive Behavioral Therapy for Insomnia.

    Science.gov (United States)

    Bothelius, Kristoffer; Kyhle, Kicki; Broman, Jan-Erik; Gordh, Torsten; Fredrikson, Mats

    2016-01-01

    Cognitive behavioral therapy produces significant and long-lasting improvement for individuals with insomnia, but treatment resources are scarce. A "stepped care" approach has therefore been proposed, but knowledge is limited on how to best allocate patients to different treatment steps. In this study, 66 primary-care patients with insomnia attended a low-end treatment step: manual-guided cognitive behavioral therapy (CBT) for insomnia delivered by ordinary primary-care personnel. Based on clinically significant treatment effects, subjects were grouped into treatment responders or nonresponders. Baseline data were analyzed to identify predictors for treatment success. Long total sleep time at baseline assessment was the only statistically significant predictor for becoming a responder, and sleep time may thus be important to consider before enrolling patients in low-end treatments.

  10. Community health workers as drivers of a successful community-based disease management initiative.

    Science.gov (United States)

    Peretz, Patricia J; Matiz, Luz Adriana; Findley, Sally; Lizardo, Maria; Evans, David; McCord, Mary

    2012-08-01

    In 2005, local leaders in New York City developed the Washington Heights/Inwood Network for Asthma Program to address the burden of asthma in their community. Bilingual community health workers based in community organizations and the local hospital provided culturally appropriate education and support to families who needed help managing asthma. Families participating in the yearlong care coordination program received comprehensive asthma education, home environmental assessments, trigger reduction strategies, and clinical and social referrals. Since 2006, 472 families have enrolled in the yearlong program. After 12 months, hospitalizations and emergency department visits decreased by more than 50%, and caregiver confidence in controlling the child's asthma increased to nearly 100%. Key to the program's success was the commitment and involvement of community partners from program inception to date.

  11. The role of tissue-specific microbiota in initial establishment success of Pacific oysters.

    Science.gov (United States)

    Lokmer, Ana; Kuenzel, Sven; Baines, John F; Wegner, Karl Mathias

    2016-03-01

    Microbiota can have positive and negative effects on hosts depending on the environmental conditions. Therefore, it is important to decipher host-microbiota-environment interactions, especially under natural conditions exerting (a)biotic stress. Here, we assess the relative importance of microbiota in different tissues of Pacific oyster for its successful establishment in a new environment. We transplanted oysters from the Southern to the Northern Wadden Sea and controlled for the effects of resident microbiota by administering antibiotics to half of the oysters. We then followed survival and composition of haemolymph, mantle, gill and gut microbiota in local and translocated oysters over 5 days. High mortality was recorded only in non-antibiotic-treated translocated oysters, where high titres of active Vibrio sp. in solid tissues indicated systemic infections. Network analyses revealed the highest connectivity and a link to seawater communities in the haemolymph microbiota. Since antibiotics decreased modularity and increased connectivity of the haemolymph-based networks, we propose that community destabilization in non-treated translocated oysters could be attributed to interactions between resident and external microbiota, which in turn facilitated passage of vibrios into solid tissues and invoked disease. These interactions of haemolymph microbiota with the external and internal environment may thus represent an important component of oyster fitness. © 2015 Society for Applied Microbiology and John Wiley & Sons Ltd.

  12. Hawaii Clean Energy Initiative 2008-2018: Celebrating 10 Years of Success

    Energy Technology Data Exchange (ETDEWEB)

    2018-01-04

    Launched in January 2008, the Hawaii Clean Energy Initiative (HCEI) set out transform Hawaii into a world model for energy independence and sustainability. With its leading-edge vision to transition to a Hawaii-powered clean energy economy within a single generation, HCEI established the most aggressive clean energy goals in the nation. Ten years after its launch, HCEI has significantly outdistanced the lofty targets established as Hawaii embarked on its ambitious quest for energy independence. The state now generates 27 percent of its electricity sales from clean energy sources like wind and solar, placing it 12 percentage points ahead of HCEI's original 2015 RPS target of 15 percent. This brochure highlights some of HCEI's key accomplishments and impacts during its first decade and reveals how its new RPS goal of 100 percent by 2045, which the Hawaii state legislature adopted in May 2015, has positioned Hawaii to become the first U.S. state to produce all of its electricity from indigenous renewable sources.

  13. Sustaining reductions in postoperative nausea and vomiting after evidence-based practice initiative: A success story

    Directory of Open Access Journals (Sweden)

    Christopher A Smith

    2017-07-01

    Full Text Available Background: Postoperative nausea and vomiting (PONV remains a signifi cant problem in the surgical population. Many researchers have demonstrated signifi cant reductions in institutional PONV when risk screening and antiemetic prophylaxis protocols are implemented. These protocols have not been universally adopted. Our adoption and implementation led to signifi cant reductions in PONV. The challenge is to sustain these reductions over time. Methods: A retrospective cohort chart review of consecutive surgical patients (n = 1002 during the period encompassing October through November of 2016, the sustainability group (G16. Descriptive statistics were used to compare G16 with the implementation group (G14 in regard to demographic data, and Z-score and Chi-square (χ2 statistics were utilized to determine levels of signifi cance. Correlations were calculated to determine levels of compliance to the protocol and the incidence of PONV. Results: A significant (P = 0.0007 reduction in PONV incidence was identified as 8.5% (85/1002 in G16 compared to 13.4% (134/997 achieved in G14. Overall compliance with the targeted prophylaxis protocol was 87.2% (G16, 874/1002, a significant (P = 0.0001 improvement compared to 79% (G14, 788/997. A 61.1% (11/18 incidence of PONV in laparoscopic gastric bypass patients was identifi ed in the G16 group. Conclusions: Initial reductions in PONV were not only sustained but significantly improved. Preoperative risk assessment for PONV, risk stratification, and fidelity to anti-emetic prophylaxis protocols reduce the incidence of PONV in the post-anesthesia care unit. High-risk patients require three or more interventions to obtain acceptable reductions in PONV. Laparoscopic gastric bypass patients remain a high-risk group requiring aggressive multimodal prophylaxis beyond their Apfel simplifi ed risk score.

  14. Expansion of the baby-friendly hospital initiative ten steps to successful breastfeeding into neonatal intensive care

    DEFF Research Database (Denmark)

    Nyqvist, Kerstin H; Häggkvist, Anna-Pia; Hansen, Mette N

    2013-01-01

    provision of antenatal information, that are specific to neonatal care. Facilitation of early, continuous, and prolonged skin-to-skin contact (kangaroo mother care), early initiation of breastfeeding, and mothers' access to breastfeeding support during the infants' whole hospital stay are important. Mother......In the World Health Organization/United Nations Children's Fund document Baby-Friendly Hospital Initiative: Revised, Updated and Expanded for Integrated Care, neonatal care is mentioned as 1 area that would benefit from expansion of the original Ten Steps to Successful Breastfeeding. The different...... situations faced by preterm and sick infants and their mothers, compared to healthy infants and their mothers, necessitate a specific breastfeeding policy for neonatal intensive care and require that health care professionals have knowledge and skills in lactation and breastfeeding support, including...

  15. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  16. Heuristic attacks against graphical password generators

    CSIR Research Space (South Africa)

    Peach, S

    2010-05-01

    Full Text Available In this paper the authors explore heuristic attacks against graphical password generators. A new trend is emerging to use user clickable pictures to generate passwords. This technique of authentication can be successfully used for - for example...

  17. Pericarditis - after heart attack

    Science.gov (United States)

    ... medlineplus.gov/ency/article/000166.htm Pericarditis - after heart attack To use the sharing features on this page, ... occur in the days or weeks following a heart attack . Causes Two types of pericarditis can occur after ...

  18. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle becomes ...

  19. Social engineering attack framework

    CSIR Research Space (South Africa)

    Mouton, F

    2014-07-01

    Full Text Available link. A social engineering attack targets this weakness by; using various manipulation techniques in order to elicit sensitive; information. The field of social engineering is still in its infancy; stages with regards to formal definitions and attack...

  20. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  1. Solidarity under Attack

    DEFF Research Database (Denmark)

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  2. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... Ischemic Attack TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an artery for a short time. The only difference between a stroke ...

  3. Expansion of the baby-friendly hospital initiative ten steps to successful breastfeeding into neonatal intensive care: expert group recommendations.

    Science.gov (United States)

    Nyqvist, Kerstin H; Häggkvist, Anna-Pia; Hansen, Mette N; Kylberg, Elisabeth; Frandsen, Annemi L; Maastrup, Ragnhild; Ezeonodo, Aino; Hannula, Leena; Haiek, Laura N

    2013-08-01

    In the World Health Organization/United Nations Children's Fund document Baby-Friendly Hospital Initiative: Revised, Updated and Expanded for Integrated Care, neonatal care is mentioned as 1 area that would benefit from expansion of the original Ten Steps to Successful Breastfeeding. The different situations faced by preterm and sick infants and their mothers, compared to healthy infants and their mothers, necessitate a specific breastfeeding policy for neonatal intensive care and require that health care professionals have knowledge and skills in lactation and breastfeeding support, including provision of antenatal information, that are specific to neonatal care. Facilitation of early, continuous, and prolonged skin-to-skin contact (kangaroo mother care), early initiation of breastfeeding, and mothers' access to breastfeeding support during the infants' whole hospital stay are important. Mother's own milk or donor milk (when available) is the optimal nutrition. Efforts should be made to minimize parent-infant separation and facilitate parents' unrestricted presence with their infants. The initiation and continuation of breastfeeding should be guided only by infant competence and stability, using a semi-demand feeding regimen during the transition to exclusive breastfeeding. Pacifiers are appropriate during tube-feeding, for pain relief, and for calming infants. Nipple shields can be used for facilitating establishment of breastfeeding, but only after qualified support and attempts at the breast. Alternatives to bottles should be used until breastfeeding is well established. The discharge program should include adequate preparation of parents, information about access to lactation and breastfeeding support, both professional and peer support, and a plan for continued follow-up.

  4. A Review of a Successful Unsubsidized Market-Based Rural Solar Development Initiative in Laikipia District, Central Kenya

    Directory of Open Access Journals (Sweden)

    O. Wambuguh

    2013-10-01

    Full Text Available The development of renewable energy technologies (RETs in many areas far from grid-based electricity have primarily involved solar photovoltaics (SPVs which tap solar radiation to provide heat, light, hot water, electricity, and cooling for homes, businesses, and industry. A study on RETs took place in the Wiyumiririe Location of Laikipia District (north-central Kenya, a rich agricultural region. To explore this solar initiative in such a remote part of the country, a purposive randomized convenience sample of 246 households was selected and landowner interviews conducted, followed by field visits and observations. Although more than half of the households visited had SPV installations, solar energy was found to contribute only 18% of household estimated total energy needs; most residents still primarily relying on traditional energy sources. Several types of solar panels of different capacities and costs were utilized. Many landowners had at least one or two rooms using solar energy for household lighting, for appliance charging and to power radio and television. Almost all respondents appreciated that solar energy was clean renewable energy that greatly improved household living conditions; gave them some prestige; was easy to use and maintain; and was available year around. Although such significant benefits were associated with SPVs, only about 40% of residents interviewed were somehow satisfied with its development. Respondents expressed specific developmental initiatives that were closely associated with the availability of solar energy. Nevertheless, a number of challenges were raised associated with SPVs primarily investment capital and equipment costs and maintenance. As solutions to capital building will not solely rely on subsidies or individual farmer inputs, strategies must be found to mobilize the essential and tested tools for success including sustainable capital generation, building local institutions and capacities that

  5. Development of a framework towards successful implementation of e-governance initiatives in health sector in India.

    Science.gov (United States)

    Ray, Subhasis; Mukherjee, Amitava

    2007-01-01

    The purpose of this paper is to explore the route map for employing efficient e-governance so that at least existing resource and infrastructure are better utilized and deficiencies are tracked for future planning. National health is one of the most important factors in a country's economic growth. India seems to be a victim of the vicious cycle around poor economy and poor health conditions. A detailed study was carried out to find out India's healthcare infrastructure and its standing in e-governance initiatives. After consolidating the fact that effective e-governance can enhance the quality of healthcare service even within limited resources, authors explored success and failure factors of many e-governance initiatives in India and abroad. Finally, an e-governance framework is suggested based on the above factors together with the authors' own experience of implementing e-governance projects in India and abroad. The suggested framework is based on a phased implementation approach. The first phase "Information Dissemination" is more geared towards breaking the "digital divide" across three dimensions: G2Business; G2Citizen; and G2Agent. The most advanced stage is aimed towards joining up healthcare information across the above three dimensions and drawing meaningful analytics out of it. The recommendations also include management of Policies, Scope, Process Reform, Infrastructure, Technology, Finance, Partnership and People for efficient implementation of such e-governance initiatives. The paper provides measures for continuous evaluation of systems as one passes through various stages of implementation. However, the framework can be tested on real or simulated environment to prove its worthiness. This paper can be a potential frame of reference for nation-wide e-healthcare projects not only in India but also in other developing countries. The paper also describes challenges that are most likely to be faced during implementation. Since the paper is practical in

  6. Quantitative Attack Tree Analysis via Priced Timed Automata

    NARCIS (Netherlands)

    Kumar, Rajesh; Ruijters, Enno Jozef Johannes; Stoelinga, Mariëlle Ida Antoinette; Sankaranarayanan, Sriram; Vicario, Enrico

    The success of a security attack crucially depends on the resources available to an attacker: time, budget, skill level, and risk appetite. Insight in these dependencies and the most vulnerable system parts is key to providing effective counter measures. This paper considers attack trees, one of the

  7. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore......, in periods following large attacks a new attack is more likely to be small compared to other periods. Finally, we analyze the long-run consequences of the recruitment effect. We show that it leads to more counterterrorism, more small attacks, and a higher sum of terrorism damage and counterterrorism costs...

  8. Delays in hiring Air Traffic Collegiate Training Initiative (AT-CTI) graduates and the impact on their training success rate

    Science.gov (United States)

    Jorgenson, Terra A.

    This research project identified three distinct groups of individuals the Federal Aviation Administration (FAA) utilizes when filling the employee ranks of Air Traffic Controllers (ATC). After a nationwide strike, President Reagan fired the entire ATC workforce in 1981 (Pavel, 2012). Since then the FAA has worked very diligently in filling the vacant positions. Now three decades later the impending retirements and attrition of those hired earlier is estimated at nearly 14,000 controllers over the next 10 years (FAA CWP, 2012). In response to this shortage it would be advantageous for the FAA to minimize the time lapsed in the selection, hiring and training processes. If the hiring process time was decreased, it would save the FAA money in terms of a reduction in the initial cost of training Air Traffic Controllers (GAO, 2012; IRP, 2011). Traditionally the FAA hires from three distinct groups of people. The first is those with prior ATC experience which was usually obtained through the military. Second the general public with no experience and third the Air Traffic Collegiate Training Initiative (AT-CTI) candidates. The AT-CTI program is a valued partner with the FAA that helps educate the next generation of Air Traffic Controllers; however in the past the program has had difficulty producing the total number of replacement controllers needed. Due to the delay some CTI graduates may choose other career paths rather than wait and be hired to go to the FAA Academy which will further reduce the number of candidates for the FAA to hire. To date, no public research has been done pertaining to the time delay in the hiring process of AT-CTI candidates and the impact on training success at the FAA Academy and at the CTI's first FAA facility. This study used a survey tool to gather information on how long AT-CTI graduates wait to be hired to attend the FAA Academy. Information was gathered on the factors that may affect the time lapse between graduation and the time they

  9. VoIP attacks detection engine based on neural network

    Science.gov (United States)

    Safarik, Jakub; Slachta, Jiri

    2015-05-01

    The security is crucial for any system nowadays, especially communications. One of the most successful protocols in the field of communication over IP networks is Session Initiation Protocol. It is an open-source project used by different kinds of applications, both open-source and proprietary. High penetration and text-based principle made SIP number one target in IP telephony infrastructure, so security of SIP server is essential. To keep up with hackers and to detect potential malicious attacks, security administrator needs to monitor and evaluate SIP traffic in the network. But monitoring and following evaluation could easily overwhelm the security administrator in networks, typically in networks with a number of SIP servers, users and logically or geographically separated networks. The proposed solution lies in automatic attack detection systems. The article covers detection of VoIP attacks through a distributed network of nodes. Then the gathered data analyze aggregation server with artificial neural network. Artificial neural network means multilayer perceptron network trained with a set of collected attacks. Attack data could also be preprocessed and verified with a self-organizing map. The source data is detected by distributed network of detection nodes. Each node contains a honeypot application and traffic monitoring mechanism. Aggregation of data from each node creates an input for neural networks. The automatic classification on a centralized server with low false positive detection reduce the cost of attack detection resources. The detection system uses modular design for easy deployment in final infrastructure. The centralized server collects and process detected traffic. It also maintains all detection nodes.

  10. What Is a Heart Attack?

    Science.gov (United States)

    ... Research Home / Heart Attack Heart Attack Also known as Myocardial infarction Leer en español ... or years after the procedure. Other Treatments for Heart Attack Other treatments for heart attack include: Medicines Medical ...

  11. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  12. Two Improved Multiple-Differential Collision Attacks

    Directory of Open Access Journals (Sweden)

    An Wang

    2014-01-01

    Full Text Available In CHES 2008, Bogdanov proposed multiple-differential collision attacks which could be applied to the power analysis attacks on practical cryptographic systems. However, due to the effect of countermeasures on FPGA, there are some difficulties during the collision detection, such as local high noise and the lack of sampling points. In this paper, keypoints voting test is proposed for solving these problems, which can increase the success ratio from 35% to 95% on the example of one implementation. Furthermore, we improve the ternary voting test of Bogdanov, which can improve the experiment efficiency markedly. Our experiments show that the number of power traces required in our attack is only a quarter of the requirement of traditional attack. Finally, some alternative countermeasures against our attacks are discussed.

  13. Kleptographic Attacks on ECDSA

    Directory of Open Access Journals (Sweden)

    Nadezhda Anatolievna Chepick

    2014-12-01

    Full Text Available This paper presents secretly trapdoor with universal protection (SETUP attacks on the elliptic curve digital signature algorithm ECDSA. It allows a malicious manufacturer of black-box cryptosystems to implement these attacks to get access to user’s private key. The attacker can obtain user’s private key. The way ECDSA can be used for encryption and key exchange is also described.

  14. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  15. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  16. Protecting complex infrastructures against multiple strategic attackers

    Science.gov (United States)

    Hausken, Kjell

    2011-01-01

    Infrastructures are analysed subject to defence by a strategic defender and attack by multiple strategic attackers. A framework is developed where each agent determines how much to invest in defending versus attacking each of multiple targets. A target can have economic, human and symbolic values, which generally vary across agents. Investment expenditure functions for each agent can be linear in the investment effort, concave, convex, logistic, can increase incrementally, or can be subject to budget constraints. Contest success functions (e.g., ratio and difference forms) determine the probability of a successful attack on each target, dependent on the relative investments of the defender and attackers on each target, and on characteristics of the contest. Targets can be in parallel, in series, interlinked, interdependent or independent. The defender minimises the expected damage plus the defence expenditures. Each attacker maximises the expected damage minus the attack expenditures. The number of free choice variables equals the number of agents times the number of targets, or lower if there are budget constraints. Each agent is interested in how his investments vary across the targets, and the impact on his utilities. Alternative optimisation programmes are discussed, together with repeated games, dynamic games and incomplete information. An example is provided for illustration.

  17. Soviet Post Attack Recovery: An Initial Assessment

    Science.gov (United States)

    1978-05-01

    Soviet economy. In its second stage, the one employed for the research reported here, it consisted of 156 stochastic equations and 97 identities . These...This meas, in particulars 9 no changes In the agricultural sector except for a 10 percent rural population los 9 no chimgs in Soviet esports or

  18. Plants under dual attack

    NARCIS (Netherlands)

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses such

  19. Heart attack - discharge

    Science.gov (United States)

    ... and lifestyle Cholesterol - drug treatment Controlling your high blood pressure Deep vein thrombosis - discharge Dietary fats explained Fast food tips Heart attack - discharge Heart attack - what to ask your doctor Heart bypass ... pacemaker - discharge High blood pressure - what to ask your doctor How to read ...

  20. Investigating Sophomore Student Success: The National Survey of Sophomore-Year Initiatives and the Sophomore Experiences Survey, 2014. Research Reports on College Transitions No. 6

    Science.gov (United States)

    Young, Dallin George; Schreiner, Laurie A.; McIntosh, Eric J.

    2015-01-01

    Less is known about the second college year compared to other transition points, and fewer high-impact initiatives and curricular programs tend to be offered to sophomores. To increase our knowledge of this important, but sometimes neglected, year on the collegiate journey, "Investigating Sophomore Student Success" presents findings from…

  1. Programs of Study as a State Policy Mandate: A Longitudinal Study of the South Carolina Personal Pathways to Success Initiative. Final Technical Report: Major Findings and Implications

    Science.gov (United States)

    Hammond, Cathy; Drew, Sam F.; Withington, Cairen; Griffith, Cathy; Swiger, Caroline M.; Mobley, Catherine; Sharp, Julia L.; Stringfield, Samuel C.; Stipanovic, Natalie; Daugherty, Lindsay

    2013-01-01

    This is the final technical report from the National Research Center for Career and Technical Education's (NRCCTE's) five-year longitudinal study of South Carolina's Personal Pathway to Success initiative, which was authorized by the state's Education and Economic Development Act (EEDA) in 2005. NRCCTE-affiliated researchers at the National…

  2. Nocturnal panic attacks

    Directory of Open Access Journals (Sweden)

    Lopes Fabiana L.

    2002-01-01

    Full Text Available The panic-respiration connection has been presented with increasing evidences in the literature. We report three panic disorder patients with nocturnal panic attacks with prominent respiratory symptoms, the overlapping of the symptoms with the sleep apnea syndrome and a change of the diurnal panic attacks, from spontaneous to situational pattern. The implication of these findings and awareness to the distinct core of the nocturnal panic attacks symptoms may help to differentiate them from sleep disorders and the search for specific treatment.

  3. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  4. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  5. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  6. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  7. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an ... a short time. The only difference between a stroke and TIA is that with TIA the blockage ...

  8. Successful Liver Transplant Complicated by Severe Portopulmonary Hypertension After an Initial Aborted Attempt: Case Report and Review of Treatment Options.

    Science.gov (United States)

    Reid, Keith; McQuillan, Patrick; Kadry, Zakiyah; Janicki, Piotr; Bezinover, Dmitri

    2017-06-01

    Good right ventricular function and responsiveness to vasodilator therapy are the most important prerequisites for successful liver transplant in patients with portopulmonary hypertension. A patient with portopulmonary hypertension and good right ventricular function presented for deceased-donor liver transplant. Pulmonary arterial pressure was controlled with epoprostenol and sildenafil preoperatively. After anesthesia induction, pulmonary arterial pressure increased significantly and the procedure was aborted. Additional medical treatment included aggressive vasodilator therapy and the transplant was successfully performed 1 month later. During the procedure, elevations in pulmonary arterial pressure responded to a combination of inhaled nitric oxide, intravenous milrinone and nitroglycerin, and optimization of mechanical ventilation.

  9. Facial Dog Attack Injuries

    OpenAIRE

    Lin, Wei; Patil, Pavan Manohar

    2013-01-01

    The exposed position of the face makes it vulnerable to dog bite injuries. This fact combined with the short stature of children makes them a high-risk group for such attacks. In contrast to wounds inflicted by assaults and accidents, dog bite wounds are deep puncture type wounds compounded by the presence of pathologic bacteria from the saliva of the attacking dog. This, combined with the presence of crushed, devitalized tissue makes these wounds highly susceptible to infection. Key to succe...

  10. False Positive and False Negative Effects on Network Attacks

    Science.gov (United States)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  11. Noncombatants and liability to be attacked in wars

    DEFF Research Database (Denmark)

    Lippert-Rasmussen, Kasper

    2013-01-01

    attack," I mean that S has forfeited his or her right not to be attacked by armed forces. Here, "liable" is used in a normative-cum-legal sense, not descriptively as it is when one says "some colors are liable to darken in perpetual shade," and "attack" is used passively, as an equivalent of be attacked....... Colloquially, then, "S is liable to attack" means roughly that S is a legitimate target. Given this, it should be clear that when I talk about the criteria of "liability to attack," I am talking in effect about the features separating people who may and may not be attacked. Unless I indicate otherwise, I also...... mean to focus on intended, as opposed to incidental, attacks. Finally, although "attack" often implies initiation of a conflict ("I didn't attack him! He started it!"), it does not do so here. An unjust aggressor who initiates a conflict can be, and indeed very often is, liable to attack. All...

  12. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  13. Factors affecting initial training success of blood glucose testing in captive chimpanzees (Pan troglodytes)

    DEFF Research Database (Denmark)

    Reamer, Lisa A; Haller, Rachel L; Thiele, Erica J

    2014-01-01

    Type 2 diabetes can be a problem for captive chimpanzees. Accurate blood glucose (BG) readings are necessary to monitor and treat this disease. Thus, obtaining voluntary samples from primates through positive reinforcement training (PRT) is critical. The current study assessed the voluntary...... participation of 123 chimpanzees in BG sampling and investigated factors that may contribute to individual success. All subjects participate in regular PRT sessions as part of a comprehensive behavioral management program. Basic steps involved in obtaining BG values include: voluntarily presenting a finger...... important implications for captive management and training program success, underlining individual differences in training aptitude and the need for developing individual management plans in order to provide optimal care and treatment for diabetic chimpanzees in captivity....

  14. Flow-based Brute-force Attack Detection

    OpenAIRE

    Drašar, Martin; Vykopal, Jan; Winter, Philipp

    2013-01-01

    Brute-force attacks are a prevalent phenomenon that is getting harderto successfully detect on a network level due to increasing volume and en-cryption of network traffic and growing ubiquity of high-speed networks.Although the research in this field advanced considerably, there still remainclasses of attacks that are undetectable. In this chapter, we present sev-eral methods for the detection of brute-force attacks based on the analysisof network flows. We discuss their strengths and shortco...

  15. Efecto de la posición inicial sobre la respuesta de reacción en las acciones de ataque en esgrima. [Effect of the initial position on the reaction response in the actions of attack in fencing].

    Directory of Open Access Journals (Sweden)

    Marcos Gutiérrez-Dávila

    2013-10-01

    competition of more than five years participated in this study. Two force platforms, operating to 500 Hz, a video camera, to 210 Hz and an electronic chronometer adapted to the system of wired up of the sword were used to record data. An electronic signal was used to synchronise all the recording systems mentioned. For the experimental situation where the CM was moving towards the back foot (backward, the fencer adopted the position of "en garde" with a vertical force on the back foot, between 65 % and 75 % of the corporal weight, and between 45 % and 55 % for the experimental situation of equidistant (equidistant distribution of both supports. In a third situation, the fencer adopted his/her habitual position of "en garde". The results indicated that, the backward position increases the time of movement and the speed of the CM decreases during the movement initiation of the lunge attack.http://dx.doi.org/10.5232/ricyde2013.03406

  16. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  17. The Environmental Health/Home Safety Education Project: a successful and practical U.S.-Mexico border initiative.

    Science.gov (United States)

    Forster-Cox, Susan C; Mangadu, Thenral; Jacquez, Benjamín; Fullerton, Lynne

    2010-05-01

    The Environmental Health/Home Safety Education Project (Proyecto de Salud Ambiental y Seguridad en el Hogar) has been developed in response to a wide array of severe and often preventable environmental health issues occurring in and around homes on the U.S.-Mexico border. Utilizing well-trained community members, called promotoras , homes are visited and assessed for potential environmental hazards, including home fire and food safety issues. Data analyzed from project years 2002 to 2005 shows a significant impact in knowledge levels and initial behavior change among targeted participants as it relates to fire and food safety issues. Since the initiation of the project in 1999, hundreds of participants have improved their quality of life by making their homes safer. The project has proven to be sustainable, replicable, flexible, and attractive to funders.

  18. Collaborative Attack vs. Collaborative Defense

    Science.gov (United States)

    Xu, Shouhuai

    We have witnessed many attacks in the cyberspace. However, most attacks are launched by individual attackers even though an attack may involve many compromised computers. In this paper, we envision what we believe to be the next generation cyber attacks — collaborative attacks. Collaborative attacks can be launched by multiple attackers (i.e., human attackers or criminal organizations), each of which may have some specialized expertise. This is possible because cyber attacks can become very sophisticated and specialization of attack expertise naturally becomes relevant. To counter collaborative attacks, we might need collaborative defense because each “chain” in a collaborative attack may be only adequately dealt with by a different defender. In order to understand collaborative attack and collaborative defense, we present a high-level abstracted framework for evaluating the effectiveness of collaborative defense against collaborative attacks. As a first step towards realizing and instantiating the framework, we explore a characterization of collaborative attacks and collaborative defense from the relevant perspectives.

  19. The Success Rate of Initial {sup 131I} Ablation in Differentiated Thyroid Cancer: Comparison Between Less strict and Very Strict Low Iodine Diets

    Energy Technology Data Exchange (ETDEWEB)

    Yoo, Ik Dong; Kim, Sung Hoon; Seo, Ye Young; Oh, Jin Kyoung; O, Joo Hyun; Chung, Soo Kyo [The Catholic Univ. of Korea, Seoul (Korea, Republic of)

    2012-03-15

    To decrease the risk of recurrence or metastasis in differentiated thyroid cancer (DTC), selected patients receive radioactive iodine ablation of remnant thyroid tissue or tumor. A low iodine diet can enhance uptake of radioactive iodine. We compared the success rates of radioactive iodine ablation therapy in patients who followed two different low iodine diets (LIDs). The success rates of postsurgical radioactive iodine ablation in DTC patients receiving empiric doses of 150 mCi were retrospectively reviewed. First-time radioactive iodine ablation therapy was done in 71 patients following less strict LID. Less strict LID restricted seafood, iodized salt, egg yolk, dairy products, processed meat, instant prepared meals, and multivitamins. Very strict LID additionally restricted rice, freshwater fish, spinach, and soybean products. Radioactive iodine ablation therapy was considered successful when follow up {sup 123I} whole body scan was negative and stimulated serum thyroglobulin level was less than 2.0 ng/mL. The success rate of patients following less strict LID was 80.3% and for very strict LID 75.6%. There was no statistically significant difference in the success rates between the two LID groups (P=0.48). Very strict LID may not contribute to improving the success rate of initial radioactive iodine ablation therapy at the cost of great inconvenience to the patient.

  20. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  1. Routine delayed voiding cystourethography after initial successful endoscopic treatment with Dextranomer/Hialuronic Acid Copolimer (Dx/HA) of vesicoureteral reflux (VUR). Is it necessary?

    Science.gov (United States)

    García-Aparicio, L; Blázquez-Gómez, E; Vila Santandreu, A; Camacho Diaz, J A; Vila-Cots, J; Ramos Cebrian, M; de Haro, I; Martin, O; Tarrado, X

    2016-12-01

    Some guidelines recommend an early voiding cystourethrography (VCUG) after endoscopic treatment of vesicoureteral reflux (VUR), but there's no consensus if it's necessary a long-term follow-up in these patients. The aim of our study is analyze if it's necessary a delayed VCUG after initial successful treatment with Dx/HA. We have reviewed all medical charts of patients that underwent Dx/HA treatment from 2006 to 2010. We have selected patients with initial successful treatment and more than 3 years of radiological and clinical follow-up. We have analyzed late clinical and radiological outcomes. One hundred and sixty children with 228 refluxing ureters underwent Dx/HA endoscopic treatment with a mean follow-up of 52.13 months. Early VCUG was performed in 215 ureters with an initial successful rate of 84.1%. The group of study was 94/215 ureters with more than 3 years of follow-up with a delayed VCUG. VUR was still resolved in 79,8% of the ureters. Clinical success rate was 91.7%. The incidence of febrile urinary tract infection in those patients with cured VUR and those with a relapsed VUR was 8 and 15%, respectively; but there were no significant differences. We have not found any variable related with relapsed VUR except those ureters that initially received 2 injections (P<.05). If our objective in the treatment of VUR is to reduce the incidence of febrile urinary tract infection it is not necessary to perform a delayed VCUG even though the long-term radiological outcomes is worse than clinical outcome. Copyright © 2016 AEU. Publicado por Elsevier España, S.L.U. All rights reserved.

  2. Successful implementation of diabetes audits in Australia: The Australian National Diabetes Information Audit and Benchmarking (ANDIAB) initiative.

    Science.gov (United States)

    Lee, S; Colagiuri, S; Flack, J R

    2018-04-06

    We developed and implemented a national audit and benchmarking programme to describe the clinical status of people with diabetes attending specialist diabetes services in Australia. The Australian National Diabetes Information Audit and Benchmarking (ANDIAB) initiative was established as a quality audit activity. De-identified data on demographic, clinical, biochemical and outcome items were collected from specialist diabetes services across Australia to provide cross-sectional data on people with diabetes attending specialist centres at least biennially during the years 1998 to 2011. In total, 38 155 sets of data were collected over the eight ANDIAB audits. Each ANDIAB audit achieved its primary objective to collect, collate, analyse, audit and report clinical diabetes data in Australia. Each audit resulted in the production of a pooled data report, as well as individual site reports allowing comparison and benchmarking against other participating sites. The ANDIAB initiative resulted in the largest cross-sectional national de-identified dataset describing the clinical status of people with diabetes attending specialist diabetes services in Australia. ANDIAB showed that people treated by specialist services had a high burden of diabetes complications. This quality audit activity provided a framework to guide planning of healthcare services. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.

  3. Shark attack in Natal.

    Science.gov (United States)

    White, J A

    1975-02-01

    The injuries in 5 cases of shark attack in Natal during 1973-74 are reviewed. Experience in shark attacks in South Africa during this period is discussed (1965-73), and the value of protecting heavily utilized beaches in Natal with nets is assessed. The surgical applications of elasmobranch research at the Oceanographic Research Institute (Durban) and at the Headquarters of the Natal Anti-Shark Measures Board (Umhlanga Rocks) are described. Modern trends in the training of surf life-guards, the provision of basic equipment for primary resuscitation of casualties on the beaches, and the policy of general and local care of these patients in Natal are discussed.

  4. Understanding How Components of Organisations Contribute to Attacks

    DEFF Research Database (Denmark)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    components quickly results in a large quantity of interrelations, which are hard to grasp. In this work we present several approaches for visualising attributes of attacks such as likelihood of success, impact, and required time or skill level. The resulting visualisations provide a link between attacks...

  5. Amphibian Research and Monitoring Initiative (ARMI): A successful start to a national program in the United States

    Science.gov (United States)

    Muths, Erin; Jung, Robin E.; Bailey, Larissa L.; Adams, Michael J.; Corn, P. Stephen; Dodd, C. Kenneth; Fellers, Gary M.; Sadinski, Walter J.; Schwalbe, Cecil R.; Walls, Susan C.; Fisher, Robert N.; Gallant, Alisa L.; Battaglin, William A.; Green, D. Earl

    2005-01-01

    Most research to assess amphibian declines has focused on local-scale projects on one or a few species. The Amphibian Research and Monitoring Initiative (ARMI) is a national program in the United States mandated by congressional directive and implemented by the U.S. Department of the Interior (specifically the U.S. Geological Survey, USGS). Program goals are to monitor changes in populations of amphibians across U.S. Department of the Interior lands and to address research questions related to amphibian declines using a hierarchical framework of base-, mid- and apex-level monitoring sites. ARMI is currently monitoring 83 amphibian species (29% of species in the U.S.) at mid- and apex-level areas. We chart the progress of this 5-year-old program and provide an example of mid-level monitoring from 1 of the 7 ARMI regions.

  6. RFA: R-Squared Fitting Analysis Model for Power Attack

    Directory of Open Access Journals (Sweden)

    An Wang

    2017-01-01

    Full Text Available Correlation Power Analysis (CPA introduced by Brier et al. in 2004 is an important method in the side-channel attack and it enables the attacker to use less cost to derive secret or private keys with efficiency over the last decade. In this paper, we propose R-squared fitting model analysis (RFA which is more appropriate for nonlinear correlation analysis. This model can also be applied to other side-channel methods such as second-order CPA and collision-correlation power attack. Our experiments show that the RFA-based attacks bring significant advantages in both time complexity and success rate.

  7. Depression After Heart Attack

    Science.gov (United States)

    ... Heart Attack? Redford B. Williams Download PDF https://doi.org/10.1161/CIRCULATIONAHA.110.017285 Circulation. 2011; 123: ... e639-e640 , originally published June 27, 2011 https://doi.org/10.1161/CIRCULATIONAHA.110.017285 Citation Manager Formats ...

  8. Temporal Cyber Attack Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  9. Fatal crocodile attack.

    Science.gov (United States)

    Chattopadhyay, Saurabh; Shee, Biplab; Sukul, Biswajit

    2013-11-01

    Attacks on human beings by various animals leading to varied types of injuries and even death in some cases are not uncommon. Crocodile attacks on humans have been reported from a number of countries across the globe. Deaths in such attacks are mostly due to mechanical injuries or drowning. Bites by the crocodiles often cause the limbs to be separated from the body. The present case refers to an incident of a fatal attack by a crocodile on a 35 years old female where only the mutilated head of the female was recovered. Multiple lacerated wounds over the face and scalp along with fracture of the cranial bones was detected on autopsy. Two distinct bite marks in the form of punched in holes were noted over the parietal and frontal bones. Injuries on the head with its traumatic amputation from the body were sufficient to cause death. However, the presence of other fatal injuries on the unrecovered body parts could not be ruled out. Copyright © 2013 Elsevier Ltd and Faculty of Forensic and Legal Medicine. All rights reserved.

  10. Role of heterozygous APC mutation in niche succession and initiation of colorectal cancer--a computational study.

    Directory of Open Access Journals (Sweden)

    Roschen Sasikumar

    Full Text Available Mutations in the adenomatous polyposis coli (APC gene are found in most colorectal cancers. They cause constitutive activation of proliferative pathways when both alleles of the gene are mutated. However studies on individuals with familial adenomatous polyposis (FAP have shown that a single mutated APC allele can also create changes in the precancerous colon crypt, like increased number of stem cells, increased crypt fission, greater variability of DNA methylation patterns, and higher somatic mutation rates. In this paper, using a computational model of colon crypt dynamics, we evolve and investigate a hypothesis on the effect of heterozygous APC mutation that explains these different observations. Based on previous reports and the results from the computational model we propose the hypothesis that heterozygous APC mutation has the effect of increasing the chances for a stem cell to divide symmetrically, producing two stem cell daughters. We incorporate this hypothesis into the model and perform simulation experiments to investigate the consequences of the hypothesis. Simulations show that this hypothesis links together the changes in FAP crypts observed in previous studies. The simulations also show that an APC(+/- stem cell gets selective advantages for dominating the crypt and progressing to cancer. This explains why most colon cancers are initiated by APC mutation. The results could have implications for preventing or retarding the onset of colon cancer in people with inherited or acquired mutation of one APC allele. Experimental validation of the hypothesis as well as investigation into the molecular mechanisms of this effect may therefore be worth undertaking.

  11. BIRD ATTACK OCULAR INJURIES.

    Science.gov (United States)

    Tabatabaei, Seyed Ali; Soleimani, Mohammad; Behrouz, Mahmoud Jabbarvand

    2017-03-29

    To report 30 patients with bird attack-related eye injuries. This study was performed among patients coming to Farabi Eye Hospital, Tehran, Iran, from 2010 to 2015 with a history of bird attack causing eye injury. The inclusion criteria were a history of bird attack by pecking causing eye injury and having treatment and follow-up record for at least 6 months after treatment. The primary eye examinations included a full ophthalmic examination including evaluation of uncorrected visual acuity and best-corrected visual acuity (BCVA), anterior segment slit lamp biomicroscopy, and photography. For all patients with penetrating injury, primary repair was undertaken. Thirty patients (10 females and 20 males) with a mean age of 23.3 ± 18.5 years entered the study. The most common zone of injury was zone 1 (P < 0.001), and lensectomy was not needed in majority of patients (P < 0.001). The most common bird causing the injury was mynah (P < 0.001). Those patients with baseline BCVA of less than 20/200 or those with endophthalmitis had statistically worse final BCVA after treatment. Patients attacked by mynah bird had significantly better pretreatment uncorrected visual acuity and BCVA. The most common bird causing the eye injury among the sample of patients from Iran was mynah, which differs with previous studies indicating the rooster attack as the most common cause of eye injury. The authors also found that the most common zone of injury was zone 1, and the presence of endophthalmitis and lower baseline BCVA were significant risk factors for worse visual outcomes.

  12. Initial study of arthropods succession and pig carrion decomposition in two freshwater ecosystems in the Colombian Andes.

    Science.gov (United States)

    Barrios, Maria; Wolff, Marta

    2011-10-10

    Entomological succession and trophic roles of arthropods associated with different stages of carcass decomposition were studied to estimate the post-mortem submersion interval in two freshwater ecosystems in the Colombian Andes, at an altitude of 2614 m. Pig carcasses were employed as models placed 68 m apart, one in a stream (lotic) and another in an artificial lake (lentic). Decomposition time to skeletal remains was 74 days in the lake and 80 days in the stream. Six phases of decomposition were established: submerged fresh, early floating, floating decay, bloated deterioration, floating remains and sunken remains. A total of 18,832 organisms associated with the carcasses were collected: 11,487 in the lake (four orders, 19 families and 33 species) and 7345 in the stream (eight orders, 15 families and 25 species). Organisms were classified in the following ecological categories: shredders, collectors, predators, necrophagous, sarcosaprophagous and opportunists. Physical and chemical properties of the habitats, such as water temperature, CO(2) and conductivity, varied according to rainfall. In the lake, shredders (Coleoptera: Tropisternus sp. and Berosus sp.) and collectors (Diptera: Chironomus sp.) were found to be associated with submerged phases. Predators (Odonata) were only present during the first phases. Coleoptera (Dytiscidae) were found during floating decay and bloated deterioration stages. In the stream, shredders (Hyalella sp.) and collectors (Simulium sp.) were found during all stages, whereas the predator Oxelytrum discicolle was found exclusively during the floating stages, during which body temperature increased in a fashion similar to active decay in terrestrial environments. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.

  13. Blocking of Brute Force Attack

    OpenAIRE

    M.Venkata Krishna Reddy

    2012-01-01

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it co...

  14. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  15. A Traceability Attack against e-Passports

    Science.gov (United States)

    Chothia, Tom; Smirnov, Vitaliy

    Since 2004, many nations have started issuing "e-passports" containing an RFID tag that, when powered, broadcasts information. It is claimed that these passports are more secure and that our data will be protected from any possible unauthorised attempts to read it. In this paper we show that there is a flaw in one of the passport's protocols that makes it possible to trace the movements of a particular passport, without having to break the passport's cryptographic key. All an attacker has to do is to record one session between the passport and a legitimate reader, then by replaying a particular message, the attacker can distinguish that passport from any other. We have implemented our attack and tested it successfully against passports issued by a range of nations.

  16. Sapwood Stored Resources Decline in Whitebark and Lodgepole Pines Attacked by Mountain Pine Beetles (Coleoptera: Curculionidae).

    Science.gov (United States)

    Lahr, Eleanor C; Sala, Anna

    2016-12-01

    Recent outbreaks of forest insects have been directly linked to climate change-induced warming and drought, but effects of tree stored resources on insects have received less attention. We asked whether tree stored resources changed following mountain pine beetle (Dendroctonus ponderosae Hopkins) attack and whether they affected beetle development. We compared initial concentrations of stored resources in the sapwood of whitebark pine (Pinus albicaulis Engelmann) and lodgepole pine (Pinus contorta Douglas ex. Louden) with resource concentrations one year later, in trees that were naturally attacked by beetles and trees that remained unattacked. Beetles did not select host trees based on sapwood resources-there were no consistent a priori differences between attacked versus unattacked trees-but concentrations of nonstructural carbohydrate (NSC), lipids, and phosphorus declined in attacked trees, relative to initial concentrations and unattacked trees. Whitebark pine experienced greater resource declines than lodgepole pine; however, sapwood resources were not correlated with beetle success in either species. Experimental manipulation confirmed that the negative effect of beetles on sapwood and phloem NSC was not due to girdling. Instead, changes in sapwood resources were related to the percentage of sapwood with fungal blue-stain. Overall, mountain pine beetle attack affected sapwood resources, but sapwood resources did not contribute directly to beetle success; instead, sapwood resources may support colonization by beetle-vectored fungi that potentially accelerate tree mortality. Closer attention to stored resource dynamics will improve our understanding of the interaction between mountain pine beetles, fungi, and host trees, an issue that is relevant to our understanding of insect range expansion under climate change. © The Authors 2016. Published by Oxford University Press on behalf of Entomological Society of America. All rights reserved. For Permissions

  17. Effectiveness of the Call in Beach Volleyball Attacking Play

    Directory of Open Access Journals (Sweden)

    Künzell Stefan

    2014-12-01

    Full Text Available In beach volleyball the setter has the opportunity to give her or his hitter a “call”. The call intends that the setter suggests to her or his partner where to place the attack in the opponent’s court. The effectiveness of a call is still unknown. We investigated the women’s and men’s Swiss National Beach Volleyball Championships in 2011 and analyzed 2185 attacks. We found large differences between female and male players. While men called in only 38.4% of attacks, women used calls in 85.5% of attacks. If the male players followed a given call, 63% of the attacks were successful. The success rate of attacks without any call was 55.8% and 47.6% when the call was ignored. These differences were not significant (χ2(2 = 4.55, p = 0.103. In women’s beach volleyball, the rate of successful attacks was 61.5% when a call was followed, 35% for attacks without a call, and 42.6% when a call was ignored. The differences were highly significant (χ2(2 = 23.42, p < 0.0005. Taking into account the findings of the present study, we suggested that the call was effective in women’s beach volleyball, while its effect in men’s game was unclear. Considering the quality of calls we indicate that there is a significant potential to increase the effectiveness of a call.

  18. Step to improve neural cryptography against flipping attacks.

    Science.gov (United States)

    Zhou, Jiantao; Xu, Qinzhen; Pei, Wenjiang; He, Zhenya; Szu, Harold

    2004-12-01

    Synchronization of neural networks by mutual learning has been demonstrated to be possible for constructing key exchange protocol over public channel. However, the neural cryptography schemes presented so far are not the securest under regular flipping attack (RFA) and are completely insecure under majority flipping attack (MFA). We propose a scheme by splitting the mutual information and the training process to improve the security of neural cryptosystem against flipping attacks. Both analytical and simulation results show that the success probability of RFA on the proposed scheme can be decreased to the level of brute force attack (BFA) and the success probability of MFA still decays exponentially with the weights' level L. The synchronization time of the parties also remains polynomial with L. Moreover, we analyze the security under an advanced flipping attack.

  19. Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics

    Directory of Open Access Journals (Sweden)

    Sárkány Zoltán

    2016-03-01

    Full Text Available Introduction: The objective of this study was to investigate with the help of a computerized simulation model whether the treatment of an acute asthma attack can be individualized based on the severity of the attack and the characteristics of the patient. Material and Method: A stochastic lung model was used to simulate the deposition of 1 nm - 10 μm particles during a mild and a moderate asthma attack. Breathing parameters were varied to maximize deposition, and simulation results were compared with those obtained in the case of a severe asthma attack. In order to investigate the effect of height on the deposition of inhaled particles, another series of simulations was carried out with identical breathing parameters, comparing patient heights of 155 cm, 175 cm and 195 cm. Results: The optimization process yielded an increase in the maximum deposition values of around 6-7% for each type of investigated asthma attack, and the difference between attacks of different degree of severity was around 5% for both the initial and the optimized values, a higher degree of obstruction increasing the amount of deposited particles. Conclusions: Our results suggest that the individualization of asthma attack treatment cannot be based on particles of different size, as the highest deposited fraction in all three types of attacks can be obtained using 0.01 μm particles. The use of a specific set of breathing parameters yields a difference between a mild and a moderate, as well as a moderate and a severe asthma attack of around 5%.

  20. Heart Attack Coronary Artery Disease

    Science.gov (United States)

    ... our e-newsletter! Aging & Health A to Z Heart Attack Coronary Artery Disease, Angina Basic Facts & Information What ... and oxygen supply; this is what causes a heart attack. If the damaged area is small, however, your ...

  1. Thrombolytic drugs for heart attack

    Science.gov (United States)

    ... gov/ency/article/007488.htm Thrombolytic drugs for heart attack To use the sharing features on this page, ... supply blood and oxygen to the heart. A heart attack can occur if a blood clot stops the ...

  2. What Is a Heart Attack?

    Science.gov (United States)

    ... to help prevent your first heart attack. Heart-Healthy Lifestyle Changes A heart-healthy lifestyle can help prevent ... blood to flow to the heart muscle. Heart-Healthy Lifestyle Changes Treatment for a heart attack usually includes ...

  3. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  4. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  5. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    Directory of Open Access Journals (Sweden)

    Yi-Hsun Wang

    2010-09-01

    Full Text Available Web applications suffer from cross-site scripting (XSS attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model for generalizing the structure model. The paper has the contributions as following: (1 automatically learn the structure of attack vectors from practical data analysis to modeling a structure model of attack vectors, (2 mimic the manners and the elements of attack vectors to extend the ability of testing tool for identifying XSS vulnerabilities, (3 be helpful to verify the flaws of blacklist sanitization procedures of Web applications. We evaluated the proposed mechanism by Burp Intruder with a dataset collected from public XSS archives. The results show that mutated XSS attack generation can identify potential vulnerabilities.

  6. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  7. Cut-off value of initial serum β-hCG level predicting a successful MTX therapy in tubal ectopic pregnancy: a retrospective cohort study.

    Science.gov (United States)

    Helmy, S; Bader, Y; Pablik, E; Tiringer, D; Pils, S; Laml, T; Kölbl, H; Koch, M

    2014-08-01

    To determine the optimal serum β-hCG cut-off level to predict MTX treatment success in tubal ectopic pregnancy (EP). Data of 240 women, who presented between 2003 and 2011 at the Department of Gynecology and Obstetrics, Medical University of Vienna, with tubal EP and who received MTX as primary treatment, were retrieved from the hospital information system (KIS). 198 patients could be included for final evaluation. Statistical analysis included area under the ROC curve, maximal Euclidean and Youden index, chi-squared and a five-fold cross validation. The serum β-hCG level cut-off value was calculated at 2121mlU/ml with a specificity of 76.54% and sensitivity of 80.56% (AUC 0.789; ptreatment failure in 5.3% (n=7), compared to 43.3% (n=29) of patients with an initial serum β-hCG level equal to or above 2121mlU/ml (n=67). There was no statistically significant correlation between clinical symptoms and the MTX therapy outcome (p=0.580; likelihood quotient p=0.716). The correct decision of therapy in patients with tubal ectopic pregnancy still represents a challenge. In this study we can conclude that, according to our results there is no endpoint of initial serum β-hCG levels, which can be clearly used as cut-off value for the optimal management of tubal EP. However, an initial serum β-hCG level of less than 2121mlU/ml seems to be a good value to expect a successful MTX treatment. Limitations are the retrospective study design and the inability of classifying clinical symptoms like pain as an objective parameter. Wider implications of the findings may include more detailed patient information and more accurate selection of suitable patients for MTX therapy. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  8. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  9. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  10. Antiretroviral regimen durability and success in treatment-naïve and treatment-experienced patients by year of treatment initiation, United States, 1996–2011

    Science.gov (United States)

    Sheth, Anandi N.; Ofotokun, Ighovwerha; Buchacz, Kate; Armon, Carl; Chmiel, Joan S.; Hart, Rachel L.D.; Baker, Rose; Brooks, John T.; Palella, Frank J.

    2015-01-01

    Background Although modern combination antiretroviral therapy (cART) regimens are better tolerated and less complex than earlier treatments, regimen modification or discontinuation remains a concern. Methods We studied HIV Outpatient Study (HOPS) participants who initiated first or second cART regimens during: 1996–1999, 2000–2003, 2004–2007 and 2008–2011. We analyzed regimen durability (time to regimen modification) and success (achieving undetectable plasma HIV RNA) for first and second cART regimens using Kaplan-Meier curves and log-rank tests, and examined factors associated with durability and success of first cART regimen using proportional hazards models. Results Durability of cART was progressively longer for cART regimens initiated in more recent periods: median first cART regimen durations were 1.0, 1.1, 2.1 and 4.6 years in 1996–1999, 2000–2003, 2004–2007 and 2008–2011, and median second cART durations were 0.9, 1.2, 2.8 and 3.9 years, respectively (both p<0.001). Comparing 1996–1999 and 2008–2011, the percentage of patients who achieved an undetectable HIV RNA within 6 months of first cART initiation increased from 65% to 81%, and from 63% to 80% on second cART (both p<0.001). Among patients initiating first cART during 2008–2011, black non-Hispanic/Latino race/ethnicity and ≥twice daily dosing were significantly associated with higher rates of regimen modification (p<0.05), and higher baseline HIV RNA levels were associated with failure to achieve an undetectable HIV RNA (p<0.001). Conclusions Among HIV-infected U.S. adults in routine HIV care, durability of first and second cART regimens and the likelihood of prompt virologic suppression increased during 1996–2011, coincident with the availability of more tolerable, less complex cART options. PMID:26334737

  11. The success factors of scaling-up Estonian sexual and reproductive health youth clinic network--from a grassroots initiative to a national programme 1991-2013.

    Science.gov (United States)

    Kempers, Jari; Ketting, Evert; Chandra-Mouli, Venkatraman; Raudsepp, Triin

    2015-01-08

    A growing number of middle-income countries are scaling up youth-friendly sexual and reproductive health pilot projects to national level programmes. Yet, there are few case studies on successful national level scale-up of such programmes. Estonia is an excellent example of scale-up of a small grassroots adolescent sexual and reproductive health initiative to a national programme, which most likely contributed to improved adolescent sexual and reproductive health outcomes. This study; (1) documents the scale-up process of the Estonian youth clinic network 1991-2013, and (2) analyses factors that contributed to the successful scale-up. This research provides policy makers and programme managers with new insights to success factors of the scale-up, that can be used to support planning, implementation and scale-up of adolescent sexual and reproductive health programmes in other countries. Information on the scale-up process and success factors were collected by conducting a literature review and interviewing key stakeholders. The findings were analysed using the WHO-ExpandNet framework, which provides a step-by-step process approach for design, implementation and assessment of the results of scaling-up health innovations. The scale-up was divided into two main phases: (1) planning the scale-up strategy 1991-1995 and (2) managing the scaling-up 1996-2013. The planning phase analysed innovation, user organizations (youth clinics), environment and resource team (a national NGO and international assistance). The managing phase examines strategic choices, advocacy, organization, resource mobilization, monitoring and evaluation, strategic planning and management of the scale-up. The main factors that contributed to the successful scale-up in Estonia were: (1) favourable social and political climate, (2) clear demonstrated need for the adolescent services, (3) a national professional organization that advocated, coordinated and represented the youth clinics, (4) enthusiasm

  12. Algebraic Side-Channel Attack on Twofish

    Directory of Open Access Journals (Sweden)

    Chujiao Ma

    2017-05-01

    Full Text Available While algebraic side-channel attack (ASCA has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish. Compared to other algorithms that ASCA has been used on, Twofish is more difficult to attack due to the key-dependent S-boxes as well as the complex key scheduling. In this paper, we propose the first algebraic side-channel attack on Twofish, and examine the importance of side-channel information in getting past the key-dependent S-boxes and the complex key scheduling. The cryptographic algorithm and side-channel information are both expressed as boolean equations and a SAT solver is used to recover the key. While algebraic attack by itself is not sufficient to break the algorithm, with the help of side-channel information such as Hamming weights, we are able to correctly solve for 96 bits of the 128 bits key in under 2 hours with known plaintext/ciphertext.

  13. The efficacy and tolerability of frovatriptan and dexketoprofen for the treatment of acute migraine attacks.

    Science.gov (United States)

    Allais, Gianni; Rolando, Sara; De Lorenzo, Cristina; Benedetto, Chiara

    2014-08-01

    Frovatriptan is a triptan characterized by a high affinity for 5-HT1B/1D receptors and a long half-life contributing to a more sustained and prolonged action than other triptans. Dexketoprofen is a nonsteroidal anti-inflammatory drug with a relatively short half-life and rapid onset of action, blocking the action of cyclo-oxygenase, which is involved in prostaglandins' production, thus reducing inflammation and pain. Both drugs have been successfully employed as monotherapies for the treatment of acute migraine attacks. The combination of these two drugs (frovatriptan 2.5 mg plus dexketoprofen 25 or 37.5 mg) has been tested in migraine sufferers, showing a rapid and good initial efficacy, with 2-h pain free rates of 51%, and a high persistence in the 48-h following the onset of pain: recurrence occurred in only 29% of attacks and sustained pain free rates were 43% at 24- and 33% at 48-h.

  14. Cyber Attack: The Department of Defense’s Inability to Provide Cyber Indications and Warning

    Science.gov (United States)

    2006-02-07

    The Department of Defense (DoD) is currently unable to provide Indications and Warning (I&W) of cyber attacks against the DoD Global Information Grid...reactionary, and will only be initiated once an attack or probe has occurred. To provide adequate warning of potential cyber attacks , capabilities within...traditional intelligence disciplines like Human Intelligence (humint) and Signals Intelligence (sigint), IC will be able to provide I&W of future cyber attacks .

  15. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  16. Attacks on RFID Identification Systems

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-09-01

    Full Text Available This article is about attacks on RFID systems. Currently antivirus developers are not developing systems that protect from viruses that could exist on RFID tags. Such viruses are considered as not existing because the RFID tag memory is very small. Unfortunately such viruses exist. This article is concerned to such viruses and attacks that hackers could do using such viruses. Based on this article methods to prevent RFID-viruses attacks could be developed.

  17. Shark attack: review of 86 consecutive cases.

    Science.gov (United States)

    Woolgar, J D; Cliff, G; Nair, R; Hafez, H; Robbs, J V

    2001-05-01

    On average there are approximately 50 confirmed shark attacks worldwide annually. Despite their rarity, such incidents often generate much public and media attention. The injuries of 86 consecutive victims of shark attack were reviewed from 1980 to 1999. Clinical data retrieved from the South African Shark Attack Files, maintained by the Natal Sharks Board, were retrospectively analyzed to determine the nature, treatment, and outcome of injuries. The majority of victims (n = 68 [81%]) had relatively minor injuries that required simple primary suture. Those patients (n = 16 [19%]) with more extensive limb lacerations longer than 20 cm or with soft-tissue loss of more than one myofascial compartment were associated with higher morbidity and limb loss. In 8 of the 10 fatalities, death occurred as a result of exsanguinating hemorrhage from a limb vascular injury. Victims of shark attack usually sustain only minor injuries. In more serious cases, particularly if associated with a major vascular injury, hemorrhage control and early resuscitation are of utmost importance during the initial management if these patients are to survive.

  18. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  19. Seven Deadliest Web Application Attacks

    CERN Document Server

    Shema, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then you need Seven Deadliest Web Application Attacks. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. .. .. Attacks detailed in this book include: ..: ..; Cross-Site Scripting (XSS) ..; Cross-Site Request Fo

  20. The Timing of Terrorist Attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2016-01-01

    I use a simple optimal stopping model to derive policy relevant insights on the timing of one-shot attacks by small autonomous terrorist units or “lone wolf” individuals. A main insight is that an increase in proactive counterterrorism measures can lead to a short term increase in the number...... of attempted terrorist attacks because it makes it more risky for existing terrorist units to pursue further development of capabilities. This is consistent with the events in London in 2005 where a terrorist attack on 7 July was followed by a similar but unsuccessful attack two weeks later....

  1. The Icatibant Outcome Survey: treatment of laryngeal angioedema attacks

    Science.gov (United States)

    Aberer, Werner; Bouillet, Laurence; Caballero, Teresa; Maurer, Marcus; Fabien, Vincent; Zanichelli, Andrea

    2016-01-01

    Objective To characterize the management and outcomes of life-threatening laryngeal attacks of hereditary angioedema (HAE) treated with icatibant in the observational Icatibant Outcome Survey (NCT01034969) registry. Methods This retrospective analysis was based on data from patients with HAE type I/II who received healthcare professional-administered or self-administered icatibant to treat laryngeal attacks between September 2008 and May 2013. Results Twenty centers in seven countries contributed data. Overall, 42 patients with HAE experienced 67 icatibant-treated laryngeal attacks. Icatibant was self-administered for 62.3% of attacks (healthcare professional-administered, 37.7%). One icatibant injection was used for 87.9% of attacks, with rescue or concomitant medication used for 9.0%. The median time to treatment was 2.0 h (n=31 attacks) and the median time to resolution was 6.0 h (n=35 attacks). Conclusions This analysis describes successful use of icatibant for the treatment of laryngeal HAE attacks in a real-world setting. PMID:27116379

  2. PUF Modeling Attacks on Simulated and Silicon Data

    OpenAIRE

    Ruhrmair, Ulrich; Solter, Jan; Sehnke, Frank; Xu, Xiaolin; Mahmoud, Ahmed; Stoyanova, Vera; Dror, Gideon; Schmidhuber, Jurgen; Burleson, Wayne; Devadas, Srinivas

    2013-01-01

    We discuss numerical modeling attacks on several proposed strong physical unclonable functions (PUFs). Given a set of challenge-response pairs (CRPs) of a Strong PUF, the goal of our attacks is to construct a computer algorithm which behaves indistinguishably from the original PUF on almost all CRPs. If successful, this algorithm can subsequently impersonate the Strong PUF, and can be cloned and distributed arbitrarily. It breaks the security of any applications that rest on the Strong PUF's ...

  3. Using the Domain Name System to Thwart Automated Client-Based Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Taylor, Curtis R [ORNL; Shue, Craig A [ORNL

    2011-09-01

    On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so. Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.

  4. Global Mapping of Cyber Attacks

    Science.gov (United States)

    2014-01-01

    Identifying factors behind countries weakness to cyber - attacks is an important step towards addressing these weaknesses at the root level. For...the lowest rates of cyber - attacks . This is surprising given the bad cyber reputation of some African countries such as Nigeria. Our research has many policy implications.

  5. [Heart-attack in pregnancy].

    Science.gov (United States)

    Výtisková, T; Suchá, D; Fučíková, Z

    To describe hear-attack on crystal meth addicted pregnant woman. Case report. Acute heart-attack during pregnancy means unexpected obstetric complication. The consequences could be fatal for the mother and the fetus. Although good delivery management and treatment could reduce morbidity and mortality to a minimum.

  6. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    string model. While our protocol is classical, it is sound against a cheating unbounded quantum prover and computational zero-knowledge even if the verifier is allowed a superposition attack. Finally, we consider multiparty computation and show that for the most general type of attack, simulation based...

  7. Multiculturalism & The Charlie Hebdo Attack

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2016-01-01

    The attack on Charlie Hebdo has by many been linked to multiculturalism. But it is unclear exactly how the connection between multiculturalism and the attack should be understood and whether there indeed is such a connection. The article discusses this by distinguishing between different senses o...

  8. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    -prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...

  9. Two fatal tiger attacks in zoos.

    Science.gov (United States)

    Tantius, Britta; Wittschieber, Daniel; Schmidt, Sven; Rothschild, Markus A; Banaschak, Sibylle

    2016-01-01

    Two captive tiger attacks are presented that took place in Cologne and Münster zoos. Both attacks occurred when the handlers, intent on cleaning the enclosures, entered whilst the tigers accidently retained access to the location, and thus defended their territory against the perceived intruders. Both victims suffered fatal neck injuries from the bites. At Münster, colleagues managed to lure the tiger away from its victim to enable treatment, whilst the Cologne zoo tiger had to be shot in order to allow access to be gained. Whilst it was judged that human error led to the deaths of the experienced zookeepers, the investigation in Münster was closed as no third party was found to be at fault, whereas the Cologne zoo director was initially charged with being negligent. These charges were subsequently dismissed as safety regulations were found to be up to date.

  10. Influence of host size on the clutch size and developmental success of the gregarious ectoparasitoid Eulophus pennicornis (Nees) (Hymenoptera: Eulophidae) [corrected] attacking larvae of the tomato moth Lacanobia oleracea (L.) (Lepidoptera: Noctuidae).

    Science.gov (United States)

    Bell, H A; Marris, G C; Prickett, A J; Edwards, J P

    2005-08-01

    The relationship between clutch size, host size and progeny survival in the gregarious ectoparasitoid Eulophus pennicornis was investigated in a number of scenarios. When naive parasitoids were exposed singly to Lacanobia oleracea hosts, clutch size was strongly correlated with the size of the host. However, survival of parasitoid offspring was negatively affected by the size of the host such that, in larger hosts, greater wasp larval and pupal mortality was recorded. As a result, no gain in realised fecundity was achieved through parasitizing L. oleracea larvae of mass >0.4 g over hosts of mass between 0.2-0.3 g. When exposed to populations of mixed stadium hosts (larvae in the fourth, fifth and sixth instars) during the entire lifespan of the wasp, host size and clutch size were correlated in early ovipositions (first three ovipositions). However, as the wasps aged, the relationship was much less apparent. When the parasitoid was restricted to foraging upon populations of sixth instar hosts only, no relationship between host size and clutch size was apparent. Exposure of the parasitoid to mixed and fixed stadium host populations showed that final (sixth) stadium hosts were the most frequently parasitized (ca. 96% of parasitized hosts) and that the average numbers of eggs laid per wasp, and the number of hosts parasitized, was significantly lower when the parasitoid was provided with fourth or fifth instar hosts only. The results indicate that the reproductive success of E. pennicornis does not increase with increasing host size or greater resource availability above a certain threshold, and that the physiological status of the host at the time of parasitism is the governing factor determining oviposition decisions and parasitoid survival. We conclude that E. pennicornis has been selected to preferentially utilize those hosts that maximize progeny survival and to adapt clutch size to the size of such hosts. We hypothesize that the major driver leading to the

  11. A framework of initiatives for successful application of life cycle costing (LCC in industrialised building system (IBS in Malaysian construction industry

    Directory of Open Access Journals (Sweden)

    Shamsuddin Siti Mazzuana

    2017-01-01

    Full Text Available Industrialised Building System (IBS contributes a great shift in sustainable construction and benefits the society. Previous studies have proven in general that one of the hindrances in promoting sustainable in IBS, is a high cost for any pre-cast material specifically thus effected the overall cost. The introduction of Life Cycle Costing (LCC leads into providing a better and comprehensive cost estimation, including projecting actual cost to operate the building, hence providing a better baseline for decision making. The lacking application of LCC in IBS is still in trivial impact, therefore, this paper presents a framework which produced by expressing the successful initiatives of LCC and IBS in Malaysia construction industry. The framework developed based on findings from the extensive literature reviews, 164 responded questionnaires, and 19 expert opinions, which has three sections: Strategy Development, System Development and the last part is Decision Level. Aspects of objectivity, practicality, reliability, completeness that were likely to be implemented in the Malaysian construction industry were used. There are significant opinions on the usefulness and completeness of the proposed framework in providing a comprehensive cost estimates which helps much in deciding to carry out IBS or remain with a traditional construction method.

  12. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  13. Shark Attack Project - Marine Attack at Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Adrianus J

    2005-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  14. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security......The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...

  15. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    Science.gov (United States)

    Friedrich, Steinhäusler; Stan, Rydell; Lyudmila, Zaitseva

    2008-08-01

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb). This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment.

  16. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    International Nuclear Information System (INIS)

    Friedrich, Steinhaeusler; Lyudmila, Zaitseva; Stan, Rydell

    2008-01-01

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb).This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment

  17. Social Engineering Attack Detection Model: SEADMv2

    CSIR Research Space (South Africa)

    Mouton, F

    2015-10-01

    Full Text Available and is only able to cater for social engineering attacks that use bidirectional communication. Previous research discovered that social engineering attacks can be classified into three different categories, namely attacks that utilise bidirectional...

  18. Changes in vestibular evoked myogenic potentials after Meniere attacks.

    Science.gov (United States)

    Kuo, Shih-Wei; Yang, Ting-Hua; Young, Yi-Ho

    2005-09-01

    The aim of this study was to apply videonystagmography (VNG) and vestibular evoked myogenic potential (VEMP) tests to patients with Meniere attacks, to explore the mechanics of where saccular disorders may affect the semicircular canals. From January 2001 to December 2003, 12 consecutive patients with unilateral definite Meniere's disease with vertiginous attacks underwent VNG for recording spontaneous nystagmus, as well as VEMP tests. At the very beginning of the Meniere attack, the spontaneous nystagmus beat toward the lesion side in 5 patients (42%) and toward the healthy side in 7 patients (58%). Twenty-four hours later, only 6 patients (50%) showed spontaneous nystagmus beating toward the healthy side. Nevertheless, spontaneous nystagmus subsided in all patients within 48 hours. The VEMP test was performed within 24 hours of a Meniere attack; the VEMPs were normal in 4 patients and abnormal in 8 patients (67%). After 48 hours, 4 patients with initially abnormal VEMPs had resolution and return to normal VEMPs, and the other 4 patients still had absent VEMPs. Most patients (67%) with Meniere attacks revealed abnormal VEMPs, indicating that the saccule participates in a Meniere attack. This is an important idea that stimulates consideration of the mechanism of Meniere attacks.

  19. Construction of a Cyber Attack Model for Nuclear Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Varuttamaseni, Athi; Bari, Robert A.; Youngblood, Robert

    2017-05-01

    The consideration of how one compromised digital equipment can impact neighboring equipment is critical to understanding the progression of cyber attacks. The degree of influence that one component may have on another depends on a variety of factors, including the sharing of resources such as network bandwidth or processing power, the level of trust between components, and the inclusion of segmentation devices such as firewalls. The interactions among components via mechanisms that are unique to the digital world are not usually considered in traditional PRA. This means potential sequences of events that may occur during an attack may be missed if one were to only look at conventional accident sequences. This paper presents a method where, starting from the initial attack vector, the progression of a cyber attack can be modeled. The propagation of the attack is modeled by considering certain attributes of the digital components in the system. These attributes determine the potential vulnerability of a component to a class of attack and the capability gained by the attackers once they are in control of the equipment. The use of attributes allows similar components (components with the same set of attributes) to be modeled in the same way, thereby reducing the computing resources required for analysis of large systems.

  20. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  1. Robustness of coevolution in resolving prisoner's dilemma games on interdependent networks subject to attack

    Science.gov (United States)

    Liu, Penghui; Liu, Jing

    2017-08-01

    Recently, coevolution between strategy and network structure has been established as a rule to resolve social dilemmas and reach optimal situations for cooperation. Many follow-up researches have focused on studying how coevolution helps networks reorganize to deter the defectors and many coevolution methods have been proposed. However, the robustness of the coevolution rules against attacks have not been studied much. Since attacks may directly influence the original evolutionary process of cooperation, the robustness should be an important index while evaluating the quality of a coevolution method. In this paper, we focus on investigating the robustness of an elementary coevolution method in resolving the prisoner's dilemma game upon the interdependent networks. Three different types of time-independent attacks, named as edge attacks, instigation attacks and node attacks have been employed to test its robustness. Through analyzing the simulation results obtained, we find this coevolution method is relatively robust against the edge attack and the node attack as it successfully maintains cooperation in the population over the entire attack range. However, when the instigation probability of the attacked individuals is large or the attack range of instigation attack is wide enough, coevolutionary rule finally fails in maintaining cooperation in the population.

  2. Panic Attacks and Panic Disorder

    Science.gov (United States)

    ... in panic attacks. For example, if a grizzly bear came after you, your body would react instinctively. ... panic disorder Major life stress, such as the death or serious illness of a loved one A ...

  3. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    Applications of wireless sensor networks (WSNs) are growing tremendously in the domains of habitat, tele-health, industry monitoring, vehicular networks, home automation and agriculture. This trend is a strong motivation for malicious users to increase their focus on WSNs and to develop and initi......Applications of wireless sensor networks (WSNs) are growing tremendously in the domains of habitat, tele-health, industry monitoring, vehicular networks, home automation and agriculture. This trend is a strong motivation for malicious users to increase their focus on WSNs and to develop...... and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered...... the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it...

  4. Resolving the paradox for protein aggregation diseases: a common mechanism for aggregated proteins to initially attack membranes without needing aggregates [v1; ref status: indexed, http://f1000r.es/221

    OpenAIRE

    Haina Qin; Liangzhong Lim; Yuanyuan Wei; Garvita Gupta; Jianxing Song

    2013-01-01

    Paradoxically, aggregation of specific proteins is characteristic of many human diseases and aging, yet aggregates have been found to be unnecessary for initiating pathogenesis. Here we determined the NMR topology and dynamics of a helical mutant in a membrane environment transformed from the 125-residue cytosolic all-β MSP by the ALS-causing P56S mutation. Unexpectedly, despite its low hydrophobicity, the P56S major sperm protein (MSP) domain becomes largely embedded in the membrane environm...

  5. An unusual case of predation: dog pack or cougar attack?

    Science.gov (United States)

    Fonseca, Gabriel M; Palacios, Rocío

    2013-01-01

    Injuries produced by animals are capable of leaving severe patterns and in some cases may result in the death of the attacked individual. Law enforcement authorities may come to erroneous conclusions about the source of the bites based on their awareness of animals present and similarities of the injuries to the untrained eye, with dreadful consequences. Expertise of a carnivore biologist and an odontologist that indentifies the particularities of bite marks may be useful for identifying the attacking species. We present the investigation of a fatal dog pack attack involving a 43-year-old man in Bell Ville (Argentina) where the evidence provided by a forensic dentist and a biologist was categorical for establishing the animal species involved. Because of the unusual characteristics of the wounds and the initial hypothesis made by local authorities of a cougar attack, habits and specific patterns of both dog pack and cougar predation on humans are discussed. © 2012 American Academy of Forensic Sciences.

  6. An Approach for Assessing Consequences of Potential Supply Chain and Insider Contributed Cyber Attacks on Nuclear Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Chu, Tsong L.

    2016-11-06

    The Stuxnet attack at the Natanz facility is an example of a targeted and successful cyber attack on a nuclear facility. Snowden's release of National Security Agency documents demonstrated the consequences of the insider threat. More recently, the United States tried to attack North Korea but failed, South Korea was attempting to attack North Korea, and both applied Stuxnet-like approaches. These sophisticated targeted attacks differ from web-site hacking events that are reported almost daily in the news mainly because targeted attacks require detailed design and operation information of the systems attacked and/or are often carried out by insiders. For instance, in order to minimize disruption of facilities around the world, Stuxnet remained idle until it recognized the specific configuration of the Natanz facility, demonstrating that the attackers possessed extremely detailed information about the facility. Such targeted cyber attacks could become a national-level military weapon and be used in coercion of hostile countries.

  7. A New Unified Intrusion Anomaly Detection in Identifying Unseen Web Attacks

    Directory of Open Access Journals (Sweden)

    Muhammad Hilmi Kamarudin

    2017-01-01

    Full Text Available The global usage of more sophisticated web-based application systems is obviously growing very rapidly. Major usage includes the storing and transporting of sensitive data over the Internet. The growth has consequently opened up a serious need for more secured network and application security protection devices. Security experts normally equip their databases with a large number of signatures to help in the detection of known web-based threats. In reality, it is almost impossible to keep updating the database with the newly identified web vulnerabilities. As such, new attacks are invisible. This research presents a novel approach of Intrusion Detection System (IDS in detecting unknown attacks on web servers using the Unified Intrusion Anomaly Detection (UIAD approach. The unified approach consists of three components (preprocessing, statistical analysis, and classification. Initially, the process starts with the removal of irrelevant and redundant features using a novel hybrid feature selection method. Thereafter, the process continues with the application of a statistical approach to identifying traffic abnormality. We performed Relative Percentage Ratio (RPR coupled with Euclidean Distance Analysis (EDA and the Chebyshev Inequality Theorem (CIT to calculate the normality score and generate a finest threshold. Finally, Logitboost (LB is employed alongside Random Forest (RF as a weak classifier, with the aim of minimising the final false alarm rate. The experiment has demonstrated that our approach has successfully identified unknown attacks with greater than a 95% detection rate and less than a 1% false alarm rate for both the DARPA 1999 and the ISCX 2012 datasets.

  8. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  9. Modeling attacker-defender interactions in information networks.

    Energy Technology Data Exchange (ETDEWEB)

    Collins, Michael Joseph

    2010-09-01

    The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in isolation from one another: an attacker seeks to penetrate or disrupt a system that has been protected to a given level, while a defender attempts to thwart particular attacks. Such a model also views all non-malicious parties as having the same goal of preventing all attacks. But in fact, attackers and defenders are interacting parts of the same system, and different defenders have their own individual interests: defenders may be willing to accept some risk of successful attack if the cost of defense is too high. We have used game theory to develop models of how non-cooperative but non-malicious players in a network interact when there is a substantial cost associated with effective defensive measures. Although game theory has been applied in this area before, we have introduced some novel aspects of player behavior in our work, including: (1) A model of how players attempt to avoid the costs of defense and force others to assume these costs; (2) A model of how players interact when the cost of defending one node can be shared by other nodes; and (3) A model of the incentives for a defender to choose less expensive, but less effective, defensive actions.

  10. Choosing What to Protect When Attacker Resources and Asset Valuations are Uncertain

    Directory of Open Access Journals (Sweden)

    Kjell Hausken

    2014-01-01

    Full Text Available The situation has been modelled where the attacker's resources are unknown to the defender. Protecting assets presupposes that the defender has some information on the attacker's resource capabilities. An attacker targets one of two assets. The attacker's resources and valuations of these assets are drawn probabilistically. We specify when the isoutility curves are upward sloping (the defender prefers to invest less in defense, thus leading to higher probabilities of success for attacks on both assets or downward sloping (e.g. when one asset has a low value or high unit defense cost. This stands in contrast to earlier research and results from the uncertainty regarding the level of the attacker's resources. We determine which asset the attacker targets depending on his type, unit attack costs, the contest intensity, and investment in defense. A two stage game is considered, where the defender moves first and the attacker moves second. When both assets are equivalent and are treated equivalently by both players, an interior equilibrium exists when the contest intensity is low, and a corner equilibrium with no defense exists when the contest intensity is large and the attacker holds large resources. Defense efforts are inverse U shaped in the attacker's resources. (original abstract

  11. Reliably determining data leakage in the presence of strong attackers

    NARCIS (Netherlands)

    Bortolameotti, R.; Peter, A.; Everts, M.H.; Jonker, W.; Hartel, P.

    2016-01-01

    We address the problem of determining what data has been leaked from a system after its recovery from a successful attack. This is a forensic process which is relevant to give a better understanding of the impact of a data breach, but more importantly it is becoming mandatory according to the recent

  12. The Boston Schoolyard Initiative: A Study of Its Schoolyard Renovations--Disseminating Lessons Learned from a Case Study Analysis of a Successful Active Space Redevelopment Program. Program Results

    Science.gov (United States)

    Nakashian, Mary

    2008-01-01

    Researchers in the Boston University Department of Environmental Health conducted a case study of the Boston Schoolyard Initiative, a project that provides funds and technical support to community groups dedicated to renovating schoolyards in Boston. Researchers described the process by which the Boston Schoolyard Initiative came into being and…

  13. Impact modeling and prediction of attacks on cyber targets

    Science.gov (United States)

    Khalili, Aram; Michalk, Brian; Alford, Lee; Henney, Chris; Gilbert, Logan

    2010-04-01

    In most organizations, IT (information technology) infrastructure exists to support the organization's mission. The threat of cyber attacks poses risks to this mission. Current network security research focuses on the threat of cyber attacks to the organization's IT infrastructure; however, the risks to the overall mission are rarely analyzed or formalized. This connection of IT infrastructure to the organization's mission is often neglected or carried out ad-hoc. Our work bridges this gap and introduces analyses and formalisms to help organizations understand the mission risks they face from cyber attacks. Modeling an organization's mission vulnerability to cyber attacks requires a description of the IT infrastructure (network model), the organization mission (business model), and how the mission relies on IT resources (correlation model). With this information, proper analysis can show which cyber resources are of tactical importance in a cyber attack, i.e., controlling them enables a large range of cyber attacks. Such analysis also reveals which IT resources contribute most to the organization's mission, i.e., lack of control over them gravely affects the mission. These results can then be used to formulate IT security strategies and explore their trade-offs, which leads to better incident response. This paper presents our methodology for encoding IT infrastructure, organization mission and correlations, our analysis framework, as well as initial experimental results and conclusions.

  14. Recurrent spontaneous attacks of dizziness.

    Science.gov (United States)

    Lempert, Thomas

    2012-10-01

    This article describes the common causes of recurrent vertigo and dizziness that can be diagnosed largely on the basis of history. Ninety percent of spontaneous recurrent vertigo and dizziness can be explained by six disorders: (1) Ménière disease is characterized by vertigo attacks, lasting 20 minutes to several hours, with concomitant hearing loss, tinnitus, and aural fullness. Aural symptoms become permanent during the course of the disease. (2) Attacks of vestibular migraine may last anywhere from minutes to days. Most patients have a previous history of migraine headaches, and many experience migraine symptoms during the attack. (3) Vertebrobasilar TIAs affect older adults with vascular risk factors. Most attacks last less than 1 hour and are accompanied by other symptoms from the posterior circulation territory. (4) Vestibular paroxysmia is caused by vascular compression of the eighth cranial nerve. It manifests itself with brief attacks of vertigo that recur many times per day, sometimes with concomitant cochlear symptoms. (5) Orthostatic hypotension causes brief episodes of dizziness lasting seconds to a few minutes after standing up and is relieved by sitting or lying down. In older adults, it may be accompanied by supine hypertension. (6) Panic attacks usually last minutes, occur in specific situations, and are accompanied by choking, palpitations, tremor, heat, and anxiety. Less common causes of spontaneous recurrent vertigo and dizziness include perilymph fistula, superior canal dehiscence, autoimmune inner ear disease, otosclerosis, cardiac arrhythmia, and medication side effects. Neurologists need to venture into otolaryngology, internal medicine, and psychiatry to master the differential diagnosis of recurrent dizziness.

  15. Pregnant & Lactating Mothers' Attitudes and Practice of the Ten Steps to Successful Breastfeeding at King Fahd Hospital of University (KFHU)--Khobar, Saudi Arabia: Appraisal of Baby Friendly Hospital Initiatives

    Science.gov (United States)

    Salem, Laila Younis Abu; Al Madani, Maha Mohammed

    2015-01-01

    Background: World Health organization (WHO) and the United Nations Children's Fund (UNICEF) have been recommended the application of the Ten Steps to Successful Breastfeeding of the Baby-Friendly Hospital Initiative (BFHI) in order to promote & support breastfeeding. The aim of this study was to assess pregnant and lactating mothers' attitudes…

  16. TREsPASS: Plug-and-Play Attacker Profiles for Security Risk Analysis (Poster)

    NARCIS (Netherlands)

    Pieters, Wolter; Hadziosmanovic, D.; Lenin, Aleksandr; Montoya, L.; Willemson, Jan

    Existing methods for security risk analysis typically estimate time, cost, or likelihood of success of attack steps. When the threat environment changes, such values have to be updated as well. However, the estimated values reflect both system properties and attacker properties: the time required

  17. Assessing risk from intelligent attacks: A perspective on approaches

    International Nuclear Information System (INIS)

    Guikema, Seth D.; Aven, Terje

    2010-01-01

    Assessing the uncertainties in and severity of the consequences of intelligent attacks are fundamentally different from risk assessment for accidental events and other phenomena with inherently random failures. Intelligent attacks against a system involve adaptation on the part of the adversary. The probabilities of the initiating events depend on the risk management actions taken, and they may be more difficult to assess due to high degrees of epistemic uncertainty about the motivations and future actions of adversaries. Several fundamentally different frameworks have been proposed for assessing risk from intelligent attacks. These include basing risk assessment and management on game theoretic modelling of attacker actions, using a probabilistic risk analysis (PRA) approach based on eliciting probabilities of different initiating events from appropriate experts, assessing uncertainties beyond probabilities and expected values, and ignoring the probabilities of the attacks and choosing to protect highest valued targets. In this paper we discuss and compare the fundamental assumptions that underlie each of these approaches. We then suggest a new framework that makes the fundamental assumptions underlying the approaches clear to decision makers and presents them with a suite of results from conditional risk analysis methods. Each of the conditional methods presents the risk from a specified set of fundamental assumptions, allowing the decision maker to see the impacts of these assumptions on the risk management strategies considered and to weight the different conditional results with their assessments of the relative likelihood of the different sets of assumptions.

  18. A study on the mechanism of speculative attack and the defence strategy of the central bank.

    Directory of Open Access Journals (Sweden)

    Chang-Hyun Yun

    1999-09-01

    Full Text Available We first analyze the concrete mechanism of speculative attack on the foreign exchange market which became very prevalent phenomena during the foreign exchange crisis. When the central bank of the domestic country tries to defend the attack by increasing the interest rate, some problems can arise in that the speculative attacks through foreign exchange options market and/or index futures markets can be very successful due to that policy. So the central bank should pay much attention to the microstructure of the financial markets when the defence strategy against speculative attack is determined.

  19. A rare case report of peri-implant bone necrosis: Mapping the distance of initial peri-implant complication toward a path of success

    Directory of Open Access Journals (Sweden)

    S K Salaria

    2011-01-01

    Full Text Available In the past decade, science of implant placement has greatly advanced and at the same time much success has been experienced with the endosseous implant. Despite the long-term predictability of the implants, however, biological, technical and esthetic complications do occur. The use of osseointegrated implants as a foundation for prosthetic replacement of missing teeth has been highly predictable, but still at present, there is no consensus of how to best manage the complications occurring after implant placement. In this report, we discuss post-insertion complication of bone necrosis and its successful management.

  20. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  1. Mitigating Higher Ed Cyber Attacks

    Science.gov (United States)

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  2. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Science.gov (United States)

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  3. Neuroradiological study of transient ischemic attack

    International Nuclear Information System (INIS)

    Takusagawa, Yoshihiko; Fujiwara, Yasuhiro; Ichiki, Ken; Suga, Takeshi; Nishigaki, Shinichi

    1986-01-01

    Fifty-two patients with carotid TIAs and thirteen patients with vertebrobasilar TIAs were investigated by angiography and computed tomography. TIA was diagnosed by clinical symptoms in accordance with the criteria for TIA of the Joint Committee for Stroke Facilities in the U.S.A. (1974). The 65 patients with TIAs included 49 males and 16 females with average age of 63.5 years old at the initial episode of TIA. As for the diseases associated with TIA, hypertension (51 %), diabetes mellitus (15 %) and ischemic heart diseases (11 %) were the major disorders. Atrial fibrillation was observed in 2 cases. Intervals from last TIA attack to angiography were less than 7 days in 22 cases, 8 ∼ 30 days in 19 cases, 1 ∼ 4 monthes in 14 cases and more than 4 monthes in 10 cases, respectively. The cases in which angiography was done earlier after attacks displayed more abnormal findings. In 52 patients with caroted TIAs the artherosclerotic change of extracranial portion of the internal carotid artery was found in 14 cases (27 %), that of intracranial portion of the artery in 11 cases (21 %) and both lesions in 2 cases (4 %). On the other hand, in 13 patients with vertebrobasilar TIAs, this change was observed in 4 cases at the extracranival potion and in 1 case at the intracranial potion (siphon) of the internal carotid artery. Abnormal CT findings were found in 29 of 65 patients, namely 9 had ventricular dilatation and brain atrophy, 6 had cerebral infarction which was not associated with associated with symptoms of TIA. In carotid TIAs, Cerebral infarction was associated with symptoms of TIAs in 15 cases, namely 10 had a small low density area in the basal ganglia near the internal capsule and 5 had a low density area in the cortical or subcortical region. All of these 5 cases had cerebral embolism, which recanalized after attacks. (J.P.N.)

  4. Neutralizing SQL Injection Attack Using Server Side Code Modification in Web Applications

    Directory of Open Access Journals (Sweden)

    Asish Kumar Dalai

    2017-01-01

    Full Text Available Reports on web application security risks show that SQL injection is the top most vulnerability. The journey of static to dynamic web pages leads to the use of database in web applications. Due to the lack of secure coding techniques, SQL injection vulnerability prevails in a large set of web applications. A successful SQL injection attack imposes a serious threat to the database, web application, and the entire web server. In this article, the authors have proposed a novel method for prevention of SQL injection attack. The classification of SQL injection attacks has been done based on the methods used to exploit this vulnerability. The proposed method proves to be efficient in the context of its ability to prevent all types of SQL injection attacks. Some popular SQL injection attack tools and web application security datasets have been used to validate the model. The results obtained are promising with a high accuracy rate for detection of SQL injection attack.

  5. ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention

    Energy Technology Data Exchange (ETDEWEB)

    Cui, Xiaohui [ORNL; Beaver, Justin M [ORNL; Treadwell, Jim N [ORNL

    2012-01-01

    The ShadowNet infrastructure for insider cyber attack prevention is comprised of a tiered server system that is able to dynamically redirect dangerous/suspicious network traffic away from production servers that provide web, ftp, database and other vital services to cloned virtual machines in a quarantined environment. This is done transparently from the point of view of both the attacker and normal users. Existing connections, such as SSH sessions, are not interrupted. Any malicious activity performed by the attacker on a quarantined server is not reflected on the production server. The attacker is provided services from the quarantined server, which creates the impression that the attacks performed are successful. The activities of the attacker on the quarantined system are able to be recorded much like a honeypot system for forensic analysis.

  6. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available taxonomy and ontology RP van Heerden1,2, B Irwin2, ID Burke1, L Leenen1 1CSIR, Pretoria, South Africa 2Rhodes University, Grahamstown, South Africa Keywords/ Key Phrases: Network Attack, Network Attack Classification, Taxonomy, Ontology, Attack... Scenario rvheerden@csir.co.za b.irwin@ru.ac.za iburke@csir.co.za lleenen@csir.co.za Abstract: Computer network attacks differ in the motivation of the entity behind the attack, the execution and the end result. The diversity of attacks has a...

  7. Case Studies of Attacks over Adaptive Modulation Based Tactical Software Defined Radios

    Directory of Open Access Journals (Sweden)

    David Fernandes Cruz Moura

    2012-01-01

    Full Text Available This paper presents case studies of attacks aimed at tactical software defined radios based on a classification with the most common sources of vulnerabilities, classes of attacks, and types of intrusions that military radio sets may suffer. Besides that, we also describe how attack mitigation strategies can impact the development of SDR infrastructures. By using such approach, we identify several possible sources of vulnerabilities, attacks, intrusions, and mitigation strategies, illustrating them onto typical tactical radio network deployment scenarios, as an initial and necessary step for the definition of realistic and relevant security requirements for military software defined radio applications.

  8. Dynamics of Gram-negative bacteria population density in a soil in the course of the succession initiated by chitin and cellulose

    Science.gov (United States)

    Konstantin, Ivanov; Lubov, Polyanskaya

    2014-05-01

    The functions of actinomycetes in polymer destruction in soil traditionally considered as the dominant, compare to another groups of bacteria. Gram-positive bacteria also have ecological functions in destruction of soil organic matter. The role of Gram-negative bacteria has been researched in the microbial succession in terms of polymers destruction, which are widely spreads in soils: chitin and cellulose. The method with nalidixic acid as an inhibitor of DNA division of Gram-negative bacteria was modified. By modified method microbial succession of Gram-negative bacteria in the different horizons of a chernozem under aerobic and anaerobic conditions was researched. Chitin and cellulose as the source of nutrients with moistening was used in experiments. The introduction of chitin had no positive effect on the population density of Gram-negative bacteria in a chernozem, but it advanced the date of their appearance in microbial succession: the maximum of Gram-negative bacteria population density was registered on the 3rd- 7th day of the experiment with adding chitin. Compare to the control, which one was without any nutrient adding this dynamics registered much earlier. Consequently, the introduction of chitin as an additional source of nutrition promoted revealing of the Gram-negative bacteria in soil already at the early stages of the succession. In the course of the succession, when the fungal mycelium begins to die off, the actinomycetic mycelium increases in length, i.e., Gram-negative bacteria are replaced at this stage with Gram-positive ones, the leading role among which belongs to actinomycetes. The growth rate of Gram-negative bacteria is higher than that of actinomycetes, so they start chitin utilization at the early stages of the succession, whereas actinomycetes dominate at the late stages. The population density of Gram-negative bacteria was lower under the anaerobic conditions as compared with that in the aerobic ones. The population density of Gram

  9. Systematic Management of Change Is the Key to Successful Staff Development. An Initial Study of the Bloomfield Public Schools Staff Development Project. Teacher Essentials, Styles & Strategies (TESS).

    Science.gov (United States)

    Celso, Nicholas; Morris, Harold

    Confronted by a maturing staff, lower teacher turnover rates, declining enrollments, and more sophisticated instructional methods, the Bloomfield (New Jersey) Public School District adopted an ambitious staff development initiative in 1983. This paper describes the planning and implementation strategies used to launch Bloomfield's Teaching…

  10. A Strategic Analysis of Information Sharing Among Cyber Attackers

    Directory of Open Access Journals (Sweden)

    Kjell Hausken

    2015-10-01

    Full Text Available We build a game theory model where the market design is such that one firm invests in security to defend against cyber attacks by two hackers. The firm has an asset, which is allocated between the three market participants dependent on their contest success. Each hacker chooses an optimal attack, and they share information with each other about the firm’s vulnerabilities. Each hacker prefers to receive information, but delivering information gives competitive advantage to the other hacker. We find that each hacker’s attack and information sharing are strategic complements while one hacker’s attack and the other hacker’s information sharing are strategic substitutes. As the firm’s unit defense cost increases, the attack is inverse U-shaped and reaches zero, while the firm’s defense and profit decrease, and the hackers’ information sharing and profit increase. The firm’s profit increases in the hackers’ unit cost of attack, while the hackers’ information sharing and profit decrease. Our analysis also reveals the interesting result that the cumulative attack level of the hackers is not affected by the effectiveness of information sharing between them and moreover, is also unaffected by the intensity of joint information sharing. We also find that as the effectiveness of information sharing between hackers increases relative to the investment in attack, the firm’s investment in cyber security defense and profit are constant, the hackers’ investments in attacks decrease, and information sharing levels and hacker profits increase. In contrast, as the intensity of joint information sharing increases, while the firm’s investment in cyber security defense and profit remain constant, the hackers’ investments in attacks increase, and the hackers’ information sharing levels and profits decrease. Increasing the firm’s asset causes all the variables to increase linearly, except information sharing which is constant. We extend

  11. [First chemical mass attack in history of wars, Bolimów, January 31, 1915].

    Science.gov (United States)

    Zieliński, Andrzej

    2010-01-01

    World War I was the conflict, during which it was first used chemical warfare on a massive scale. The earliest chemical attack occurred on the Western Front in October 1914 in Neuve Chapelle, but its effects were so minimal that the Allies learned about it only after the war from German documents. The attack in the area Bolimow, made by the Germans against the Russian army with artillery shells containing gas T (xylyl and benzyl bromides), was therefore the first attack on a massive scale recorded on the victim side. The attack, which occurred after it made it possible to obtain some tactical success, but without a strategic breakthrough. Some of the later German attacks on the eastern front where chlorine was used proved to be more effective, but despite the many victims there was not any major strategic success achieved. The Russians did not take attempts to use chemical weapons in the First World War.

  12. Effect of Angle of Attack on Slope Climbing Performance

    Science.gov (United States)

    Creager, Colin M.; Jones, Lucas; Smith, Lauren M.

    2017-01-01

    Ascending steep slopes is often a very difficult challenge for off-road vehicles, whether on Earth or on extraterrestrial bodies. This challenge is even greater if the surface consists of loose granular soil that does not provide much shear strength. This study investigated how the path at which a vehicle traverses a slope, specifically the angle that it is commanded to drive relative to the base of the hill (the angle of attack), can affect its performance. A vehicle was driven in loose sand at slope angles up to 15 degrees and angles of attack ranging from 10 to 90 degrees. A novel photogrammetry technique was implemented to both track vehicle motion and create a three-dimensional profile of the terrain. This allowed for true wheel sinkage measurements. The study showed that though low angles of attack result in lower wheel slip and sinkage, the efficiency of the vehicles uphill motion increased at higher angles of attack. For slopes up to 15 degrees, a 90 degree angle of attack provided the greatest likelihood of successful ascent.

  13. A video-polygraphic analysis of the cataplectic attack

    DEFF Research Database (Denmark)

    Rubboli, G; d'Orsi, G; Zaniboni, A

    2000-01-01

    OBJECTIVES AND METHODS: To perform a video-polygraphic analysis of 11 cataplectic attacks in a 39-year-old narcoleptic patient, correlating clinical manifestations with polygraphic findings. Polygraphic recordings monitored EEG, EMG activity from several cranial, trunk, upper and lower limbs...... muscles, eye movements, EKG, thoracic respiration. RESULTS: Eleven attacks were recorded, all of them lasting less than 1 min and ending with the fall of the patient to the ground. We identified, based on the video-polygraphic analysis of the episodes, 3 phases: initial phase, characterized essentially...... with bradycardia, that was maximal during the atonic phase. CONCLUSIONS: Analysis of the muscular phenomena that characterize cataplectic attacks in a standing patient suggests that the cataplectic fall occurs with a pattern that might result from the interaction between neuronal networks mediating muscular atonia...

  14. Gray Matter Is Targeted in First-Attack Multiple Sclerosis

    Energy Technology Data Exchange (ETDEWEB)

    Schutzer, Steven E.; Angel, Thomas E.; Liu, Tao; Schepmoes, Athena A.; Xie, Fang; Bergquist, Jonas P.; Vecsei, Lazlo' ; Zadori, Denes; Camp, David G.; Holland, Bart K.; Smith, Richard D.; Coyle, Patricia K.

    2013-09-10

    The cause of multiple sclerosis (MS), its driving pathogenesis at the earliest stages, and what factors allow the first clinical attack to manifest remain unknown. Some imaging studies suggest gray rather than white matter may be involved early, and some postulate this may be predictive of developing MS. Other imaging studies are in conflict. To determine if there was objective molecular evidence of gray matter involvement in early MS we used high-resolution mass spectrometry to identify proteins in the cerebrospinal fluid (CSF) of first-attack MS patients (two independent groups) compared to established relapsing remitting (RR) MS and controls. We found that the CSF proteins in first-attack patients were differentially enriched for gray matter components (axon, neuron, synapse). Myelin components did not distinguish these groups. The results support that gray matter dysfunction is involved early in MS, and also may be integral for the initial clinical presentation.

  15. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    . In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks...

  16. Being active after a heart attack (image)

    Science.gov (United States)

    ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ...

  17. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within...

  18. Social engineering attack examples, templates and scenarios

    CSIR Research Space (South Africa)

    Mouton, Francois

    2016-06-01

    Full Text Available link. A social engineering attack targets this weakness by using various manipulation techniques to elicit sensitive information. The field of social engineering is still in its early stages with regard to formal definitions, attack frameworks...

  19. Understand Your Risk of Heart Attack

    Science.gov (United States)

    ... Heart-Health Basics Reducing your risk starts with smart choices. If you smoke, stop. The American Heart ... a Second Heart Attack | Spanish Cardiac Rehab Referral Card | Spanish Heart Attack Warning Signs: Patient sheet | Infographic | ...

  20. Can Vitamins Help Prevent a Heart Attack?

    Science.gov (United States)

    ... vitamins help prevent a heart attack? Can taking vitamins help prevent heart disease or a heart attack? Answers ... M.D. It's not yet clear if taking vitamins can reduce your risk of developing heart disease ...

  1. Peacetime Use of Computer Network Attack

    National Research Council Canada - National Science Library

    Busby, Daniel

    2000-01-01

    .... PDD-63 alerts the nation to prepare for impending cyber attacks. This paper examines the nature, scale, and likelihood of cyber attacks posited in PDD-63 and finds that the country does not face an imminent "electronic Pearl Harbor...

  2. Quantifying Shannon's work function for cryptanalytic attacks

    NARCIS (Netherlands)

    van Son, R.J.J.H.

    2010-01-01

    Attacks on cryptographic systems are limited by the available computational resources. A theoretical understanding of these resource limitations is needed to evaluate the security of cryptographic primitives and procedures. This study uses an Attacker versus Environment game formalism based on

  3. Network Attack Reference Data Set

    Science.gov (United States)

    2004-12-01

    fingerprinting tools include QueSO [10] (literally translates to “what OS”) and nmap [11], however there are a number of additional tools available for...Network Attack Reference Data Set J. McKenna and J. Treurniet Defence R&D Canada √ Ottawa TECHNICAL...collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources

  4. Biometrics Evaluation under Spoofing Attacks

    OpenAIRE

    Chingovska, Ivana; Anjos, André; Marcel, Sébastien

    2014-01-01

    While more accurate and reliable than ever, the trustworthiness of biometric verification systems is compromised by the emergence of spoofing attacks. Responding to this threat, numerous research publications address isolated spoofing detection, resulting in efficient counter-measures for many biometric modes. However, an important, but often overlooked issue regards their engagement into a verification task and how to measure their impact on the verification systems themselves. A novel evalu...

  5. Survey of Sybil Attacks in Social Networks

    OpenAIRE

    Gunturu, Rupesh

    2015-01-01

    This paper reviews the Sybil attack in social networks, which has the potential to compromise the whole distributed network. In the Sybil attack, the malicious user claims multiple identities to compromise the network. Sybil attacks can be used to change the overall ranking in voting applications, bad-mouth an opinion, access resources or to break the trust mechanism behind a P2P network. In this paper, different defense mechanisms used to mitigate Sybil attacks are also reviewed.

  6. Gait biometrics under spoofing attacks: an experimental investigation

    Science.gov (United States)

    Hadid, Abdenour; Ghahramani, Mohammad; Kellokumpu, Vili; Feng, Xiaoyi; Bustard, John; Nixon, Mark

    2015-11-01

    Gait is a relatively biometric modality which has a precious advantage over other modalities, such as iris and voice, in that it can be easily captured from a distance. Although it has recently become a topic of great interest in biometric research, there has been little investigation into gait spoofing attacks where a person tries to imitate the clothing or walking style of someone else. We recently analyzed for the first time the effects of spoofing attacks on silhouette-based gait biometric systems and showed that it was indeed possible to spoof gait biometric systems by clothing impersonation and the deliberate selection of a target that has a similar build to the attacker. To gain deeper insight into the performance of current gait biometric systems under spoofing attacks, we provide a thorough investigation on how clothing can be used to spoof a target and evaluate the performance of two state-of-the-art recognition methods on a gait spoofing database recorded at the University of Southampton. Furthermore, we describe and evaluate an initial solution coping with gait spoofing attacks. The obtained results are very promising and point out interesting findings which can be used for future investigations.

  7. Research Note on the Energy Infrastructure Attack Database (EIAD

    Directory of Open Access Journals (Sweden)

    Jennifer Giroux

    2013-12-01

    Full Text Available The January 2013 attack on the In Amenas natural gas facility drew international attention. However this attack is part of a portrait of energy infrastructure targeting by non-state actors that spans the globe. Data drawn from the Energy Infrastructure Attack Database (EIAD shows that in the last decade there were, on average, nearly 400 annual attacks carried out by armed non-state actors on energy infrastructure worldwide, a figure that was well under 200 prior to 1999. This data reveals a global picture whereby violent non-state actors target energy infrastructures to air grievances, communicate to governments, impact state economic interests, or capture revenue in the form of hijacking, kidnapping ransoms, theft. And, for politically motivated groups, such as those engaged in insurgencies, attacking industry assets garners media coverage serving as a facilitator for international attention. This research note will introduce EIAD and position its utility within various research areas where the targeting of energy infrastructure, or more broadly energy infrastructure vulnerability, has been addressed, either directly or indirectly. We also provide a snapshot of the initial analysis of the data between 1980-2011, noting specific temporal and spatial trends, and then conclude with a brief discussion on the contribution of EIAD, highlighting future research trajectories. 

  8. A Novel Approach for Network Attack Classification Based on Sequential Questions

    Directory of Open Access Journals (Sweden)

    Md Mehedi Hassan Onik

    2018-04-01

    Full Text Available With the development of incipient technologies, user devices becoming more exposed and ill-used by foes. In upcoming decades, traditional security measures will not be sufficient enough to handle this huge threat towards distributed hardware and software. Lack of standard network attack taxonomy has become an indispensable dispute on developing a clear understanding about the attacks in order to have an operative protection mechanism. Present attack categorization techniques protect a specific group of threat which has either messed the entire taxonomy structure or ambiguous when one network attacks get blended with few others attacks. Hence, this raises concerns about developing a common and general purpose taxonomy. In this study, a sequential question-answer based model of categorization is proposed. In this article, an intrusion detection framework and threat grouping schema are proposed on the basis of four sequential questions (“Who”, “Where”, “How” and “What”. We have used our method for classifying traditional network attacks in order to identify initiator, source, attack style and seriousness of an attack. Another focus of the paper is to provide a preventive list of actions for network administrator as a guideline to reduce overall attack consequence. Recommended taxonomy is designed to detect common attacks rather than any particular type of attack which can have a practical effect in real life attack classification. From the analysis of the classifications obtained from few infamous attacks, it is obvious that the proposed system holds certain benefits related to the prevailing taxonomies. Future research directions have also been well acknowledged.

  9. Resveratrol products resulting by free radical attack

    Science.gov (United States)

    Bader, Yvonne; Quint, R. M.; Getoff, Nikola

    2008-06-01

    Trans-resveratrol ( trans-3,4',5-trihydroxystilbene; RES), which is contained in red wine and many plants, is one of the most relevant and extensively investigated stilbenes with a broad spectrum of biological activities. Among other duties, RES has been reported to have anti-carcinogenetic activities, which could be attributed to its antioxidant properties. The degradation of RES was studied under various conditions. The products (aldehydes, carboxylic acids, etc.) generated from RES by the attack of free radicals were registered as a function of the radical concentration (absorbed radiation dose). Based on the obtained data it appears that the OH radicals are initiating the rather complicated process, which involves of the numerous consecutive reactions. A possible starting reaction mechanism is presented.

  10. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  11. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    is foreseeable while the rounds are performed. ECC (Elliptic Curve Cryptography) is used as a public key crypto system with the key purpose of creating a private shared between two participants in a communication network. Attacks on ECC include the Pohlig-Hellman attack and the Pollard's rho attack. Furthermore...

  12. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  13. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available In this paper we demonstrate how an automated reasoner, HermiT, is used to classify instances of computer network based attacks in conjunction with a network attack ontology. The ontology describes different types of network attacks through classes...

  14. Traumatic near amputation secondary to hippopotamus attack: lessons for surgeons.

    Science.gov (United States)

    Drake, Frederick Thurston; Quiroga, Elina; Kariuki, Hazel W; Shisanya, Kizito A; Hotchkiss, Matthew P; Monroe-Wise, Aliza; Drake, John K; Mburu, Joseph; Farquhar, Carey; Flum, David R

    2014-05-01

    A 34-y-old man presented to Naivasha District Hospital (NDH) in Naivasha Town, Kenya, with near-complete below-knee amputation and hemorrhage after a hippopotamus attack. Residents from the University of Washington (UW), Departments of Surgery, Anesthesia, and Medicine, were rotating at NDH with the Clinical Education Partnership Initiative, a joint venture of UW and University of Nairobi. These providers met the patient in the operating theater. The leg was mangled with severely traumatized soft tissues and tibia-fibula fractures. The visiting UW Surgery resident (R3) and an NDH medical officer (second-year house officer) performed emergency below-knee completion amputation--the first time either had performed this operation. The three major vessel groups were identified and ligated. Sufficient gastrocnemius and soleus were preserved for future stump construction. The wound was washed out, packed with betadine-soaked gauze, and wrapped in an elasticized bandage. Broad-spectrum antibiotics were initiated. Unfortunately, the patient suffered infection and was revised above the knee. After a prolonged course, the patient recovered well and was discharged home. NDH house officers and UW trainees collaborated successfully in an emergency and conducted the postoperative care of a patient with a serious and challenging injury. Their experience highlights the importance of preparedness, command of surgical basics, humility, learning from mistakes, the expertise of others, a digitally connected surgical community, and the role of surgery in global health. These lessons will be increasingly pertinent as surgical training programs create opportunities for their residents to work in developing countries; many of these lessons are equally applicable to surgical practice in the developed world. Copyright © 2014 Elsevier Inc. All rights reserved.

  15. Fluctuations in the population density of Gram-negative bacteria in a chernozem in the course of a succession initiated by moistening and chitin and cellulose introduction

    Science.gov (United States)

    Polyanskaya, L. M.; Ivanov, K. E.; Zvyagintsev, D. G.

    2012-10-01

    The role has been studied of Gram-negative bacteria in the destruction of polymers widely spread in soils: chitin and cellulose. The introduction of chitin had no positive effect on the population density of Gram-negative bacteria, but it advanced the date of their appearance: the maximum population density of Gram-negative bacteria was recorded not on the 7th-15th day as in the control but much earlier, on the 3rd-7th day of the experiment. Consequently, the introduction of chitin as an additional source of nutrition promoted revealing of the Gram-negative bacteria already at the early stages of the succession. In the course of the succession, when the fungal mycelium begins to die off, the actinomycetic mycelium increases in length, i.e., Gram-negative bacteria are replaced at this stage with Gram-positive ones, the leading role among which belongs to actinomycetes. The growth rate of Gram-negative bacteria is higher than that of actinomycetes, so they start chitin utilization at the early stages of the succession, whereas actinomycetes dominate at the late stages. The population density of Gram-negative bacteria was lower under the anaerobic conditions as compared with that in the aerobic ones. The population density of Gram-negative bacteria in the lower layer of the A horizon and in the B horizon was slightly higher only in the case of the chitin introduction. When cellulose was introduced into the soil under aerobic conditions, the population density of Gram-negative bacteria in all the layers of the A horizon was maximal from the 14th to the 22nd day of the experiment. Cellulose was utilized in the soil mostly by fungi, and this was suggested by the increase of the length of the fungal mycelium. Simultaneously, an increase in the length of the actinomycetal mycelium was observed, as these organisms also perform cellulose hydrolysis in soils. The Gram-negative bacteria began to develop at the stage of the fungal mycelium destruction, which indirectly

  16. Attacks on IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Dejan Milan Tepšić

    2013-06-01

    Full Text Available Security of wireless computer networks was initially secured with the WEP security protocol, which relies on the RC4 encryption algorithm and the CRC algorithm to check the integrity. The basic problems of the WEP are a short initialization vector, unsafe data integrity checking, using a common key, the lack of mechanisms for management and exchange of keys, the lack of protection from the endless insertion of the same package into the network, the lack of authentication of access points and the like. The consequences of these failures are easy attacks against the WEP network, namely their complete insecurity. Therefore, the work began on the IEEE 802.11i protocol, which should radically improve the security of wireless networks. Since the development of a protocol lasted, the WPA standard was released to offset the security gap caused by the WEP. The WPA also relies on RC4 and CRC algorithms, but brings temporary keys and the MIC algorithm for data integrity. The 802.1X authentication was introduced and common keys are no longer needed, since it is possible to use an authentication server. The length of the initialization vector was increased and the vector is obtained based on the packet serial number, in order to prevent the insertion of the same packet into the network. The weakness of the WPA security mechanism is the use of a common key. WPA2 (802.11i later appeared. Unlike the WPA mechanism that worked on old devices with the replacement of software, WPA2 requires new network devices that can perform AES encryption. AES replaces the RC4 algorithm and delivers much greater security. Data integrity is protected by encryption. Despite progress, there are still weaknesses in wireless networks. Attacks for denial of service are possible as well as spoofing package headers attacks. For now, it is not advisable to use wireless networks in environments where unreliability and unavailability are not tolerated. Introduction In the entire history of

  17. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  18. Script-viruses Attacks on UNIX OS

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-06-01

    Full Text Available In this article attacks on UNIX OS are considered. Currently antivirus developers are concentrated on protecting systems from viruses that are most common and attack popular operating systems. If the system or its components are not often attacked then the antivirus products are not protecting these components as it is not profitable. The same situation is with script-viruses for UNIX OS as most experts consider that it is impossible for such viruses to get enough rights to attack. Nevertheless the main conclusion of this article is the fact that such viruses can be very powerful and can attack systems and get enough rights.

  19. Stochastic Model of TCP SYN Attacks

    OpenAIRE

    Simona Ramanauskaitė; Antanas Čenys

    2011-01-01

    A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS) attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both...

  20. Securing Cooperative Spectrum Sensing Against Collusive SSDF Attack using XOR Distance Analysis in Cognitive Radio Networks.

    Science.gov (United States)

    Feng, Jingyu; Zhang, Man; Xiao, Yun; Yue, Hongzhou

    2018-01-27

    Cooperative spectrum sensing (CSS) is considered as a powerful approach to improve the utilization of scarce spectrum resources. However, if CSS assumes that all secondary users (SU) are honest, it may offer opportunities for attackers to conduct a spectrum sensing data falsification (SSDF) attack. To suppress such a threat, recent efforts have been made to develop trust mechanisms. Currently, some attackers can collude with each other to form a collusive clique, and thus not only increase the power of SSDF attack but also avoid the detection of a trust mechanism. Noting the duality of sensing data, we propose a defense scheme called XDA from the perspective of XOR distance analysis to suppress a collusive SSDF attack. In the XDA scheme, the XOR distance calculation in line with the type of "0" and "1" historical sensing data is used to measure the similarity between any two SUs. Noting that collusive SSDF attackers hold high trust value and the minimum XOR distance, the algorithm to detect collusive SSDF attackers is designed. Meanwhile, the XDA scheme can perfect the trust mechanism to correct collusive SSDF attackers' trust value. Simulation results show that the XDA scheme can enhance the accuracy of trust evaluation, and thus successfully reduce the power of collusive SSDF attack against CSS.

  1. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  2. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified...... through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....

  3. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  4. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  5. Successful implementation of Virtual Environment for Radiotherapy Training (VERT) in Medical Physics education: The University of Sydney's initial experience and recommendations.

    Science.gov (United States)

    Jimenez, Yobelli A; Hansen, Christian Rønn; Juneja, Prabhjot; Thwaites, David I

    2017-12-01

    This report outlines the University of Sydney's initial experience with the Virtual Environment for Radiotherapy Training (VERT) system in the Master of Medical Physics program. VERT is a commercially available system, simulating linear accelerators, patient computed tomography (CT) sets, plans and treatment delivery. It was purpose built for radiation therapy (RT) education and offers learners the opportunity to gain knowledge and skills within an interactive, risk-free environment. The integration of VERT into the RT physics module of the Master of Medical Physics program was intended to enhance student knowledge and skills relevant to the curriculum's learning objectives, and to alleviate some of the burden associated with student access to clinical equipment. Three VERT practical sessions were implemented: "RT treatment planning systems", "(CT) Anatomy for physicists" and "Linear accelerator measurements". Our experience and student evaluations were positive and demonstrated the viability of VERT for medical physics (MP) student education. We anticipate that integration of VERT into MP teaching is a valuable addition to traditional methods and can aid MP students' understanding and readiness for practice. Additional evaluations should be conducted to ascertain VERT's role in delivering efficient quantity and quality of MP education, and its potential in alleviating burdens placed on clinical departments.

  6. Coronary Artery Dissection: Not Just a Heart Attack

    Science.gov (United States)

    ... Aneurysm More Coronary Artery Dissection: Not Just a Heart Attack Updated:Mar 15,2018 Sometimes a heart attack ... Disease Go Red For Women Types of aneurysms Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) ...

  7. Lead exposure potentiates predatory attack behavior in the cat

    International Nuclear Information System (INIS)

    Li Wenjie; Han Shenggao; Gregg, T.R.; Kemp, F.W.Francis W.; Davidow, A.L.; Louria, D.B.; Siegel, Allan; Bogden, J.D.

    2003-01-01

    Epidemiologic studies have demonstrated that environmental lead exposure is associated with aggressive behavior in children; however, numerous confounding variables limit the ability of these studies to establish a causal relationship. The study of aggressive behavior using a validated animal model was used to test the hypothesis that there is a causal relationship between lead exposure and aggression in the absence of confounding variables. We studied the effects of lead exposure on a feline model of aggression: predatory (quiet biting) attack of an anesthetized rat. Five cats were stimulated with a precisely controlled electrical current via electrodes inserted into the lateral hypothalamus. The response measure was the predatory attack threshold current (i.e., the current required to elicit an attack response on 50% of the trials). Blocks of trials were administered in which predatory attack threshold currents were measured three times a week for a total of 6-10 weeks, including before, during, and after lead exposure. Lead was incorporated into cat food 'treats' at doses of 50-150 mg/kg/day. Two of the five cats received a second period of lead exposure. Blood lead concentrations were measured twice a week and were <1, 21-77, and <20 μg/dL prior to, during, and after lead exposure, respectively. The predatory attack threshold decreased significantly during initial lead exposure in three of five cats and increased after the cessation of lead exposure in four of the five cats (P<0.01). The predatory attack thresholds and blood lead concentrations for each cat were inversely correlated (r=-0.35 to -0.74). A random-effects mixed model demonstrated a significant (P=0.0019) negative association between threshold current and blood lead concentration. The data of this study demonstrate that lead exposure enhances predatory aggression in the cat and provide experimental support for a causal relationship between lead exposure and aggressive behavior in humans

  8. Assessment of Malawi’s success in child mortality reduction through the lens of the Catalytic Initiative Integrated Health Systems Strengthening programme: Retrospective evaluation

    Directory of Open Access Journals (Sweden)

    Tanya Doherty

    2015-12-01

    Full Text Available Malawi is estimated to have achieved its Millennium Development Goal (MDG 4 target. This paper explores factors influencing progress in child survival in Malawi including coverage of interventions and the role of key national policies. We performed a retrospective evaluation of the Catalytic Initiative (CI programme of support (2007–2013. We developed estimates of child mortality using four population household surveys undertaken between 2000 and 2010. We recalculated coverage indicators for high impact child health interventions and documented child health programmes and policies. The Lives Saved Tool (LiST was used to estimate child lives saved in 2013. The mortality rate in children under 5 years decreased rapidly in the 10 CI districts from 219 deaths per 1000 live births (95% confidence interval (CI 189 to 249 in the period 1991–1995 to 119 deaths (95% CI 105 to 132 in the period 2006–2010. Coverage for all indicators except vitamin A supplementation increased in the 10 CI districts across the time period 2000 to 2013. The LiST analysis estimates that there were 10 800 child deaths averted in the 10 CI districts in 2013, primarily attributable to the introduction of the pneumococcal vaccine (24% and increased household coverage of insecticide–treated bednets (19%. These improvements have taken place within a context of investment in child health policies and scale up of integrated community case management of childhood illnesses. Malawi provides a strong example for countries in sub–Saharan Africa of how high impact child health interventions implemented within a decentralised health system with an established community–based delivery platform, can lead to significant reductions in child mortality.

  9. Fast and Memory-Efficient Key Recovery in Side-Channel Attacks

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Kizhvatov, Ilya; Manzoor, Kamran

    2016-01-01

    Side-channel attacks are powerful techniques to attack implementations of cryptographic algorithms by observing its physical parameters such as power consumption and electromagnetic radiation that are modulated by the secret state. Most side-channel attacks are of divide-and-conquer nature, that is...... the advantage at the example of a DPA attack on an 8-bit embedded software implementation of AES-128. We vary the number of traces available to the adversary and report a significant increase in the success rate of the key recovery due to SKEA when compared to OKEA, within practical limitations on time...... and memory. We also compare SKEA to the probabilistic key enumeration algorithm (PKEA) by Meier and Staffelbach and show its practical superiority in this case. SKEA is efficiently parallelizable. We propose a high-performance solution for the entire conquer stage of side-channel attacks that includes SKEA...

  10. Application of stochastic discrete event system framework for detection of induced low rate TCP attack.

    Science.gov (United States)

    Barbhuiya, F A; Agarwal, Mayank; Purwar, Sanketh; Biswas, Santosh; Nandi, Sukumar

    2015-09-01

    TCP is the most widely accepted transport layer protocol. The major emphasis during the development of TCP was its functionality and efficiency. However, not much consideration was given on studying the possibility of attackers exploiting the protocol, which has lead to several attacks on TCP. This paper deals with the induced low rate TCP attack. Since the attack is relatively new, only a few schemes have been proposed to mitigate it. However, the main issues with these schemes are scalability, change in TCP header, lack of formal frameworks, etc. In this paper, we have adapted the stochastic DES framework for detecting the attack, which addresses most of these issues. We have successfully deployed and tested the proposed DES based IDS on a test bed. Copyright © 2015 ISA. Published by Elsevier Ltd. All rights reserved.

  11. Successful Implementation of Low-Cost Tele-Critical Care Solution by the U.S. Navy: Initial Experience and Recommendations.

    Science.gov (United States)

    Davis, Konrad; Perry-Moseanko, Alexandra; Tadlock, Matthew D; Henry, Nichole; Pamplin, Jeremy

    2017-05-01

    .5, p = 0.018), and no adverse outcomes related to the TCC system. This reduction in disengagements correlated with a savings in out-of-network expenditures of $1.3 million over the 19 months of program operation. There was no change in either the patients' length of stay or the number of patients transferred to NMCSD. TCC improves readiness by increasing the volume and acuity of critical care patient encounters at the spoke hospital. TCC can also enhance Graduate Medical Education by providing Intensivist teaching, and supports the concept of "Regionalized Care" by improving the integration of care between hospitals. The quality of care is improved through the more rapid transfer of patients who require a higher level of care, standardization of care through protocols, and the Intensivist expertise that is applied to patients kept at the smaller facility. The value of care increased through both enhanced quality, and the cost savings associated with decreasing network disengagements. Leveraging new technology to provide remote care for our sickest beneficiaries has been proven a successful solution to the dilemma of limited Intensivist staffing. Leadership should consider TCC as a tool to extend Intensivist expertise to all of our small hospitals, and should explore the application of synchronous telehealth within the operational environment where similar staffing challenges exist. Reprint & Copyright © 2017 Association of Military Surgeons of the U.S.

  12. Resisting persuasion by the skin of one's teeth: the hidden success of resisted persuasive messages.

    Science.gov (United States)

    Tormala, Zakary L; Clarkson, Joshua J; Petty, Richard E

    2006-09-01

    Recent research has suggested that when people resist persuasion they can perceive this resistance and, under specifiable conditions, become more certain of their initial attitudes (e.g., Z. L. Tormala & R. E. Petty, 2002). Within the same metacognitive framework, the present research provides evidence for the opposite phenomenon--that is, when people resist persuasion, they sometimes become less certain of their initial attitudes. Four experiments demonstrate that when people perceive that they have done a poor job resisting persuasion (e.g., they believe they generated weak arguments against a persuasive message), they lose attitude certainty, show reduced attitude-behavioral intention correspondence, and become more vulnerable to subsequent persuasive attacks. These findings suggest that resisted persuasive attacks can sometimes have a hidden yet important success by reducing the strength of the target attitude. ((c) 2006 APA, all rights reserved).

  13. Dog attack resulting in evisceration in an infant.

    Science.gov (United States)

    Cataldi, Laura A; Yamout, Sani Z; Glick, Philip L

    2011-04-01

    Severe dog bites can result in substantial morbidity and potentially fatal injury. We present a case of an infant attacked by a Staffordshire bull terrier with resultant soft tissue injury, evisceration, and bowel injury. Rapid assessment in the emergency department included evaluation for both blunt and penetrating injuries. After initial survey and resuscitation, the patient was transported to the operating room where he underwent an exploratory laparotomy, small bowel repair, and abdominal wall closure. Copyright © 2011 by Lippincott Williams & Wilkins

  14. SDN-based path hopping communication against eavesdropping attack

    Science.gov (United States)

    Zhang, Chuanhao; Bu, Youjun; Zhao, Zheng

    2016-10-01

    Network eavesdropping is one of the most popular means used by cyber attackers, which has been a severe threat to network communication security. Adversaries could capture and analyze network communication data from network nodes or links, monitor network status and steal sensitive data such as username and password etc. Traditional network usually uses static network configuration, and existing defense methods, including firewall, IDS, IPS etc., cannot prevent eavesdropping, which has no distinguishing characteristic. Network eavesdropping become silent during most of the time of the attacking process, which is why it is difficult to discover and to defend. But A successful eavesdropping attack also has its' precondition, which is the target path should be relatively stable and has enough time of duration. So, In order to resolve this problem, it has to work on the network architecture. In this paper, a path hopping communication(PHC) mechanism based on Software Define Network (SDN) was proposed to solve this problem. In PHC, Ends in communication packets as well as the routing paths were changed dynamically. Therefore, the traffic would be distributed to multiple flows and transmitted along different paths. so that Network eavesdropping attack could be prevented effectively. It was concluded that PHC was able to increase the overhead of Network eavesdropping, as well as the difficulty of communication data recovery.

  15. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    . However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute......Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  16. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  17. Big News: The Indian Media and Student Attacks in Australia

    Directory of Open Access Journals (Sweden)

    Matt Wade

    2016-05-01

    Full Text Available By any measure, 2009 was a big year for news in India. And yet the safety of Indian students in Australia ranked among the major news events in India that year. The India-Australia Poll 2013 found 65 per cent of respondents believed the Indian media had accurately reported the problems faced by Indian students in Australia in 2009-10. That implies two-thirds of Indians accepted the Indian media’s mostly negative depictions of Australia. Those who believed the media reporting about Australia had been accurate were more likely to be from large cities, be tertiary educated and have relatively high-incomes. The poll found 62 per cent of respondents thought Australia was a dangerous place for Indian students and that 61 per cent believed attacks on Indian students were motivated by racism. The results suggest negative perceptions about Australia created by the media’s portrayal of the student attacks linger in the Indian community. The timing of the initial attacks, and the imagery associated with them, helped attract and sustain media attention on the issue. The diplomatic tensions created by the crisis highlighted the growing influence of the broadcast media on India’s foreign relations. But the episode also exposed a deep lack of understanding about India in Australia. Governments were slow to comprehend how much damage media coverage of student attacks could do to Australia’s reputation in India.

  18. Transient ischemic attack: diagnostic evaluation.

    Science.gov (United States)

    Messé, Steven R; Jauch, Edward C

    2008-08-01

    A transient ischemic attack portends significant risk of a stroke. Consequently, the diagnostic evaluation in the emergency department is focused on identifying high-risk causes so that preventive strategies can be implemented. The evaluation consists of a facilitated evaluation of the patient's metabolic, cardiac, and neurovascular systems. At a minimum, the following tests are recommended: fingerstick glucose level, electrolyte levels, CBC count, urinalysis, and coagulation studies; noncontrast computed tomography (CT) of the head; electrocardiography; and continuous telemetry monitoring. Vascular imaging studies, such as carotid ultrasonography, CT angiography, or magnetic resonance angiography, should be performed on an urgent basis and prioritized according to the patient's risk stratification for disease. Consideration should be given for echocardiography if no large vessel abnormality is identified.

  19. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... to the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools...... of the modelled systems. Our analysis of processes identifies which actions may be performed by whom, at which locations, accessing which data. This allows to compute a superset of audit results---before an incident occurs....

  20. Security under Uncertainty: Adaptive Attackers Are More Challenging to Human Defenders than Random Attackers

    Directory of Open Access Journals (Sweden)

    Frédéric Moisan

    2017-06-01

    Full Text Available Game Theory is a common approach used to understand attacker and defender motives, strategies, and allocation of limited security resources. For example, many defense algorithms are based on game-theoretic solutions that conclude that randomization of defense actions assures unpredictability, creating difficulties for a human attacker. However, many game-theoretic solutions often rely on idealized assumptions of decision making that underplay the role of human cognition and information uncertainty. The consequence is that we know little about how effective these algorithms are against human players. Using a simplified security game, we study the type of attack strategy and the uncertainty about an attacker's strategy in a laboratory experiment where participants play the role of defenders against a simulated attacker. Our goal is to compare a human defender's behavior in three levels of uncertainty (Information Level: Certain, Risky, Uncertain and three types of attacker's strategy (Attacker's strategy: Minimax, Random, Adaptive in a between-subjects experimental design. Best defense performance is achieved when defenders play against a minimax and a random attack strategy compared to an adaptive strategy. Furthermore, when payoffs are certain, defenders are as efficient against random attack strategy as they are against an adaptive strategy, but when payoffs are uncertain, defenders have most difficulties defending against an adaptive attacker compared to a random attacker. We conclude that given conditions of uncertainty in many security problems, defense algorithms would be more efficient if they are adaptive to the attacker actions, taking advantage of the attacker's human inefficiencies.

  1. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...... engineered as part of this work. This is the first time CSSAs for the Skylake architecture are reported. Our attacks demonstrate that cryptographic applications in cloud computing environments using key-dependent tables for acceleration are still vulnerable even on recent architectures, including Skylake...

  2. Religion and support for suicide attacks.

    Science.gov (United States)

    Ginges, Jeremy; Hansen, Ian; Norenzayan, Ara

    2009-02-01

    In four studies carried out across different cultural, religious, and political contexts, we investigated the association between religion and popular support for suicide attacks. In two surveys of Palestinians and one cognitive priming experiment with Israeli settlers, prayer to God, an index of religious devotion, was unrelated to support for suicide attacks. Instead, attendance at religious services, thought to enhance coalitional commitment, positively predicted support for suicide attacks. In a survey of six religions in six nations, regular attendance at religious services positively predicted a combination of willing martyrdom and out-group hostility, but regular prayer did not. Implications for understanding the role of religion in suicide attacks are discussed.

  3. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    Nai Fovino, Igor; Masera, Marcelo; De Cian, Alessio

    2009-01-01

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  4. Visualizing Risks: Icons for Information Attack Scenarios

    National Research Council Canada - National Science Library

    Hosmer, Hilary

    2000-01-01

    .... Visual attack scenarios help defenders see system ambiguities, imprecision, vulnerabilities and omissions, thus speeding up risk analysis, requirements gathering, safeguard selection, cryptographic...

  5. Validation Method of a Telecommunications Blackout Attack

    National Research Council Canada - National Science Library

    Amado, Joao; Nunes, Paulo

    2005-01-01

    This paper presents an evaluation method of telecommunications infrastructure vulnerabilities, allowing the identification of components that can be attacked in order to achieve a communications blackout...

  6. Random Visitor: Defense against Identity Attacks in P2P Networks

    Science.gov (United States)

    Gu, Jabeom; Nah, Jaehoon; Kwon, Hyeokchan; Jang, Jonsoo; Park, Sehyun

    Various advantages of cooperative peer-to-peer networks are strongly counterbalanced by the open nature of a distributed, serverless network. In such networks, it is relatively easy for an attacker to launch various attacks such as misrouting, corrupting, or dropping messages as a result of a successful identifier forgery. The impact of an identifier forgery is particularly severe because the whole network can be compromised by attacks such as Sybil or Eclipse. In this paper, we present an identifier authentication mechanism called random visitor, which uses one or more randomly selected peers as delegates of identity proof. Our scheme uses identity-based cryptography and identity ownership proof mechanisms collectively to create multiple, cryptographically protected indirect bindings between two peers, instantly when needed, through the delegates. Because of these bindings, an attacker cannot achieve an identifier forgery related attack against interacting peers without breaking the bindings. Therefore, our mechanism limits the possibility of identifier forgery attacks efficiently by disabling an attacker's ability to break the binding. The design rationale and framework details are presented. A security analysis shows that our scheme is strong enough against identifier related attacks and that the strength increases if there are many peers (more than several thousand) in the network.

  7. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models.

    Science.gov (United States)

    Rao, Nageswara S V; Poole, Stephen W; Ma, Chris Y T; He, Fei; Zhuang, Jun; Yau, David K Y

    2016-04-01

    The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities, expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical subinfrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein their components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures, are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. The analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures. © 2015 Society for Risk Analysis.

  8. The Effect of Elevated CO2 and Increased Temperature on in Vitro Fertilization Success and Initial Embryonic Development of Single Male:Female Crosses of Broad-Cast Spawning Corals at Mid- and High-Latitude Locations

    Directory of Open Access Journals (Sweden)

    Miriam Schutter

    2015-05-01

    Full Text Available The impact of global climate change on coral reefs is expected to be most profound at the sea surface, where fertilization and embryonic development of broadcast-spawning corals takes place. We examined the effect of increased temperature and elevated CO2 levels on the in vitro fertilization success and initial embryonic development of broadcast-spawning corals using a single male:female cross of three different species from mid- and high-latitude locations: Lyudao, Taiwan (22° N and Kochi, Japan (32° N. Eggs were fertilized under ambient conditions (27 °C and 500 μatm CO2 and under conditions predicted for 2100 (IPCC worst case scenario, 31 °C and 1000 μatm CO2. Fertilization success, abnormal development and early developmental success were determined for each sample. Increased temperature had a more profound influence than elevated CO2. In most cases, near-future warming caused a significant drop in early developmental success as a result of decreased fertilization success and/or increased abnormal development. The embryonic development of the male:female cross of A. hyacinthus from the high-latitude location was more sensitive to the increased temperature (+4 °C than the male:female cross of A. hyacinthus from the mid-latitude location. The response to the elevated CO2 level was small and highly variable, ranging from positive to negative responses. These results suggest that global warming is a more significant and universal stressor than ocean acidification on the early embryonic development of corals from mid- and high-latitude locations.

  9. Network Coding Based Security for Routing Attacks in WRN: Frechet Interference and Rayleigh Outage Evaluation

    Directory of Open Access Journals (Sweden)

    R. Villalpando-Hernández

    2011-08-01

    Full Text Available We present a network coding security method capable of detecting several routing attacks in wireless reconfigurablenetworks. Routing security attacks include selective forwarding, black holes, and wormholes. The proposed methodperforms linear network coding over intermediate nodes composing a given route, not only to distribute content, butalso to provide data confidentiality by cooperation as a mechanism of detection. The method presents a robust,accurate and fast response under security attacks for varying network conditions, such as interference and outagedue to channel fading. It also provides a gain in network throughput by increasing the number of successfully receivedpackets without a significant increase of the bandwidth usage.

  10. Nonstructural carbohydrate dynamics of lodgepole pine dying from mountain pine beetle attack.

    Science.gov (United States)

    Wiley, Erin; Rogers, Bruce J; Hodgkinson, Robert; Landhäusser, Simon M

    2016-01-01

    Bark beetle outbreaks are an important cause of tree death, but the process by which trees die remains poorly understood. The effect of beetle attack on whole-tree nonstructural carbohydrate (NSC) dynamics is particularly unclear, despite the potential role of carbohydrates in plant defense and survival. We monitored NSC dynamics of all organs in attacked and protected lodgepole pines (Pinus contorta) during a mountain pine beetle (Dendroctonus ponderosae) outbreak in British Columbia, starting before beetle flight in June 2011 through October 2012, when most attacked trees had died. Following attack, NSC concentrations were first reduced in the attacked region of the bole. The first NSC reduction in a distant organ appeared in the needles at the end of 2011, while branch and root NSC did not decline until much later in 2012. Attacked trees that were still alive in October 2012 had less beetle damage, which was negatively correlated with initial bark sugar concentrations in the attack region. The NSC dynamics of dying trees indicate that trees were killed by a loss of water conduction and not girdling. Further, our results identify locally reduced carbohydrate availability as an important mechanism by which stressors like drought may increase tree susceptibility to biotic attack. © 2015 The Authors. New Phytologist © 2015 New Phytologist Trust.

  11. Cued Panic Attacks in Body Dysmorphic Disorder

    Science.gov (United States)

    Phillips, Katharine A.; Menard, William; Bjornsson, Andri S.

    2013-01-01

    Background Body dysmorphic disorder (BDD) is a common and often severe disorder. Clinical observations suggest that panic attacks triggered by BDD symptoms may be common. However, to our knowledge, no study has examined such panic attacks in BDD. We investigated the prevalence, clinical features, and correlates of BDD-triggered panic attacks in individuals with this disorder. Methods Panic attacks and other variables were assessed using reliable and valid measures in 76 individuals with lifetime DSM-IV BDD. Results 28.9% (95% CI, 18.5%–39.4%) of participants reported lifetime panic attacks triggered by BDD symptoms. The most common triggers of such attacks were feeling that others were looking at or scrutinizing the perceived appearance defects (61.9%), looking in the mirror at perceived defects (38.1%), and being in bright light where perceived defects would be more visible (23.8%). The most common panic attack symptoms were palpitations (86.4%), sweating (66.7%), shortness of breath (63.6%), trembling or shaking (63.6%), and fear of losing control or going crazy (63.6%). Compared to participants without such panic attacks, those with BDD-triggered panic attacks had more severe lifetime BDD, social anxiety, and depressive symptoms, as well as poorer functioning and quality of life on a number of measures. They were also less likely to be employed and more likely to have been psychiatrically hospitalized and to have had suicidal ideation due to BDD. Conclusions Panic attacks triggered by BDD-related situations appear common in individuals with this disorder. BDD-triggered panic attacks were associated with greater symptom severity and morbidity. PMID:23653076

  12. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  13. Resilience of LTE networks against smart jamming attacks: Wideband model

    KAUST Repository

    Aziz, Farhan M.

    2015-12-03

    LTE/LTE-A networks have been successfully providing advanced broadband services to millions of users worldwide. Lately, it has been suggested to use LTE networks for mission-critical applications like public safety, smart grid and military communications. We have previously shown that LTE networks are vulnerable to Denial-of-Service (DOS) and loss of service attacks from smart jammers. In this paper, we extend our previous work on resilience of LTE networks to wideband multipath fading channel, SINR estimation in frequency domain and computation of utilities based on observable parameters under the framework of single-shot and repeated games with asymmetric information. In a single-shot game formulation, network utility is severely compromised at its solutions, i.e. at the Nash Equilibria (NE). We propose evolved repeated-game strategy algorithms to combat smart jamming attacks that can be implemented in existing deployments using current technology. © 2015 IEEE.

  14. Higher Order Differential Attack on 6-Round MISTY1

    Science.gov (United States)

    Tsunoo, Yukiyasu; Saito, Teruo; Nakashima, Hiroki; Shigeri, Maki

    MISTY1 is a 64-bit block cipher that has provable security against differential and linear cryptanalysis. MISTY1 is one of the algorithms selected in the European NESSIE project, and it has been recommended for Japanese e-Government ciphers by the CRYPTREC project. This paper reports a previously unknown higher order differential characteristic of 4-round MISTY1 with the FL functions. It also shows that a higher order differential attack that utilizes this newly discovered characteristic is successful against 6-round MISTY1 with the FL functions. This attack can recover a partial subkey with a data complexity of 253.7 and a computational complexity of 264.4, which is better than any previous cryptanalysis of MISTY1.

  15. Phosphodiesterase 3 inhibitor cilostazol induces migraine-like attacks via cyclic AMP increase

    DEFF Research Database (Denmark)

    Guo, Song; Olesen, Jes; Ashina, Messoud

    2014-01-01

    The initiating mechanisms of migraine attacks are very complex but may involve the cyclic AMP signalling pathway. It is unknown whether intracellular cyclic AMP accumulation induces migraine attacks. We investigated whether administration of cilostazol, which causes cyclic AMP accumulation, may...... and that cilostazol-induced attacks responded to their usual migraine treatment. Median time of medication intake was 6 h (range 4-11 h). The present study suggests that intracellular cyclic AMP accumulation plays a crucial role in migraine induction. This knowledge is a further step in our understanding...

  16. Internet of Things Security: Layered classification of attacks and possible Countermeasures

    Directory of Open Access Journals (Sweden)

    Otmane El Mouaatamid

    2016-12-01

    Full Text Available Nowadays, the internet of things (IoT presents a strong focus of research with various initiatives working on the application, and usage of Internet standards in the IoT. But the big challenge of the internet of things is security. In this paper a layered classification and a goal based comparison of attacks in the IoT are presented so that a better understanding of IoT attacks can be achieved and subsequently more efficient and effective techniques and procedures to combat these attacks may be developed

  17. An Attack on Duffer's Downtown

    National Research Council Canada - National Science Library

    Glenn, Russell

    2001-01-01

    This recalling of an extended series of dreams will, if successful, serve to foment thoughts regarding what is, what could be, and what should be when a nation's soldiers and marines are once again...

  18. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  19. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...

  20. Attack Tree Generation by Policy Invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identi﬿cation. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identi﬿ed

  1. A UNIFIED APPROACH FOR DETECTION AND PREVENTION OF DDOS ATTACKS USING ENHANCED SUPPORT VECTOR MACHINES AND FILTERING MECHANISMS

    Directory of Open Access Journals (Sweden)

    T. Subbulakshmi

    2014-10-01

    Full Text Available Distributed Denial of Service (DDoS attacks were considered to be a tremendous threat to the current information security infrastructure. During DDoS attack, multiple malicious hosts that are recruited by the attackers launch a coordinated attack against one host or a network victim, which cause denial of service to legitimate users. The existing techniques suffer from more number of false alarms and more human intervention for attack detection. The objective of this paper is to monitor the network online which automatically initiates detection mechanism if there is any suspicious activity and also defense the hosts from being arrived at the network. Both spoofed and non spoofed IP’s are detected in this approach. Non spoofed IP’s are detected using Enhanced Support Vector Machines (ESVM and spoofed IP’s are detected using Hop Count Filtering (HCF mechanism. The detected IP’s are maintained separately to initiate the defense process. The attack strength is calculated using Lanchester Law which initiates the defense mechanism. Based on the calculated attack strength any of the defense schemes such as Rate based limiting or History based IP filtering is automatically initiated to drop the packets from the suspected IP. The integrated online monitoring approach for detection and defense of DDoS attacks is deployed in an experimental testbed. The online approach is found to be obvious in the field of integrated DDoS detection and defense.

  2. Creative Persuasion: A Study on Adversarial Behaviors and Strategies in Phishing Attacks

    Directory of Open Access Journals (Sweden)

    Prashanth Rajivan

    2018-02-01

    Full Text Available Success of phishing attacks depend on effective exploitation of human weaknesses. This research explores a largely ignored, but crucial aspect of phishing: the adversarial behavior. We aim at understanding human behaviors and strategies that adversaries use, and how these may determine the end-user response to phishing emails. We accomplish this through a novel experiment paradigm involving two phases. In the adversarial phase, 105 participants played the role of a phishing adversary who were incentivized to produce multiple phishing emails that would evade detection and persuade end-users to respond. In the end-user phase, 340 participants performed an email management task, where they examined and classified phishing emails generated by participants in phase-one along with benign emails. Participants in the adversary role, self-reported the strategies they employed in each email they created, and responded to a test of individual creativity. Data from both phases of the study was combined and analyzed, to measure the effect of adversarial behaviors on end-user response to phishing emails. We found that participants who persistently used specific attack strategies (e.g., sending notifications, use of authoritative tone, or expressing shared interest in all their attempts were overall more successful, compared to others who explored different strategies in each attempt. We also found that strategies largely determined whether an end-user was more likely to respond to an email immediately, or delete it. Individual creativity was not a reliable predictor of adversarial performance, but it was a predictor of an adversary's ability to evade detection. In summary, the phishing example provided initially, the strategies used, and the participants' persistence with some of the strategies led to higher performance in persuading end-users to respond to phishing emails. These insights may be used to inform tools and training procedures to detect phishing

  3. Creative Persuasion: A Study on Adversarial Behaviors and Strategies in Phishing Attacks.

    Science.gov (United States)

    Rajivan, Prashanth; Gonzalez, Cleotilde

    2018-01-01

    Success of phishing attacks depend on effective exploitation of human weaknesses. This research explores a largely ignored, but crucial aspect of phishing: the adversarial behavior. We aim at understanding human behaviors and strategies that adversaries use, and how these may determine the end-user response to phishing emails. We accomplish this through a novel experiment paradigm involving two phases. In the adversarial phase, 105 participants played the role of a phishing adversary who were incentivized to produce multiple phishing emails that would evade detection and persuade end-users to respond. In the end-user phase, 340 participants performed an email management task, where they examined and classified phishing emails generated by participants in phase-one along with benign emails. Participants in the adversary role, self-reported the strategies they employed in each email they created, and responded to a test of individual creativity. Data from both phases of the study was combined and analyzed, to measure the effect of adversarial behaviors on end-user response to phishing emails. We found that participants who persistently used specific attack strategies (e.g., sending notifications, use of authoritative tone, or expressing shared interest) in all their attempts were overall more successful, compared to others who explored different strategies in each attempt. We also found that strategies largely determined whether an end-user was more likely to respond to an email immediately, or delete it. Individual creativity was not a reliable predictor of adversarial performance, but it was a predictor of an adversary's ability to evade detection. In summary, the phishing example provided initially, the strategies used, and the participants' persistence with some of the strategies led to higher performance in persuading end-users to respond to phishing emails. These insights may be used to inform tools and training procedures to detect phishing strategies in

  4. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian

    2014-01-01

    In this paper we combine two powerful methods of symmetric cryptanalysis: rotational cryptanalysis and the rebound attack. Rotational cryptanalysis was designed for the analysis of bit-oriented designs like ARX (Addition-Rotation-XOR) schemes. It has been applied to several hash functions and block...... ciphers, including the new standard SHA-3 (Keccak). The rebound attack is a start-from-the-middle approach for finding differential paths and conforming pairs in byte-oriented designs like Substitution-Permutation networks and AES. We apply our new compositional attack to the reduced version of the hash...... function Skein, a finalist of the SHA-3 competition. Our attack penetrates more than two thirds of the Skein core—the cipher Threefish, and made the designers to change the submission in order to prevent it. The rebound part of our attack has been significantly enhanced to deliver results on the largest...

  5. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  6. Patients' perceptions of their heart attack and recovery: the influence of epidemiological "evidence" and personal experience.

    Science.gov (United States)

    Wiles, R

    1998-06-01

    Secondary prevention of heart disease is widely viewed as likely to be more successful and cost effective than primary prevention. However, people's willingness to adopt lifestyle change is a complex issue in which people's perceptions of disease causation and risk as well as a range of socio-economic factors are important. This paper reports on a qualitative study of people following heart attack which examines their understandings of heart attack and the salience that lifestyle advice has in the light of these understandings. In-depth, qualitative interviews were conducted with 25 people recovering from heart attack. Each person was interviewed twice: at around two weeks and five months following their heart attack. The study found that information about recovery provided by health professionals was based on a simplified version of epidemiological evidence. This information played a central role in people's understandings about the nature of heart attack and their future risk in the early weeks following heart attack. However, as interviewees came to terms with the shock of the event, they tended to lose their trust in "official" accounts of cause and recovery and evidence from lay epidemiology that contradicted official accounts tended to emerge. This evidence encouraged interviewees to question the explanatory power of official accounts and to view the adoption of long-term lifestyle change as an action that would not guarantee protection from a further heart attack. This was true whether or not people's experiences of recovery reflected those "predicted" by health professionals although those awaiting further surgery or tests tended to maintain trust in official accounts over a longer period. It is concluded that the failure of official accounts to acknowledge the random nature of the occurrence of heart attack, the severity of heart attack and the level of recovery from heart attack is a central feature in people's reluctance to view lifestyle change as a

  7. Hill-Climbing Attacks and Robust Online Signature Verification Algorithm against Hill-Climbing Attacks

    Science.gov (United States)

    Muramatsu, Daigo

    Attacks using hill-climbing methods have been reported as a vulnerability of biometric authentication systems. In this paper, we propose a robust online signature verification algorithm against such attacks. Specifically, the attack considered in this paper is a hill-climbing forged data attack. Artificial forgeries are generated offline by using the hill-climbing method, and the forgeries are input to a target system to be attacked. In this paper, we analyze the menace of hill-climbing forged data attacks using six types of hill-climbing forged data and propose a robust algorithm by incorporating the hill-climbing method into an online signature verification algorithm. Experiments to evaluate the proposed system were performed using a public online signature database. The proposed algorithm showed improved performance against this kind of attack.

  8. Patent foramen ovale and migraine attacks: a systematic review.

    Science.gov (United States)

    Lip, Philomena Z Y; Lip, Gregory Y H

    2014-05-01

    Migraine headache and the presence of a patent foramen ovale have been associated with each other, although the precise pathophysiological mechanism(s) are uncertain. The purpose of this systematic review was to identify the extent of patent foramen ovale prevalence in migraineurs and to determine whether closure of a patent foramen ovale would improve migraine headache. An electronic literature search was performed to select studies between January 1980 and February 2013 that were relevant to the prevalence of patent foramen ovale and migraine, and the effects of intervention(s) on migraine attacks. Of the initial 368 articles presented by the initial search, 20 satisfied the inclusion criteria assessing patent foramen ovale prevalence in migraineurs and 21 presented data on patent foramen ovale closure. In case series and cohort studies, patent foramen ovale prevalence in migraineurs ranged from 14.6% to 66.5%. Case-control studies reported a prevalence ranging from 16.0% to 25.7% in controls, compared with 26.8% to 96.0% for migraine with aura. The extent of improvement or resolution of migraine headache attack symptoms was variable. In case series, intervention ameliorated migraine headache attack in 13.6% to 92.3% of cases. One single randomized trial did not show any benefit from patent foramen ovale closure. The data overall do not exclude the possibility of a placebo effect for resolving migraine following patent foramen ovale closure. This systematic review demonstrates firstly that migraine headache attack is associated with a higher prevalence of patent foramen ovale than among the general population. Observational data suggest that some improvement of migraine would be observed if the patent foramen ovale were to be closed. A proper assessment of any interventions for patent foramen ovale closure would require further large randomized trials to be conducted given uncertainties from existing trial data. Copyright © 2014 Elsevier Inc. All rights reserved.

  9. Towards automated incident handling: how to select an appropriate response against a network-based attack?

    NARCIS (Netherlands)

    Ossenbühl, Sven; Steinberger, Jessica; Baier, Harald

    2015-01-01

    The increasing amount of network-based attacks evolved to one of the top concerns responsible for network infrastructure and service outages. In order to counteract these threats, computer networks are monitored to detect malicious traffic and initiate suitable reactions. However, initiating a

  10. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Sakuta, Hidenari

    2007-01-01

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  11. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approac...... inside-out computations and neutral bits in the inbound phase of the rebound attack, and give well-defined rotational distinguishers as certificates of weaknesses for the compression functions and block ciphers.......In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...... and the Threefish cipher. The new techniques include an analytical search for optimal input values in the rotational cryptanalysis, which allows to extend the outbound phase of the attack with a precomputation phase, an approach never used in any rebound-style attack before. Further we show how to combine multiple...

  12. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    Energy Technology Data Exchange (ETDEWEB)

    Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

    2011-10-01

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

  13. Study of the impact on PSA success criteria of the variability of the initial liquid level in case of the loss of the RHR system accident scenario under mid-loop operating conditions

    International Nuclear Information System (INIS)

    Villanueva, J.F.; Carlos, S.; Martorell, S.; Serradell, V.; Pelayo, F.; Mendizabal, R.; Cirauqui, C.; Sol, I.

    2005-01-01

    Probabilistic safety assessment (PSA) is recognized nowadays as an important tool to support risk-informed decision-making aimed at providing both operational flexibility and plant safety [1]. Experience of current PSA studies shows the importance of some risky scenarios with the plant at low power and shutdown conditions as compared to the accident scenarios with the plant operating at full power. In particular, current low power and shutdown PSA (LPSA) studies shows that the loss of the Residual Heat Removal System (RHRS) transient is one of the most risk-significant events under low power conditions [2]. This accident type is supposed to occur for various plant operating states, of which mid-loop operation represents one of the main contributors [3]. LPSA has widely used methods for thermal-hydraulic analysis that play an important role in determining success criteria of safety-related functions involved to mitigate the severity of accident scenarios with the plant operating in such conditions. Various best estimate thermal-hydraulic analysis codes have been used to analyze the loss of the RHRS during low power and shutdown conditions [4, 5]. It is known that RELAP code can give good results as derived after a number of benchmark exercises using results from experiments at research facilities (e.g. ROSA-IV, BETHSY, PKL). [6] Previous research has shown how thermal-hydraulic phenomena after the loss of the RHRS, e.g. peak reactor coolant system pressure, are sensitive to the initial liquid level at the time of loss of the RHRS [2]. This paper presents the results of the study of the thermalhydraulic analysis of the accident scenarios after the loss of the RHRS under mid-loop conditions paying particular attention to the analysis of the effect of the variability of the initial liquid level on the success criteria of the safety-related functions considered in a typical LPSA [3]. (author)

  14. Non-invasive ventilation in severe asthma attack, its possibilities and problems.

    Science.gov (United States)

    Murase, K; Tomii, K; Chin, K; Niimi, A; Ishihara, K; Mishima, M

    2011-06-01

    Asthma attack is characterized by episodic attacks of cough, dyspnea and wheeze occurring due to bronchoconstriction, airway hyperresponsiveness and mucous hypersecretion. Although nationwide clinical guidelines have been published to establish the standard care of asthma, choices in the treatment of fatal asthma attacks remain of clinical significance. Especially, in a severe asthma attack, despite the application of conventional medical treatment, respiratory management is critical. Even though non-invasive ventilation (NIV) has been shown to be effective in a wide variety of clinical settings, reports of NIV in asthmatic patients are scarce. According to a few prospective clinical trials reporting promising results in favour of the use of NIV in a severe asthma attack, a trial of NIV prior to invasive mechanical ventilation seems acceptable and may benefit patients by decreasing the need for intubation and by supporting pharmaceutical treatments. Although selecting the appropriate patients for NIV use is a key factor in successful NIV application, how to distinguish such patients is quite controversial. Larger high quality clinical trails are urgently required to confirm the benefits of NIV to patients with severe asthma attack. In this article, we focus on the body of evidence supporting the use of NIV in asthma attacks and discuss its advantages as well its problems.

  15. Forensic Evidence Identification and Modeling for Attacks against a Simulated Online Business Information System

    Directory of Open Access Journals (Sweden)

    Manghui Tu

    2012-12-01

    Full Text Available Forensic readiness can support future forensics investigation or auditing on external/internal attacks, internal sabotage and espionage, and business frauds. To establish forensics readiness, it is essential for an organization to identify what evidences are relevant and where they can be found, to determine whether they are logged in a forensic sound way and whether all the needed evidences are available to reconstruct the events successfully.  Our goal of this research is to ensure evidence availability. First, both external and internal attacks are molded as augmented attack trees/graphs based on the system vulnerabilities. Second, modeled attacks are conducted against a honeynet simulating an online business information system, and each honeypot's hard drive is forensic sound imaged for each individual attack. Third, an evidence tree/graph will be built after forensics examination on the disk images for each attack. The evidence trees/graphs are expected to be used for automatic crime scene reconstruction and automatic attack/fraud detection in the future.

  16. An Efficient Algorithm for the Detection of Exposed and Hidden Wormhole Attack

    Directory of Open Access Journals (Sweden)

    ZUBAIR AHMED KHAN

    2016-07-01

    Full Text Available MANETs (Mobile Ad Hoc Networks are slowly integrating into our everyday lives, their most prominent uses are visible in the disaster and war struck areas where physical infrastructure is almost impossible or very hard to build. MANETs like other networks are facing the threat of malicious users and their activities. A number of attacks have been identified but the most severe of them is the wormhole attack which has the ability to succeed even in case of encrypted traffic and secure networks. Once wormhole is launched successfully, the severity increases by the fact that attackers can launch other attacks too. This paper presents a comprehensive algorithm for the detection of exposed as well as hidden wormhole attack while keeping the detection rate to maximum and at the same reducing false alarms. The algorithm does not require any extra hardware, time synchronization or any special type of nodes. The architecture consists of the combination of Routing Table, RTT (Round Trip Time and RSSI (Received Signal Strength Indicator for comprehensive detection of wormhole attack. The proposed technique is robust, light weight, has low resource requirements and provides real-time detection against the wormhole attack. Simulation results show that the algorithm is able to provide a higher detection rate, packet delivery ratio, negligible false alarms and is also better in terms of Ease of Implementation, Detection Accuracy/ Speed and processing overhead.

  17. Information-governing dynamics of attacker-defender interactions in youth rugby union.

    Science.gov (United States)

    Passos, Pedro; Araújo, Duarte; Davids, Keith; Gouveia, Luis; Milho, João; Serpa, Sidónio

    2008-11-01

    Previous work on dynamics of interpersonal interactions in 1 vs. 1 sub-phases of basketball has identified changes in interpersonal distance between an attacker and defender as a potential control parameter for influencing organizational states of attacker-defender dyads. Other studies have reported the constraining effect of relative velocity between an attacker and defender in 1 vs. 1 dyads. To evaluate the relationship between these candidate control parameters, we compared the impact of both interpersonal distance and relative velocity on the pattern-forming dynamics of attacker-defender dyads in the sport of rugby union. Results revealed that when interpersonal distance achieved a critical value of less than 4 m, and relative velocity values increased or were maintained above 1 m x s(-1), a successful outcome (i.e. clean attempt) for an attacker was predicted. Alternatively, when values of relative velocity suddenly decreased below this threshold, at the same critical value of interpersonal distance, a successful outcome for the defender was predicted. Data demonstrated how the coupling of these two potential, nested control parameters moved the dyadic system to phase transitions, characterized as a try or a tackle. Observations suggested that relative velocity increased its influence on the organization of attacker-defender dyads in rugby union over time as spatial proximity to the try line increased.

  18. Calcium Supplements: A Risk Factor for Heart Attack?

    Science.gov (United States)

    ... for heart attack? I've read that calcium supplements may increase the risk of heart attack. Is ... Some doctors think it's possible that taking calcium supplements may increase your risk of a heart attack. ...

  19. Classifier fusion for VoIP attacks classification

    Science.gov (United States)

    Safarik, Jakub; Rezac, Filip

    2017-05-01

    SIP is one of the most successful protocols in the field of IP telephony communication. It establishes and manages VoIP calls. As the number of SIP implementation rises, we can expect a higher number of attacks on the communication system in the near future. This work aims at malicious SIP traffic classification. A number of various machine learning algorithms have been developed for attack classification. The paper presents a comparison of current research and the use of classifier fusion method leading to a potential decrease in classification error rate. Use of classifier combination makes a more robust solution without difficulties that may affect single algorithms. Different voting schemes, combination rules, and classifiers are discussed to improve the overall performance. All classifiers have been trained on real malicious traffic. The concept of traffic monitoring depends on the network of honeypot nodes. These honeypots run in several networks spread in different locations. Separation of honeypots allows us to gain an independent and trustworthy attack information.

  20. Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals

    Directory of Open Access Journals (Sweden)

    Xiapu Luo

    2009-01-01

    Full Text Available This paper addresses the important problem of detecting pulsing denial of service (PDoS attacks which send a sequence of attack pulses to reduce TCP throughput. Unlike previous works which focused on a restricted form of attacks, we consider a very broad class of attacks. In particular, our attack model admits any attack interval between two adjacent pulses, whether deterministic or not. It also includes the traditional flooding-based attacks as a limiting case (i.e., zero attack interval. Our main contribution is Vanguard, a new anomaly-based detection scheme for this class of PDoS attacks. The Vanguard detection is based on three traffic anomalies induced by the attacks, and it detects them using a CUSUM algorithm. We have prototyped Vanguard and evaluated it on a testbed. The experiment results show that Vanguard is more effective than the previous methods that are based on other traffic anomalies (after a transformation using wavelet transform, Fourier transform, and autocorrelation and detection algorithms (e.g., dynamic time warping.

  1. Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals

    Science.gov (United States)

    Luo, Xiapu; Chan, Edmond W. W.; Chang, Rocky K. C.

    2009-12-01

    This paper addresses the important problem of detecting pulsing denial of service (PDoS) attacks which send a sequence of attack pulses to reduce TCP throughput. Unlike previous works which focused on a restricted form of attacks, we consider a very broad class of attacks. In particular, our attack model admits any attack interval between two adjacent pulses, whether deterministic or not. It also includes the traditional flooding-based attacks as a limiting case (i.e., zero attack interval). Our main contribution is Vanguard, a new anomaly-based detection scheme for this class of PDoS attacks. The Vanguard detection is based on three traffic anomalies induced by the attacks, and it detects them using a CUSUM algorithm. We have prototyped Vanguard and evaluated it on a testbed. The experiment results show that Vanguard is more effective than the previous methods that are based on other traffic anomalies (after a transformation using wavelet transform, Fourier transform, and autocorrelation) and detection algorithms (e.g., dynamic time warping).

  2. Analysis for Ad Hoc Network Attack-Defense Based on Stochastic Game Model

    Directory of Open Access Journals (Sweden)

    Yuanjie LI

    2014-06-01

    Full Text Available The attack actions analysis for Ad Hoc networks can provide a reference for the design security mechanisms. This paper presents an analysis method of security of Ad Hoc networks based on Stochastic Game Nets (SGN. This method can establish a SGN model of Ad Hoc networks and calculate to get the Nash equilibrium strategy. After transforming the SGN model into a continuous-time Markov Chain (CTMC, the security of Ad Hoc networks can be evaluated and analyzed quantitatively by calculating the stationary probability of CTMC. Finally, the Matlab simulation results show that the probability of successful attack is related to the attack intensity and expected payoffs, but not attack rate.

  3. State of the art on defenses against wormhole attacks in wireless sensor networks

    DEFF Research Database (Denmark)

    Prasad, Neeli R.; Giannetsos, T.; Dimitriou, T.

    2009-01-01

    the possibility of using more sophisticated methods, like intrusion detection systems, to achieve a more complete and autonomic defense mechanism against wormhole attackers. We present our work on intrusion detection and introduce a lightweight IDS framework, called LIDeA, designed for wireless sensor networks......As pervasive interconnection of autonomous sensor devices gave birth to a broad class of exiting new applications, security emerges as a central requirement. Wireless sensor networks are vulnerable to attacks as they are frequently deployed in open and unattended environments. In this paper, we...... describe the wormhole attack, a severe routing attack against sensor networks that is particularly challenging to defend against. We detail its characteristics and study its effects on the successful operation of a sensor network. We present state-of-the-art research for addressing wormhole related...

  4. A blind video watermarking scheme resistant to rotation and collusion attacks

    Directory of Open Access Journals (Sweden)

    Amlan Karmakar

    2016-04-01

    Full Text Available In this paper, Discrete Cosine Transform (DCT based blind video watermarking algorithm is proposed, which is perceptually invisible and robust against rotation and collusion attacks. To make the scheme resistant against rotation, watermark is embedded within the square blocks, placed on the middle position of every luminance channel. Then Zernike moments of those square blocks are calculated. The rotation invariance property of the Complex Zernike moments is exploited to predict the rotation angle of the video at the time of extraction of watermark bits. To make the scheme robust against collusion, design of the scheme is done in such a way that the embedding blocks will vary for the successive frames of the video. A Pseudo Random Number (PRN generator and a permutation vector are used to achieve the goal. The experimental results show that the scheme is robust against conventional video attacks, rotation attack and collusion attacks.

  5. DMP: detouring using multiple paths against jamming attack for ubiquitous networking system.

    Science.gov (United States)

    Kim, Mihui; Chae, Kijoon

    2010-01-01

    To successfully realize the ubiquitous network environment including home automation or industrial control systems, it is important to be able to resist a jamming attack. This has recently been considered as an extremely threatening attack because it can collapse the entire network, despite the existence of basic security protocols such as encryption and authentication. In this paper, we present a method of jamming attack tolerant routing using multiple paths based on zones. The proposed scheme divides the network into zones, and manages the candidate forward nodes of neighbor zones. After detecting an attack, detour nodes decide zones for rerouting, and detour packets destined for victim nodes through forward nodes in the decided zones. Simulation results show that our scheme increases the PDR (Packet Delivery Ratio) and decreases the delay significantly in comparison with rerouting by a general routing protocol on sensor networks, AODV (Ad hoc On Demand Distance Vector), and a conventional JAM (Jammed Area Mapping) service with one reroute.

  6. DMP: Detouring Using Multiple Paths against Jamming Attack for Ubiquitous Networking System

    Directory of Open Access Journals (Sweden)

    Mihui Kim

    2010-04-01

    Full Text Available To successfully realize the ubiquitous network environment including home automation or industrial control systems, it is important to be able to resist a jamming attack. This has recently been considered as an extremely threatening attack because it can collapse the entire network, despite the existence of basic security protocols such as encryption and authentication. In this paper, we present a method of jamming attack tolerant routing using multiple paths based on zones. The proposed scheme divides the network into zones, and manages the candidate forward nodes of neighbor zones. After detecting an attack, detour nodes decide zones for rerouting, and detour packets destined for victim nodes through forward nodes in the decided zones. Simulation results show that our scheme increases the PDR (Packet Delivery Ratio and decreases the delay significantly in comparison with rerouting by a general routing protocol on sensor networks, AODV (Ad hoc On Demand Distance Vector, and a conventional JAM (Jammed Area Mapping service with one reroute.

  7. [Approach to liver, spleen and pancreatic injuries including damage control surgery of terrorist attacks].

    Science.gov (United States)

    Stavrou, G A; Lipp, M J; Oldhafer, K J

    2017-10-01

    Terrorist attacks have outreached to Europe with more and more attacks on civilians. Derived from war surgery experience and from lessons learned from major incidents, it seems mandatory for every surgeon to improve understanding of the special circumstances of trauma following a terrorist attack and its' management. A short literature review is followed by outlining the damage control surgery (DCS) principle for each organ system with practical comments from the perspective of a specialized hepatobiliary (HPB) surgery unit. Every surgeon has to become familiar with the new entities of blast injuries and terrorist attack trauma. This concerns not only the medical treatment but also tailoring surgical treatment with a view to a lack of critical resources under these circumstances. For liver and pancreatic trauma, simple treatment strategies are a key to success.

  8. A thermodynamic model for the attack behaviour in stainless steel clad oxide fuel pins

    International Nuclear Information System (INIS)

    Goetzmann, O.

    1979-01-01

    So far, post irradiation examination of burnt fuel pins has not revealed a clear cut picture of the cladding attack situation. For seemingly same conditions sometimes attack occurs, sometimes not. This model tries to depict the reaction possibilities along the inner cladding wall on the basis of thermodynamic facts in the fuel pin. It shows how the thermodynamic driving force for attack changes along the fuel column, and with different initial and operational conditions. Two criteria for attack are postulated: attack as a result of the direct reaction of reactive elements with cladding components; and attack as a result of the action of a special agent (CsOH). In defining a reaction potenial the oxygen potential, the temperature conditions (cladding temperature and fuel surface temperature), and the fission products are involved. For the determination of the oxygen potential at the cladding, three models for the redistribution of oxygen across the fuel/clad gap are offered. The effect of various parameters, like rod power, gap conductance, oxygen potential, inner wall temperature, on the thermodynamic potential for attack is analysed. (Auth.)

  9. Firmware Counterfeiting and Modification Attacks on Programmable Logic Controllers

    Science.gov (United States)

    2013-03-01

    considered the first reported cyber attack against critical infrastructure took place in 1997 [1, 21]. In March, a teenager successfully hacked into a local... Hack in the Box Sec-Conference. Kuala Lumpur, Malaysia. 2010. [23] He↵ner, Craig. “Reverse Engineering Firmware: Linksys WAG120N”. DEV/TTYS0, May 29...news/6767. [46] Ramabadran, Tenkasi V. and Sunil S. Gaitonde. “A Tutorial on CRC Computations”. Micro, IEEE, 8(4):62–75, 1988. [47] Roberts, Paul F

  10. 'Heart attack' symptoms and decision-making: the case of older rural women.

    Science.gov (United States)

    Jackson, M N G; McCulloch, B J

    2014-01-01

    Women are just as vulnerable to 'heart attacks' (used throughout this study to mean 'myocardial infarction') as men and are often unaware of many associated symptoms. Researchers have illustrated that women have difficulty identifying the symptoms of cardiovascular disease, with patients often delaying treatment after the onset of symptoms. Some individuals wait hours or even days before seeking medical care. This is particularly concerning for older rural women because the rates of death from cardiovascular disease and cancer are higher in some rural areas. Despite idealistic views of country life as being active, less stressful, and possessing strong social and community support, rural Americans are more likely than their urban counterparts to face challenges to maintaining health. The purpose of this paper is to utilize information gathered from a qualitative study exploring older rural women's identification of symptoms and health decision-making specific to heart attack vignettes. Snowball sampling was the main approach utilized to access participants; after an initial contact was successful, participants contacted additional older rural women to see if they might be willing to participate in an interview. This resulted in a final sample of 33 women who resided in rural Midwestern areas of the USA, were 65 years or older, lived in a county defined as rural by the US Census, and were willing to participate in a face-to-face interview. Each interview included a demographic questionnaire, a health questionnaire, and three health vignettes with follow-up questions. Vignettes provided a way of initiating discussions about health decisions without invading the privacy known to be important to rural residents. The term 'heart attack' was used in the interviews because it was thought to be better recognised than the medical term 'myocardial infarction'. All data were audio taped, transcribed, and coded using line-by-line coding. Data were analyzed using content

  11. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  12. On localization attacks against cloud infrastructure

    Science.gov (United States)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  13. Marine Attack on Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Ad

    2002-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  14. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  15. Outdoor Air Pollution, Heart Attack and Stroke

    Science.gov (United States)

    Elevated outdoor ambient air particle pollution triggers heart attacks, strokes, and abnormal heart rhythms and worsens heart failure in individuals at high risk due to underlying medical conditions. Emergency Medical Services in communities are the first responders to these eme...

  16. Twisted Polynomials and Forgery Attacks on GCM

    DEFF Research Database (Denmark)

    Abdelraheem, Mohamed Ahmed A. M. A.; Beelen, Peter; Bogdanov, Andrey

    2015-01-01

    nonce misuse resistance, such as POET. The algebraic structure of polynomial hashing has given rise to security concerns: At CRYPTO 2008, Handschuh and Preneel describe key recovery attacks, and at FSE 2013, Procter and Cid provide a comprehensive framework for forgery attacks. Both approaches rely...... heavily on the ability to construct forgery polynomials having disjoint sets of roots, with many roots (“weak keys”) each. Constructing such polynomials beyond naïve approaches is crucial for these attacks, but still an open problem. In this paper, we comprehensively address this issue. We propose to use...... in an improved key recovery algorithm. As cryptanalytic applications of our twisted polynomials, we develop the first universal forgery attacks on GCM in the weak-key model that do not require nonce reuse. Moreover, we present universal weak-key forgeries for the nonce-misuse resistant AE scheme POET, which...

  17. Joint Warfighting: Attacking Time-Critical Targets

    National Research Council Canada - National Science Library

    Lewis, Jerry

    2001-01-01

    .... While DOD has developed and fielded considerable capability to detect, assess, and attack most fixed enemy targets, experiences in the Persian Gulf and more recently in Kosovo revealed that DOD...

  18. ATTACK WARNING: Costs to Modernize NORAD's Computer System Significantly Understated

    National Research Council Canada - National Science Library

    Cross, F

    1991-01-01

    ...) Integrated Tactical Warning and Attack Assessment (ITW/AA) system. These subsystems provide critical strategic surveillance and attack warning and assessment information to United States and Canadian leaders...

  19. Consciousness in Non-Epileptic Attack Disorder

    OpenAIRE

    Reuber, M.; Kurthen, M.

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of\\ud consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research\\ud literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context\\ud of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consci...

  20. Semantic Identification Attacks on Web Browsing

    OpenAIRE

    Guha, Neel

    2016-01-01

    We introduce a Semantic Identification Attack, in which an adversary uses semantic signals about the pages visited in one browsing session to identify other browsing sessions launched by the same user. This attack allows an adver- sary to determine if two browsing sessions originate from the same user regardless of any measures taken by the user to disguise their browser or network. We use the MSNBC Anonymous Browsing data set, which contains a large set of user visits (labeled by category) t...

  1. Panic Attack History and Smoking Topography

    Science.gov (United States)

    Farris, Samantha G.; Brown, Lily A.; Goodwin, Renee D.; Zvolensky, Michael J.

    2016-01-01

    Background Little is known about panic attacks and puffing topography, a behavioral index of the value of smoking reinforcement. This study examined smoking style during the course of smoking of a single cigarette among adult daily smokers with and without a history of panic attacks. Method Participants (n = 124, Mage = 43.9, SD = 9.7; 44.4% female) were non-treatment seeking daily smokers. Lifetime panic attack history was assessed via diagnostic assessment; 28.2% (n = 35) of the sample had a panic attack history. Participants smoked one cigarette during an ad libitum smoking trial. Puff volume, duration, and inter-puff interval were measured using the Clinical Research Support System (CReSS) pocket device. Results Regression analyses revealed that panic attack status was not associated with significant differences in average puff volume, duration, or inter-puff interval. Multi-level modeling was used to examine puffing trajectories. Puff-level data revealed that there was a significant quadratic time x panic effect for puff volume and duration. Those with a panic attack history demonstrated relatively sustained levels of both puff volume and duration over time, whereas those without a history of panic attacks demonstrated an increase followed by a decrease in volume and duration over time. These effects were not accounted for by the presence of general psychopathology. Discussion Smokers with a panic attack history demonstrate more persistent efforts to self-regulate the delivery of nicotine, and thus may be at risk for continued smoking and dependence. Tailored treatment may be needed to address unique vulnerabilities among this group. PMID:28033542

  2. Attack by Pyemotes johnmoseri (Acari: Pyemotidae)

    Science.gov (United States)

    Tulin Askit; Ibrahim Cakmak; John Moser

    2007-01-01

    The Aegean Region of Turkey is one of the largest dried fig producers in the world. A Turkish cultivar sarilop (Ficus carica cv. Calimyrna L.) possesses good qualities for drying process, and has been grown extensively for many years in Turkey. Hypoborus ficus is the most common xylophagous insect attacking fig trees in Aydin (Aks¸it et al. 2003). This pest attacks...

  3. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  4. Vulnerability Assessment of IPv6 Websites to SQL Injection and Other Application Level Attacks

    Directory of Open Access Journals (Sweden)

    Ying-Chiang Cho

    2013-01-01

    Full Text Available Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out.

  5. Vulnerability assessment of IPv6 websites to SQL injection and other application level attacks.

    Science.gov (United States)

    Cho, Ying-Chiang; Pan, Jen-Yi

    2013-01-01

    Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out.

  6. Intrusion detection in cloud computing based attack patterns and risk assessment

    Directory of Open Access Journals (Sweden)

    Ben Charhi Youssef

    2017-05-01

    Full Text Available This paper is an extension of work originally presented in SYSCO CONF.We extend our previous work by presenting the initial results of the implementation of intrusion detection based on risk assessment on cloud computing. The idea focuses on a novel approach for detecting cyber-attacks on the cloud environment by analyzing attacks pattern using risk assessment methodologies. The aim of our solution is to combine evidences obtained from Intrusion Detection Systems (IDS deployed in a cloud with risk assessment related to each attack pattern. Our approach presents a new qualitative solution for analyzing each symptom, indicator and vulnerability analyzing impact and likelihood of distributed and multi-steps attacks directed to cloud environments. The implementation of this approach will reduce the number of false alerts and will improve the performance of the IDS.

  7. Combined Heuristic Attack Strategy on Complex Networks

    Directory of Open Access Journals (Sweden)

    Marek Šimon

    2017-01-01

    Full Text Available Usually, the existence of a complex network is considered an advantage feature and efforts are made to increase its robustness against an attack. However, there exist also harmful and/or malicious networks, from social ones like spreading hoax, corruption, phishing, extremist ideology, and terrorist support up to computer networks spreading computer viruses or DDoS attack software or even biological networks of carriers or transport centers spreading disease among the population. New attack strategy can be therefore used against malicious networks, as well as in a worst-case scenario test for robustness of a useful network. A common measure of robustness of networks is their disintegration level after removal of a fraction of nodes. This robustness can be calculated as a ratio of the number of nodes of the greatest remaining network component against the number of nodes in the original network. Our paper presents a combination of heuristics optimized for an attack on a complex network to achieve its greatest disintegration. Nodes are deleted sequentially based on a heuristic criterion. Efficiency of classical attack approaches is compared to the proposed approach on Barabási-Albert, scale-free with tunable power-law exponent, and Erdős-Rényi models of complex networks and on real-world networks. Our attack strategy results in a faster disintegration, which is counterbalanced by its slightly increased computational demands.

  8. [Clinical pathway for management of patients with acute asthma attack].

    Science.gov (United States)

    Azuma, Naoto; Katada, Yoshinori; Kobayashi, Masaaki; Kojima, Makiko; Nakajima, Yumi; Shibano, Miyo; Tomita, Hitomi; Yamanaka, Takao; Harada, Yoshinori; Ishii, Taeko; Saeki, Yukihiko

    2008-11-01

    There have been few reports of clinical pathway (CP) for treatment of asthma attack, because patients with asthma always admit emergently and the severity varies. We introduced CP so that standard asthma treatment can be widely used, and investigated its clinical usefulness. We designed a new CP for treating asthma attack according to the guideline (Japanese guideline (JGL) and Global Initiative for Asthma (GINA)). 136 patients who admitted to our hospital due to asthma attack from January 1999 to November 2006, were enrolled our study. Excluding cases complicated with pneumonia, COPD or cardiac failure, we evaluated 46 cases treated with the CP comparing with 19 cases treated without the CP. The clinical evaluations include systemic and inhaled steroid use, FEV1.0%, history of asthma, and the duration of asthma attack. Furthermore, we investigated difference between cases with and without prolonged admission. While the rates of systemic and inhaled steroid use in cases without the CP were 57.9% and 52.6% respectively, those in cases with the CP were approximately 100%. Employing the CP, FEV 1.0% at discharge time was elevated from 71.7% to 76.3% and the duration of hospitalization was shortened from 14.2 days to 11.5 days. Mean age of the cases with prolonged admission was higher than the rest. The asthma CP is an effective way for the standard treatment according to the guideline to be used widely even by doctors who are not familiar with asthma treatment. It improves the efficacy of in-hospital treatment.

  9. Guideline on management of the acute asthma attack in children by Italian Society of Pediatrics.

    Science.gov (United States)

    Indinnimeo, Luciana; Chiappini, Elena; Miraglia Del Giudice, Michele

    2018-04-06

    Acute asthma attack is a frequent condition in children. It is one of the most common reasons for emergency department (ED) visit and hospitalization. Appropriate care is fundamental, considering both the high prevalence of asthma in children, and its life-threatening risks. Italian Society of Pediatrics recently issued a guideline on the management of acute asthma attack in children over age 2, in ambulatory and emergency department settings. The Grading of Recommendations Assessment, Development, and Evaluation (GRADE) methodology was adopted. A literature search was performed using the Cochrane Library and Medline/PubMed databases, retrieving studies in English or Italian and including children over age 2 year. Inhaled ß 2 agonists are the first line drugs for acute asthma attack in children. Ipratropium bromide should be added in moderate/severe attacks. Early use of systemic steroids is associated with reduced risk of ED visits and hospitalization. High doses of inhaled steroids should not replace systemic steroids. Aminophylline use should be avoided in mild/moderate attacks. Weak evidence supports its use in life-threatening attacks. Epinephrine should not be used in the treatment of acute asthma for its lower cost / benefit ratio, compared to β 2 agonists. Intravenous magnesium solphate could be used in children with severe attacks and/or forced expiratory volume1 (FEV1) lower than 60% predicted, unresponsive to initial inhaled therapy. Heliox could be administered in life-threatening attacks. Leukotriene receptor antagonists are not recommended. This Guideline is expected to be a useful resource in managing acute asthma attacks in children over age 2.

  10. Success in Science, Success in Collaboration

    Energy Technology Data Exchange (ETDEWEB)

    Johnston, Mariann R. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-08-25

    This is a series of four different scientific problems which were resolved through collaborations. They are: "Better flow cytometry through novel focusing technology", "Take Off®: Helping the Agriculture Industry Improve the Viability of Sustainable, Large-Production Crops", "The National Institutes of Health's Models of Infectious Disease Agent Study (MIDAS)", and "Expanding the capabilities of SOLVE/RESOLVE through the PHENIX Consortium." For each one, the problem is listed, the solution, advantages, bottom line, then information about the collaboration including: developing the technology, initial success, and continued success.

  11. Monetary policy during speculative attacks

    DEFF Research Database (Denmark)

    Bergman, Ulf Michael; Jellingsø, Mads

    2010-01-01

    when the interest rate defense is successful and prevented a currency crisis in the short-run. In addition, we add a risk premium and find that this increases the likelihood of a crisis, can help explain contagion, and that prospective capital controls will increase the likelihood that such controls......This paper extends the currency crises model of Aghion, Bacchetta and Banerjee (2000, 2001, 2004) in different directions. Our main result is that a tight monetary policy can have adverse effects beyond the short term and can potentially cause a currency crisis in the medium term, even in cases...

  12. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  13. Predicting Factors of Zone 4 Attack in Volleyball.

    Science.gov (United States)

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  14. Insights Into French Emergency Planning, Response, and Resilience Procedures From a Hospital Managerial Perspective Following the Paris Terrorist Attacks of Friday, November 13, 2015.

    Science.gov (United States)

    Ghanchi, Ali

    2016-10-01

    On Friday, November 13, 2015, Paris was subjected to a multiple terrorist attack that caused widespread carnage. Although French emergency planning, response, and resilience procedures (Plan Blanc) anticipated crisis management of a major incident, these had to be adapted to the local context of Pitié-Salpêtrière University Teaching Hospital. Health care workers had undergone Plan Blanc training and exercises and it was fortunate that such a drill had occurred on the morning of the attack. The procedures were observed to work well because this type of eventuality had been fully anticipated, and staff performance exceeded expectations owing to prior in-depth training and preparations. Staff performance was also facilitated by overwhelming staff solidarity and professionalism, ensuring the smooth running of crisis management and improving victim survival rates. Although lessons learned are ongoing, an initial debriefing of managers found organizational improvements to be made. These included improvements to the activation of Plan Blanc and how staff were alerted, bed management, emergency morgue facilities, and public relations. In conclusion, our preparations for an eventual terrorist attack on this unprecedented scale ensured a successful medical response. Even though anticipating the unthinkable is difficult, contingency plans are being made to face other possible terrorist threats including chemical or biological agents. (Disaster Med Public Health Preparedness. 2016;page 1 of 6).

  15. Does the aggressiveness of the prey modify the attack behavior of the predator Supputius cincticeps (Stål (Hemiptera, Pentatomidae?

    Directory of Open Access Journals (Sweden)

    Rafael Braga da Silva

    2012-06-01

    Full Text Available Does the aggressiveness of the prey modify the attack behavior of the predator Supputius cincticeps (Stål (Hemiptera, Pentatomidae? The stink bug Supputius cincticeps (Stål (Hemiptera, Pentatomidae is a predator found in several Brazilian regions, which possesses desirable attributes as a natural control agent and in biological control programs. The aim of this study was to test if the attack behavior and predation success of S. cincticeps were affected by prey species. Larvae of Tenebrio molitor (L. (Coleoptera, Tenebrionidae, Spodoptera frugiperda (J. E. Smith (Lepidoptera, Noctuidae, and Thyrinteina arnobia (Stoll (Lepidoptera, Geometridae were offered to S. cincticeps in laboratory bioassays where predatory attack and prey defensive behaviors were observed for 2-hour periods. The attack behavior of S. cincticeps changed with the prey species offered. More than 25% of T. molitor and S. frugiperda larvae were immediately attacked, but T. arnobia was not immediately attacked by S. cincticeps. Successful attack (i.e., successful insertion of the predator stylets into the prey depends on the region of the body attacked, with a greater proportion of successful attacks in the anterior than in the median or posterior regions. Larvae of T. arnobia and S. frugiperda displayed a sequence of abrupt head and body movements in response to S. cincticeps attack. Attempts of predation were more successful on T. molitor and S. frugiperda than on T. arnobia. Information about the differential attack behavior of S. cincticeps on different prey species is important for designing successful biological control programs using this hemipteran predator.

  16. Pathologic features of fatal shark attacks.

    Science.gov (United States)

    Byard, R W; Gilbert, J D; Brown, K

    2000-09-01

    To examine the pattern of injuries in cases of fatal shark attack in South Australian waters, the authors examined the files of their institution for all cases of shark attack in which full autopsies had been performed over the past 25 years, from 1974 to 1998. Of the seven deaths attributed to shark attack during this period, full autopsies were performed in only two cases. In the remaining five cases, bodies either had not been found or were incomplete. Case 1 was a 27-year-old male surfer who had been attacked by a shark. At autopsy, the main areas of injury involved the right thigh, which displayed characteristic teeth marks, extensive soft tissue damage, and incision of the femoral artery. There were also incised wounds of the right wrist. Bony injury was minimal, and no shark teeth were recovered. Case 2 was a 26-year-old male diver who had been attacked by a shark. At autopsy, the main areas of injury involved the left thigh and lower leg, which displayed characteristic teeth marks, extensive soft tissue damage, and incised wounds of the femoral artery and vein. There was also soft tissue trauma to the left wrist, with transection of the radial artery and vein. Bony injury was minimal, and no shark teeth were recovered. In both cases, death resulted from exsanguination following a similar pattern of soft tissue and vascular damage to a leg and arm. This type of injury is in keeping with predator attack from underneath or behind, with the most severe injuries involving one leg. Less severe injuries to the arms may have occurred during the ensuing struggle. Reconstruction of the damaged limb in case 2 by sewing together skin, soft tissue, and muscle bundles not only revealed that no soft tissue was missing but also gave a clearer picture of the pattern of teeth marks, direction of the attack, and species of predator.

  17. Successful ageing

    DEFF Research Database (Denmark)

    Kusumastuti, Sasmita; Derks, Marloes G. M.; Tellier, Siri

    2016-01-01

    . METHODS: We performed a novel, hypothesis-free and quantitative analysis of citation networks exploring the literature on successful ageing that exists in the Web of Science Core Collection Database using the CitNetExplorer software. Outcomes were visualized using timeline-based citation patterns...... himself or an outsider judges the situation. These different points of view help to explain the disability paradox, as successful ageing lies in the eyes of the beholder....

  18. Know the Warning Signs of a Heart Attack

    Science.gov (United States)

    ... No. 22 Know the Warning Signs of a Heart Attack What is a heart attack? Aheart attack happens when the blood vessels that ... hurting your heart muscle. Another name for a heart attack is myocardial infarction, or MI. If you have ...

  19. 12 CFR 263.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  20. 12 CFR 509.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding....17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  1. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  2. Security attack detection algorithm for electric power gis system based on mobile application

    Science.gov (United States)

    Zhou, Chao; Feng, Renjun; Wang, Liming; Huang, Wei; Guo, Yajuan

    2017-05-01

    Electric power GIS is one of the key information technologies to satisfy the power grid construction in China, and widely used in power grid construction planning, weather, and power distribution management. The introduction of electric power GIS based on mobile applications is an effective extension of the geographic information system that has been widely used in the electric power industry. It provides reliable, cheap and sustainable power service for the country. The accurate state estimation is the important conditions to maintain the normal operation of the electric power GIS. Recent research has shown that attackers can inject the complex false data into the power system. The injection attack of this new type of false data (load integrity attack LIA) can successfully bypass the routine detection to achieve the purpose of attack, so that the control center will make a series of wrong decision. Eventually, leading to uneven distribution of power in the grid. In order to ensure the safety of the electric power GIS system based on mobile application, it is very important to analyze the attack mechanism and propose a new type of attack, and to study the corresponding detection method and prevention strategy in the environment of electric power GIS system based on mobile application.

  3. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  4. Panic Attack during Elective Gastrointestinal Endoscopy

    Directory of Open Access Journals (Sweden)

    Charalampos Mitsonis

    2011-01-01

    Full Text Available Background. Esophagogastroduodenoscopy (EGD and colonoscopy (CS can evoke anxiety, embarrassment, and discomfort. These concerns can culminate in panic attacks, which may traumatize patients and significantly decrease their compliance to the procedure. The objective of this study was to evaluate the relationship between preendoscopic anxiety and the possibility of a panic attack during an elective gastrointestinal endoscopy (EGE. Methods. The study population comprised of 79 Greek outpatients. The examination was carried out without the use of conscious sedation. Patients' anxiety levels were assessed before the procedure using the Greek version of the Spielberger State-Trait Anxiety Inventory (STAI-Y. Results. Seventy-nine patients were enrolled: 45 EGD and 34 CS. Females had higher state and trait anxiety levels than males (48.14 ± 7.94 versus 44.17 ± 7.43, <0.05; and 43.68 ± 6.95 versus 39.86 ± 7.46, <0.05. Patients who experienced panic attack had significantly higher levels of both trait and state anxiety, compared to those who were panic-free. There was no significant relationship between panic attacks and sex or type of procedure. Conclusions. Patients who experience panic attacks during endoscopic procedures appear to have significantly higher anxiety levels before the procedure. Administering the STAI questionnaire prior to the endoscopy seems to be a useful screening method for vulnerable patients.

  5. CTC Sentinel. Special Issue, January 2010. AQAP in Yemen and the Christmas Day Terrorist Attack

    Science.gov (United States)

    2010-01-01

    Successes Reveal Al-Qa`ida’s Composition The September 2006 attacks were most likely planned and organized by Fawaz al-Rubay`i, who was killed by Yemeni...pressure on remaining al-Qa`ida cells, helping to flush them out into the open. Despite these choreographed moves, the Tarim raid and the events that

  6. Forcing attacks of western pine beetles to test resistance of pines

    Science.gov (United States)

    Richard H. Smith

    1967-01-01

    Success--defined as oviposition or tree-killing--was obtained by attracting western pine beetles to groups of pines with natural attractants and by en-massed forced attacks on individual trees combined with either physical or biological stress. Preliminary results show considerable agreement with laboratory tests of vapor toxicity.

  7. Impact of the September 11th Terrorist Attacks on Teenagers' Mental Health

    Science.gov (United States)

    Gould, Madelyn S.; Munfakh, Jimmie Lou Harris; Kleinman, Marjorie; Lubell, Keri; Provenzano, Danielle

    2004-01-01

    The impact of the September 11th terrorist attacks on adolescents' mental health is reported. Two successive cohorts of students in 6 New York state high schools, identified from health courses, completed an in-school self-report baseline assessment of hopelessness, impairment, and help-seeking behavior. One year later, these students completed a…

  8. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

    Directory of Open Access Journals (Sweden)

    Željko Gavrić

    2018-01-01

    Full Text Available Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.

  9. Attack-tolerant networked control system: an approach for detection the controller stealthy hijacking attack

    Science.gov (United States)

    Atta Yaseen, Amer; Bayart, Mireille

    2017-01-01

    In this work, a new approach will be introduced as a development for the attack-tolerant scheme in the Networked Control System (NCS). The objective is to be able to detect an attack such as the Stuxnet case where the controller is reprogrammed and hijacked. Besides the ability to detect the stealthy controller hijacking attack, the advantage of this approach is that there is no need for a priori mathematical model of the controller. In order to implement the proposed scheme, a specific detector for the controller hijacking attack is designed. The performance of this scheme is evaluated be connected the detector to NCS with basic security elements such as Data Encryption Standard (DES), Message Digest (MD5), and timestamp. The detector is tested along with networked PI controller under stealthy hijacking attack. The test results of the proposed method show that the hijacked controller can be significantly detected and recovered.

  10. Security Analysis of 7-Round MISTY1 against Higher Order Differential Attacks

    Science.gov (United States)

    Tsunoo, Yukiyasu; Saito, Teruo; Shigeri, Maki; Kawabata, Takeshi

    MISTY1 is a 64-bit block cipher that has provable security against differential and linear cryptanalysis. MISTY1 is one of the algorithms selected in the European NESSIE project, and it has been recommended for Japanese e-Government ciphers by the CRYPTREC project. This paper shows that higher order differential attacks can be successful against 7-round versions of MISTY1 with FL functions. The attack on 7-round MISTY1 can recover a partial subkey with a data complexity of 254.1 and a computational complexity of 2120.8, which signifies the first successful attack on 7-round MISTY1 with no limitation such as a weak key. This paper also evaluates the complexity of this higher order differential attack on MISTY1 in which the key schedule is replaced by a pseudorandom function. It is shown that resistance to the higher order differential attack is not substantially improved even in 7-round MISTY1 in which the key schedule is replaced by a pseudorandom function.

  11. Liability for damage caused by terrorist attacks

    International Nuclear Information System (INIS)

    Heller, W.

    2004-01-01

    After the terrorist attacks on September 11, 2001, one of the questions raised was about the potential liability of the operator of a nuclear power plant for damage sustained by a third party as a result of a comparable terrorist attack on a nuclear power plant. Internationally, this situation is regulated by the Convention on Third-Party Liability in Nuclear Power, the so-called Paris Liability Convention, of 1960, 1964, 1982. Among other things, that Convention excludes liability in cases directly resulting form 'actions of armed conflict..'. The problem arises, among other things, from the absence of an internationally acknowledged definition of terrorism or terrorist attack, and from the idea that, according to the Paris Convention, the legal entities assumed to be involved in such actions are states and weapons. National and international agreements and laws about the liability of the operator of nuclear facility for damage to third parties as a result of terrorist actions are analyzed and discussed. (orig.)

  12. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria

    2014-01-01

    and wireless networks. All these schemes use well-established and secure components such as the AES, Grain-like NFSRs, ChaCha and SipHash as their building blocks. However, we discover key recovery attacks for all three designs, featuring square-root complexities. Using a key collision technique, we can...... recover the secret key of AVALANCHE in 2n/2, where n 2∈ {28; 192; 256} is the key length. This technique also applies to the authentication part of Calico whose 128-bit key can be recovered in 264 time. For RBS, we can recover its full 132-bit key in 265 time with a guess-and-determine attack. All attacks...

  13. Discovering Collaborative Cyber Attack Patterns Using Social Network Analysis

    Science.gov (United States)

    Du, Haitao; Yang, Shanchieh Jay

    This paper investigates collaborative cyber attacks based on social network analysis. An Attack Social Graph (ASG) is defined to represent cyber attacks on the Internet. Features are extracted from ASGs to analyze collaborative patterns. We use principle component analysis to reduce the feature space, and hierarchical clustering to group attack sources that exhibit similar behavior. Experiments with real world data illustrate that our framework can effectively reduce from large dataset to clusters of attack sources exhibiting critical collaborative patterns.

  14. Successful ageing

    DEFF Research Database (Denmark)

    Bülow, Morten Hillgaard; Söderqvist, Thomas

    2014-01-01

    Since the late 1980s, the concept of ‘ successful ageing’ has set the frame for discourse about contemporary ageing research. Through an analysis of the reception to John W. Rowe and Robert L. Kahn's launch of the concept of ‘ successful ageing’ in 1987, this article maps out the important themes...... strategies; and the importance of individual, societal and scientific conceptualisations and understandings of ageing. By presenting an account of the recent historical uses, interpretations and critiques of the concept, the article unfolds the practical and normative complexities of ‘ successful ageing’....... and discussions that have emerged from the interdisciplinary field of ageing research. These include an emphasis on interdisciplinarity; the interaction between biology, psycho-social contexts and lifestyle choices; the experiences of elderly people; life-course perspectives; optimisation and prevention...

  15. Citation Success

    DEFF Research Database (Denmark)

    Vaio, Gianfranco Di; Waldenström, Daniel; Weisdorf, Jacob Louis

    2012-01-01

    This study examines the determinants of citation success among authors who have recently published their work in economic history journals. Besides offering clues about how to improve one's scientific impact, our citation analysis also sheds light on the state of the field of economic history....... Consistent with our expectations, we find that full professors, authors appointed at economics and history departments, and authors working in Anglo-Saxon and German countries are more likely to receive citations than other scholars. Long and co-authored articles are also a factor for citation success. We...... find similar patterns when assessing the same authors' citation success in economics journals. As a novel feature, we demonstrate that the diffusion of research — publication of working papers, as well as conference and workshop presentations — has a first-order positive impact on the citation rate....

  16. Playing Attack and Defense with Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe; Bouganim, Luc

    2014-01-01

    It is often convenient to assume in a data management platform that one or several computing devices are trusted, specially when the goal is to provide privacy guarantees over personal data. But what does it take for a computing device to be trusted? More specifically, how can a personal device...... provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service...... running on a secure device, than to attack the same service running on a general purpose device....

  17. Attacks and infections in percolation processes

    International Nuclear Information System (INIS)

    Janssen, Hans-Karl; Stenull, Olaf

    2017-01-01

    We discuss attacks and infections at propagating fronts of percolation processes based on the extended general epidemic process. The scaling behavior of the number of the attacked and infected sites in the long time limit at the ordinary and tricritical percolation transitions is governed by specific composite operators of the field-theoretic representation of this process. We calculate corresponding critical exponents for tricritical percolation in mean-field theory and for ordinary percolation to 1-loop order. Our results agree well with the available numerical data. (paper)

  18. Characteristics of Successful Entrepreneurs.

    Science.gov (United States)

    McClelland, David C.

    1987-01-01

    Comparison of characteristics of 12 average and 12 superior small business people in three developing nations (India, Malawi, and Ecuador) found proactive qualities such as initiative and assertiveness, achievement orientation, and commitment to others characteristic of successful entrepreneurs. Other expected qualities (self-confidence,…

  19. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Ahmed, Z.; Nazir, B.; Zafar, M.F.; Anwar, M.M.; Azam, K.; Asar, A.U.

    2007-01-01

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  20. Successful modeling?

    Science.gov (United States)

    Lomnitz, Cinna

    Tichelaar and Ruff [1989] propose to “estimate model variance in complicated geophysical problems,” including the determination of focal depth in earthquakes, by means of unconventional statistical methods such as bootstrapping. They are successful insofar as they are able to duplicate the results from more conventional procedures.

  1. Citation Success

    DEFF Research Database (Denmark)

    Di Vaio, Gianfranco; Waldenström, Daniel; Weisdorf, Jacob Louis

    This study analyses determinants of citation success among authors publishing in economic history journals. Bibliometric features, like article length and number of authors, are positively correlated with the citation rate up to a certain point. Remarkably, publishing in top-ranked journals hardl...

  2. Project Success.

    Science.gov (United States)

    Baehr, Rufus F.

    This report reviews the remedial education program--Project Success--at the Urban Education Center, City Colleges of Chicago (Illinois). The major features of the program are outlined and its operation and evaluation are discussed. Student performance and characteristics are then tabularly compared, based on their groupings as…

  3. Insider Threat: Preventing Direct Action Attacks Within the United States Army

    Science.gov (United States)

    2017-06-09

    of Other Actions Available to Commanders .............................55 Table 8. TARP Indicators of Potential International Terrorist-Associated...effectively prevent direct action attacks by insider threats? What actions are available to commanders who identify potential insider threats within... actions are available to commanders who identify potential insider threats within their organizations? As an initial research hypothesis the author

  4. Medical Errors Reduction Initiative

    National Research Council Canada - National Science Library

    Mutter, Michael L

    2005-01-01

    The Valley Hospital of Ridgewood, New Jersey, is proposing to extend a limited but highly successful specimen management and medication administration medical errors reduction initiative on a hospital-wide basis...

  5. Afghanistan: Green-on-Blue Attacks

    Science.gov (United States)

    2013-05-02

    killing infidels in their land. In order to mitigate attacks within the ANSF embedded Afghan intelligence agents to watch for any ANA soldier or ANP...said, “Americans use the word f--k all the time.” 37 Many Afghan troops take the meaning sexually , not as a meaningless expletive, the understanding

  6. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Increased frequency and intensity of DoS/DDoS. Few Gbps is now normal; Anonymous VPNs being used; Botnets being used as a vehicle for launching DDoS attacks. Large scale booking of domain names. Hundred thousands of domains registered in short duration via few registrars; Single registrant; Most of the domains ...

  7. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Stux, DuQu, Nitro, Luckycat, Exploit Kits, FLAME. ADSL/SoHo Router Compromise. Botnets of compromised ADSL/SoHo Routers; User Redirection via malicious DNS entry. Web Application attacks. SQL Injection, RFI etc. More and more Webshells. More utility to hackers; Increasing complexity and evading mechanisms.

  8. Attack Classification Schema for Smart City WSNs

    Directory of Open Access Journals (Sweden)

    Victor Garcia-Font

    2017-04-01

    Full Text Available Urban areas around the world are populating their streets with wireless sensor networks (WSNs in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  9. Attack Classification Schema for Smart City WSNs.

    Science.gov (United States)

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2017-04-05

    Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  10. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  11. Sequential and Parallel Attack Tree Modelling

    NARCIS (Netherlands)

    Arnold, Florian; Guck, Dennis; Kumar, Rajesh; Stoelinga, Mariëlle Ida Antoinette; Koornneef, Floor; van Gulijk, Coen

    The intricacy of socio-technical systems requires a careful planning and utilisation of security resources to ensure uninterrupted, secure and reliable services. Even though many studies have been conducted to understand and model the behaviour of a potential attacker, the detection of crucial

  12. Wrap-Attack Pack: Product Packaging Exercise

    Science.gov (United States)

    Lee, Seung Hwan; Hoffman, K. Douglas

    2016-01-01

    Although many marketing courses discuss traditional concepts pertaining to product strategy, concepts specifically relating to packaging are often glossed over. This exercise, "Wrap-Attack Pack," teaches students about the utilitarian and hedonic design elements of packaging. More specifically, the primary objective is to creatively…

  13. Shark Attack! Sinking Your Teeth into Anatomy.

    Science.gov (United States)

    House, Herbert

    2002-01-01

    Presents a real life shark attack story and studies arm reattachment surgery to teach human anatomy. Discusses how knowledge of anatomy can be put to use in the real world and how the arm functions. Includes teaching notes and suggestions for classroom management. (YDS)

  14. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the…

  15. Fighting Through a Logistics Cyber Attack

    Science.gov (United States)

    2015-06-19

    Infiltrating GATES ............................................................................................................ 19 SCADA Vulnerability...not adequately protected; there isn’t sufficient guidance, or funding allocated to the security of our Supervisory Control and Data Acquisition ( SCADA ...attack against a vital system such as GATES, and instead focus her efforts on a less secure more conspicuous system 6 such as the SCADA systems

  16. Strengthening Crypto-1 Cipher Against Algebraic Attacks

    Directory of Open Access Journals (Sweden)

    Farah Afianti

    2015-08-01

    Full Text Available In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. In order to strengthen Crypto-1 against SAT solver attacks, a modification of the feedback function with better cryptographic properties is proposed. It applies a primitive polynomial companion matrix. SAT solvers cannot directly attack the feedback shift register that uses the modified Boolean feedback function, the register has to be split into smaller groups. Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function. In addition, another modified Crypto-1, using the modified feedback function and a modified filter function, had the lowest percentage of revealed variables. It can be concluded that the security strength and performance of the modified Crypto-1 using the modified feedback function and the modified filter function are better than those of the original Crypto-1.

  17. Intrusion-Tolerant Replication under Attack

    Science.gov (United States)

    Kirsch, Jonathan

    2010-01-01

    Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…

  18. Rhode Island School Terrorist Attack Preparedness

    Science.gov (United States)

    Dube, Michael W. M.

    2012-01-01

    This study examined the state of safety and terrorist attack preparedness in Rhode Island Schools as determined by Rhode Island school leader perceptions. The study is descriptive in nature as it gathers data to describe a particular event or situation. Using a researcher generated survey based on terrorist preparedness guidelines and suggestions…

  19. Modeling of Aggregate Attacks on Complex Networks

    Directory of Open Access Journals (Sweden)

    F. Galindo

    2010-09-01

    Full Text Available An order factor in combinations of random and targeted attacks on modern scale free network model has been explored. Protection concepts based on timely restructuring of topologies have been discussed. Vulnerability parameter defined by investment value has been introduced, and protection financing strategies depending on node connectivity has been analyzed.

  20. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Few Gbps is now normal; Anonymous VPNs being used; Botnets being used as a vehicle for launching DDoS attacks ... Single registrant; Most of the domains kept unresolved; Mostly being used for spamming and malware distribution; Many domains are listed as malicious; Poor process control by Domain Registrars.

  1. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They represent in an intuitive, graphical way the interaction between an attacker and a defender who compete in order to achieve conflicting objectives. We propose a novel framework for the formal...... analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack......-defence trees to two-player stochastic games, and then employ probabilistic model checking techniques to formally analyse these models. This provides a means to both verify formally specified security properties of the attack-defence scenarios and, dually, to synthesise strategies for attackers or defenders...

  2. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2016-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations...... that helps in structuring attack identification and can integrate physical, virtual, and social components. These models form a solid basis for guiding the manual identification of attack scenarios. Their main benefit, however, is in the analytic generation of attacks. In this work we present a systematic...... approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  3. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  4. Error and attack vulnerability of temporal networks

    Science.gov (United States)

    Trajanovski, S.; Scellato, S.; Leontiadis, I.

    2012-06-01

    The study of real-world communication systems via complex network models has greatly expanded our understanding on how information flows, even in completely decentralized architectures such as mobile wireless networks. Nonetheless, static network models cannot capture the time-varying aspects and, therefore, various temporal metrics have been introduced. In this paper, we investigate the robustness of time-varying networks under various failures and intelligent attacks. We adopt a methodology to evaluate the impact of such events on the network connectivity by employing temporal metrics in order to select and remove nodes based on how critical they are considered for the network. We also define the temporal robustness range, a new metric that quantifies the disruption caused by an attack strategy to a given temporal network. Our results show that in real-world networks, where some nodes are more dominant than others, temporal connectivity is significantly more affected by intelligent attacks than by random failures. Moreover, different intelligent attack strategies have a similar effect on the robustness: even small subsets of highly connected nodes act as a bottleneck in the temporal information flow, becoming critical weak points of the entire system. Additionally, the same nodes are the most important across a range of different importance metrics, expressing the correlation between highly connected nodes and those that trigger most of the changes in the optimal information spreading. Contrarily, we show that in randomly generated networks, where all the nodes have similar properties, random errors and intelligent attacks exhibit similar behavior. These conclusions may help us in design of more robust systems and fault-tolerant network architectures.

  5. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim.

  6. Risk factors of transient ischemic attack: An overview

    Directory of Open Access Journals (Sweden)

    Supreet Khare

    2016-01-01

    Full Text Available Transient ischemic attack (TIA is a transient episode of neurologic dysfunction caused due to loss of blood flow to the brain or spinal cord without acute infarction. Depending on the area of the brain involved, symptoms of TIA vary widely from patient to patient. Since the blockage period in TIA is very short-lived, there is no permanent damage. Risk factors for TIA include family history of stroke or TIA, age above 55 years or older, higher risk of TIA in males than females, high blood pressure, diabetes mellitus, and tobacco smoking. Genetics, race, and imbalance in lipid profile are other risk factors of TIA. TIA is usually diagnosed after taking a thorough history and a physical examination. Several radiological tests such as computed tomography and magnetic resonance imaging are useful in the evaluation of patients who have had a TIA. Ultrasound of the neck and an echocardiogram of the heart are other tests useful in the diagnosis and evaluation of the attack. The treatment following acute recovery from a TIA depends on the underlying cause. Patients who have more than 70% stenosis of the carotid artery, removal of atherosclerotic plaque is usually done by carotid endarterectomy surgery. One-third of the people with TIA can later have recurrent TIAs and one-third can have a stroke because of permanent nerve cell loss. Having a TIA is a risk factor for eventually having a stroke. Educating the patients and inculcating lifestyle modifications in them are initial steps to minimize the prevalence of transient ischemic attack.

  7. Successful aging.

    Science.gov (United States)

    Vaillant, G E; Mukamal, K

    2001-06-01

    Until now, prospective studies of aging have begun with 50-60-year-olds, not adolescents. Premature death, childhood variables, and alcohol abuse have been often ignored, as has successful aging. The authors reviewed the existing literature on health in late life in order to highlight that, increasingly, successful aging is not an oxymoron. The present study followed two cohorts of adolescent boys (237 college students and 332 core-city youth) for 60 years or until death. Complete physical examinations were obtained every 5 years and psychosocial data every 2 years. Predictor variables assessed before age 50 included six variables reflecting uncontrollable factors: parental social class, family cohesion, major depression, ancestral longevity, childhood temperament, and physical health at age 50 and seven variables reflecting (at least some) personal control: alcohol abuse, smoking, marital stability, exercise, body mass index, coping mechanisms, and education. The six outcome variables chosen to assess successful aging at age 70-80 included four objectively assessed variables (physical health, death and disability before age 80, social supports, and mental health) and two self-rated variables (instrumental activities of daily living and life enjoyment). Multivariate analysis suggested that "good" and "bad" aging from age 70-80 could be predicted by variables assessed before age 50. More hopeful still, if the seven variables under some personal control were controlled, depression was the only uncontrollable predictor variable that affected the quality of subjective and objective aging. One may have greater personal control over one's biopsychosocial health after retirement than previously recognized.

  8. Modelling Social-Technical Attacks with Timed Automata

    DEFF Research Database (Denmark)

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof

    2015-01-01

    Attacks on a system often exploit vulnerabilities that arise from human behaviour or other human activity. Attacks of this type, so-called socio-technical attacks, cover everything from social engineering to insider attacks, and they can have a devastating impact on an unprepared organisation....... In this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible attacks...

  9. Discussion on protection and intervention actions in aftermath of a 'dirty bomb' attack

    International Nuclear Information System (INIS)

    Liu Liye; Zeng Zhi; Li Junli

    2009-01-01

    'Dirty bomb' attack differs from nuclear or radiological accidents in respects of occurrence site, radioactivity release mode and radiation effect scope. It would take place in densely populated downtown, with abruptness and uncertainty. This paper focuses on protection of initial respondors and some considerations in relation to protection and intervention actions in shelter and evacuation. Emphasis is placed on initial determination of emergency zone, devision of inner and outer alert area, and public protection measures, alongside the necessary suggestions recommended. (authors)

  10. Effects of Motivation: Rewarding Hackers for Undetected Attacks Cause Analysts to Perform Poorly.

    Science.gov (United States)

    Maqbool, Zahid; Makhijani, Nidhi; Pammi, V S Chandrasekhar; Dutt, Varun

    2017-05-01

    The aim of this study was to determine how monetary motivations influence decision making of humans performing as security analysts and hackers in a cybersecurity game. Cyberattacks are increasing at an alarming rate. As cyberattacks often cause damage to existing cyber infrastructures, it is important to understand how monetary rewards may influence decision making of hackers and analysts in the cyber world. Currently, only limited attention has been given to this area. In an experiment, participants were randomly assigned to three between-subjects conditions ( n = 26 for each condition): equal payoff, where the magnitude of monetary rewards for hackers and defenders was the same; rewarding hacker, where the magnitude of monetary reward for hacker's successful attack was 10 times the reward for analyst's successful defense; and rewarding analyst, where the magnitude of monetary reward for analyst's successful defense was 10 times the reward for hacker's successful attack. In all conditions, half of the participants were human hackers playing against Nash analysts and half were human analysts playing against Nash hackers. Results revealed that monetary rewards for human hackers and analysts caused a decrease in attack and defend actions compared with the baseline. Furthermore, rewarding human hackers for undetected attacks made analysts deviate significantly from their optimal behavior. If hackers are rewarded for their undetected attack actions, then this causes analysts to deviate from optimal defend proportions. Thus, analysts need to be trained not become overenthusiastic in defending networks. Applications of our results are to networks where the influence of monetary rewards may cause information theft and system damage.

  11. Security strategy of powered-off SRAM for resisting physical attack to data remanence

    International Nuclear Information System (INIS)

    Yu Kai; Zou Xuecheng; Yu Guoyi; Wang Weixu

    2009-01-01

    This paper presents a security strategy for resisting a physical attack utilizing data remanence in powered-off static random access memory (SRAM). Based on the mechanism of physical attack to data remanence, the strategy intends to erase data remanence in memory cells once the power supply is removed, which disturbs attackers trying to steal the right information. Novel on-chip secure circuits including secure power supply and erase transistor are integrated into conventional SRAM to realize erase operation. Implemented in 0.25 μm Huahong-NEC CMOS technology, an SRAM exploiting the proposed security strategy shows the erase operation is accomplished within 0.2 μs and data remanence is successfully eliminated. Compared with conventional SRAM, the retentive time of data remanence is reduced by 82% while the operation power consumption only increases by 7%.

  12. Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Popovsky, Barbara; Narvaez Suarez, Julia F.; Seifert, Christian; Frincke, Deborah A.; O' Neil, Lori R.; Aval, Chiraag U.

    2009-07-24

    This paper presents the application of deception theory to improve the success of client honeypots at detecting malicious web page attacks from infected servers programmed by online criminals to launch drive-by-download attacks. The design of honeypots faces three main challenges: deception, how to design honeypots that seem real systems; counter-deception, techniques used to identify honeypots and hence defeating their deceiving nature; and counter counter-deception, how to design honeypots that deceive attackers. The authors propose the application of a deception model known as the deception planning loop to identify the current status on honeypot research, development and deployment. The analysis leads to a proposal to formulate a landscape of the honeypot research and planning of steps ahead.

  13. Helicobacter pylori infection as a triggering factor of attacks in patients with hereditary angioedema

    DEFF Research Database (Denmark)

    Visy, Beáta; Füst, George; Bygum, Anette

    2007-01-01

    BACKGROUND: Helicobacter pylori infection is considered among the causative factors of urticaria and angioedema. Having conducted a study on 65 patients, Hungarian authors reported in 2001 that successful eradication of H. pylori is followed by a significant reduction in the number of attacks...... in patients with hereditary angioedema (HAE). The present study aimed to reinvestigate the relationship between H. pylori infection and the attack rate in the framework of an international collaborative study. MATERIALS AND METHODS: Within the framework of the PREHAEAT project launched by the European Union......, further 152 patients were studied in seven collaborating centers, and participants of the earlier study were followed up in order to detect any relationship between H. pylori infection and the occurrence of attacks in patients suffered from HAE. RESULTS: The proportion of patients experiencing frequent...

  14. Effects of Angle of Attack and Velocity on Trailing Edge Noise

    Science.gov (United States)

    Hutcheson, Florence V.; Brooks, Thomas F.

    2006-01-01

    Trailing edge (TE) noise measurements for a NACA 63-215 airfoil model are presented, providing benchmark experimental data for a cambered airfoil. The effects of flow Mach number and angle of attack of the airfoil model with different TE bluntnesses are shown. Far-field noise spectra and directivity are obtained using a directional microphone array. Standard and diagonal removal beamforming techniques are evaluated employing tailored weighting functions for quantitatively accounting for the distributed line character of TE noise. Diagonal removal processing is used for the primary database as it successfully removes noise contaminates. Some TE noise predictions are reported to help interpret the data, with respect to flow speed, angle of attack, and TE bluntness on spectral shape and peak levels. Important findings include the validation of a TE noise directivity function for different airfoil angles of attack and the demonstration of the importance of the directivity function s convective amplification terms.

  15. Elimination of medically intractable epileptic drop attacks following endoscopic total corpus callosotomy in Rett syndrome.

    Science.gov (United States)

    Ueda, Keisuke; Sood, Sandeep; Asano, Eishi; Kumar, Ajay; Luat, Aimee F

    2017-11-01

    Rett syndrome is a neurodevelopmental genetic disorder, characterized by developmental delay, hand stereotypies, abnormal gait, and acquired microcephaly. Epilepsy is very common in Rett syndrome and can be medically intractable. It remains uncertain if a patient with epileptic drop attacks associated with this genetic disease can benefit from corpus callosotomy. We report an 8-year-old girl with Rett syndrome and medically intractable epileptic drop attacks who underwent endoscopic total corpus callosotomy without any complications that led to the successful elimination of her seizures. Total corpus callosotomy is a feasible treatment option for medically intractable epileptic drop attacks in Rett syndrome and should not be considered as a contraindication in this condition. This is the first reported case of corpus callosotomy in Rett syndrome.

  16. Robust multiple frequency multiple power localization schemes in the presence of multiple jamming attacks.

    Directory of Open Access Journals (Sweden)

    Ahmed Abdulqader Hussein

    Full Text Available Localization of the wireless sensor network is a vital area acquiring an impressive research concern and called upon to expand more with the rising of its applications. As localization is gaining prominence in wireless sensor network, it is vulnerable to jamming attacks. Jamming attacks disrupt communication opportunity among the sender and receiver and deeply impact the localization process, leading to a huge error of the estimated sensor node position. Therefore, detection and elimination of jamming influence are absolutely indispensable. Range-based techniques especially Received Signal Strength (RSS is facing severe impact of these attacks. This paper proposes algorithms based on Combination Multiple Frequency Multiple Power Localization (C-MFMPL and Step Function Multiple Frequency Multiple Power Localization (SF-MFMPL. The algorithms have been tested in the presence of multiple types of jamming attacks including capture and replay, random and constant jammers over a log normal shadow fading propagation model. In order to overcome the impact of random and constant jammers, the proposed method uses two sets of frequencies shared by the implemented anchor nodes to obtain the averaged RSS readings all over the transmitted frequencies successfully. In addition, three stages of filters have been used to cope with the replayed beacons caused by the capture and replay jammers. In this paper the localization performance of the proposed algorithms for the ideal case which is defined by without the existence of the jamming attack are compared with the case of jamming attacks. The main contribution of this paper is to achieve robust localization performance in the presence of multiple jamming attacks under log normal shadow fading environment with a different simulation conditions and scenarios.

  17. The 2009 Sydney shark attacks: case series and literature review.

    Science.gov (United States)

    Rtshiladze, Michael Alexander; Andersen, Sean Peter; Nguyen, Dai Quoc Anh; Grabs, Anthony; Ho, Kevin

    2011-05-01

    There were 59 unprovoked shark attacks worldwide in 2008. Twelve of these occurred in Australia, ranking it as second only to the USA. In February 2009, two attacks occurred within 72 h in Sydney, Australia. The two patients involved survived severe limb trauma. Case 1 suffered bite trauma to the lower limb and hand and underwent staged debridement and early amputation. Case 2 presented with a hand severed at the level of the wrist that was initially replanted. However, it would succumb to progressive necrosis after 12 days. We discuss the aspects of these cases that contributed to the patients' survival and ultimately good functional outcomes. New paradigms for the management of major trauma patients have emerged over the last decade. We consider recent advances in the understanding of pre-hospital tourniquet use, rapid transit to the operating suite and damage control surgery, and examine how they impacted on the management of our patients. Very little is known about the microbiology of shark bites. Organisms from sea water, the patient's skin and the shark's mouth must all be considered when selecting appropriate antimicrobial prophylaxis. The planning of definitive surgery in severe limb trauma is dependent on the interactions of a number of factors including physical, psychological and social issues. The decision to ultimately replant or amputate the effected limb is best made in union with the patient and their family. © 2011 The Authors. ANZ Journal of Surgery © 2011 Royal Australasian College of Surgeons.

  18. Normas jurídicas para a restauração ecológica: uma barreira a mais a dificultar o êxito das iniciativas? Legal rules for ecological restoration: an additional barrier to hinder the success of initiatives?

    Directory of Open Access Journals (Sweden)

    Giselda Durigan

    2010-06-01

    legislation. Here we offer a critical analysis of the resolution SMA 08 of the Secretary of Environment of the State of Sao Paulo, a law which aims to standardize the mixed planting of degraded areas. We believe that the State rules are based on assumptions not supported by scientific experimentation, since the present understanding of ecological processes involved in the restoration of tropical forests is far from being sufficient for standards or norms to be established as yet on this vast subject. In addition, the technicians who prepare projects and those who license and monitor such projects do not have the knowledge necessary to implement the rules of the Resolution. We also argue that strict rules are likely to constrain creativity and inhibit initiatives of scientists and restoration practitioners, and thus constitute a barrier to innovation and creativity. It also may well retard expansion of restoration to wider areas. From the perspective of biodiversity conservation objectives, we also believe that the creation of commercial demand for propagation material of rare and threatened species could endanger the conservation of natural populations of these species, which should be targeted for specific programs. In conclusion, we suggest that the Resolution has not helped to accelerate the expansion of restored areas nor does it increase the probability of success of restoration initiatives.

  19. Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes

    Directory of Open Access Journals (Sweden)

    Zhanyong Tang

    2017-01-01

    Full Text Available Evil-Twin is becoming a common attack in smart home environments where an attacker can set up a fake AP to compromise the security of the connected devices. To identify the fake APs, The current approaches of detecting Evil-Twin attacks all rely on information such as SSIDs, the MAC address of the genuine AP, or network traffic patterns. However, such information can be faked by the attacker, often leading to low detection rates and weak protection. This paper presents a novel Evil-Twin attack detection method based on the received signal strength indicator (RSSI. Our approach considers the RSSI as a fingerprint of APs and uses the fingerprint of the genuine AP to identify fake ones. We provide two schemes to detect a fake AP in two different scenarios where the genuine AP can be located at either a single or multiple locations in the property, by exploiting the multipath effect of the Wi-Fi signal. As a departure from prior work, our approach does not rely on any professional measurement devices. Experimental results show that our approach can successfully detect 90% of the fake APs, at the cost of a one-off, modest connection delay.

  20. Bush animal attacks: management of complex injuries in a resource-limited setting

    Directory of Open Access Journals (Sweden)

    Mitchell Katrina B

    2011-12-01

    Full Text Available Abstract Introduction Though animal-related injuries and fatalities have been documented throughout the world, the variety of attacks by wild animals native to rural East Africa are less commonly described. Given the proximity of our northwestern Tanzania hospital to Lake Victoria, Lake Tanganyika, and the Serengeti National Park, and presentation of several patients attacked by bush animals and suffering a variety of complex injuries, we sought to report the pattern of attacks and surgical management in a resource-limited setting. Materials and methods Four patients who were admitted to the northwestern Tanzania tertiary referral hospital, Bugando Medical Centre (BMC, in 2010-2011 suffered attacks by different bush animals: hyena, elephant, crocodile, and vervet monkey. These patients were triaged as trauma patients in the Casualty Ward, then admitted for inpatient monitoring and treatment. Their outcomes were followed to discharge. Results The age and gender of the patients attacked was variable, though all but the pediatric patient were participating in food gathering or guarding activities in rural locations at the time of the attacks. All patients required surgical management of their injuries, which included debridement and closure of wounds, chest tube insertion, amputation, and external fixation of an extremity fracture. All patients survived and were discharged home. Discussion Though human injuries secondary to encounters with undomesticated animals such as cows, moose, and camel are reported, they often are indirect traumas resulting from road traffic collisions. Snake attacks are well documented and common. However, this series of unique bush animal attacks describes the initial and surgical management of human injuries in the resource-limited setting of the developing world. Conclusion Animal attacks are common throughout the world, but their pattern may vary in Africa throughout jungle and bush environmental settings. It is

  1. Using trust to secure geographic and energy aware routing against multiple attacks.

    Science.gov (United States)

    Zhang, Guanghua; Zhang, Yuqing; Chen, Zhenguo

    2013-01-01

    To address the vulnerability of geographic routing to multiple security threats such as false routing information, selective forwarding and the Sybil attack in wireless sensor networks, this paper proposes a trust-based defending model against above-mentioned multiple attacks. Considering the characteristics of resource-constrained sensor nodes, trust values of neighboring nodes on the routing path can be calculated through the Dirichlet distribution function, which is based on data packets' acknowledgements in a certain period instead of energy-consuming monitoring. Trust is combined with the cost of geographic and energy aware routing for selecting the next hop of routing. At the same time, the initial trust is dynamically determined, service requests are restricted for malicious nodes in accordance with trust values, and the impact of node mobility is weakened by the trust evolution. The simulation results and analysis show that the proposed model under multiple attacks has advantages in packet delivery ratio and network lifetime over the existing models.

  2. Diverticulitis Diet: Can Certain Foods Trigger an Attack?

    Science.gov (United States)

    ... there trigger foods I should avoid to prevent diverticulitis attacks? Answers from Katherine Zeratsky, R.D., L. ... Actually, no specific foods are known to trigger diverticulitis attacks. And no special diet has been proved ...

  3. Heart Attack or Sudden Cardiac Arrest: How Are They Different?

    Science.gov (United States)

    ... Attack or Sudden Cardiac Arrest: How Are They Different? Updated:Mar 15,2018 People often use these ... The heart attack symptoms in women can be different than men. What is cardiac arrest? Sudden cardiac ...

  4. Cyber Attacks During the War on Terrorism: A Predictive Analysis

    National Research Council Canada - National Science Library

    Vatis, Michael

    2001-01-01

    ... responsible for the attack. This paper examines case studies of political conflicts that have led to attacks on cyber systems, such as the recent clashes between India and Pakistan, Israel and the Palestinians, and NATO...

  5. Information Warfare: Defining the Legal Response to An Attack

    National Research Council Canada - National Science Library

    Pottorff, James

    1999-01-01

    This paper discusses the difficulty in determining whether an information warfare attack, such as a computer virus, can be treated as an "armed attack" for purposes of national defense under the United Nations charter. As the U.S...

  6. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  7. Cyber Attacks During the War on Terrorism: A Predictive Analysis

    National Research Council Canada - National Science Library

    Vatis, Michael

    2001-01-01

    .... Just as the terrorist attacks of September 11, 2001 defied what many thought possible, cyber attacks could escalate in response to United States and allied retaliatory measures against the terrorists...

  8. Satellite Threat Warning and Attack Reporting

    Energy Technology Data Exchange (ETDEWEB)

    Hilland, D. [Kirkland AFB, NM (United States). Air Force Research Lab.; Phipps, G. [Sandia National Labs., Albuquerque, NM (United States). Optics & Technologies Dept.; Jingle, C.; Newton, G. [Schafer Corp., Albuquerque, NM (United States)

    1997-12-31

    The Air Force Research Laboratory`s Satellite Threat Warning and Attack Reporting (STW/AR) program will provide technologies for advanced threat warning and reporting of radio frequency (RF) and laser threats. The STW/AR program objectives are: (a) develop cost- effective technologies to detect, identify, locate, characterize, and report attacks or interference against U.S. and Allied satellites. (b) demonstrate innovative, light-weight, low-power, laser and RF sensors. The program focuses on the demonstration of RF and laser sensors. The RF sensor effort includes the investigation of interferometric antenna arrays, multi-arm spiral and butler matrix antennas, wideband receivers, adaptive processors, and improved processing algorithms. The laser sensor effort includes the investigation of alternative detectors, broadband grating and optical designs, active pixel sensing, and improved processing algorithms.

  9. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  10. Research About Attacks Over Cloud Environment

    Directory of Open Access Journals (Sweden)

    Li Jie

    2017-01-01

    Full Text Available Cloud computing is expected to continue expanding in the next few years and people will start to see some of the following benefits in their real lives. Security of cloud computing environments is the set of control-based technologies and policies absolute to adhere regulatory compliance rules and protect information data applications and infrastructure related with cloud use. In this paper we suggest a model to estimating the cloud computing security and test the services provided to users. The simulator NG-Cloud Next Generation Secure Cloud Storage is used and modified to administer the proposed model. This implementation achieved security functions potential attacks as defined in the proposed model. Finally we also solve some attacks over cloud computing to provide the security and safety of the cloud.

  11. Presentation attack detection in voice biometrics

    OpenAIRE

    Korshunov, Pavel; Marcel, Sébastien; Vielhauer, Claus

    2017-01-01

    Recent years have shown an increase in both the accuracy of biometric systems and their practical use. The application of biometrics is becoming widespread with fingerprint sensors in smartphones, automatic face recognition in social networks and video-based applications, and speaker recognition in phone banking and other phone-based services. The popularization of the biometric systems, however, exposed their major flaw --- high vulnerability to spoofing attacks. A fingerprint sensor can be ...

  12. A Study of Gaps in Attack Analysis

    Science.gov (United States)

    2016-10-12

    necessarily reflect the views of the Department of Defense. © 2016 MASSACHUSETTS INSTITUTE OF TECHNOLOGY Delivered to the U.S. Government with...and identify cyber attacks reflects the “arms race” na- ture of the cyber domain. While defenders develop new and improved techniques to detect known...Trost. Digging into ShellShock Exploitation attempts using ShockPot Data. https://www.threatstream.com/ blog /shockpot-exploitation-analysis, September

  13. Collision attack against Tav-128 hash function

    Science.gov (United States)

    Hariyanto, Fajar; Hayat Susanti, Bety

    2017-10-01

    Tav-128 is a hash function which is designed for Radio Frequency Identification (RFID) authentication protocol. Tav-128 is expected to be a cryptographically secure hash function which meets collision resistance properties. In this research, a collision attack is done to prove whether Tav-128 is a collision resistant hash function. The results show that collisions can be obtained in Tav-128 hash function which means in other word, Tav-128 is not a collision resistant hash function.

  14. Sustainable Agricultural Marketing Initiatives

    Directory of Open Access Journals (Sweden)

    Hakan Adanacıoğlu

    2015-07-01

    Full Text Available Sustainable marketing is a holistic approach that puts equal emphasis on environmental, social equity, and economic concerns in the development of marketing strategies. The purpose of the study is to examine and discuss the sustainable agricultural marketing initiatives practiced throughout the World and Turkey, and to put forth suggestions to further improve the performance of agricultural marketing initiatives in Turkey. Some of the sustainable agricultural marketing initiatives practiced around the world are carried out through civil organizations. Furthermore; some of these initiatives have also launched by farmers, consumers, food processors and retailers. The long-term strategies to increase these initiatives should be determined due to the fact that examples of successful sustainable agricultural marketing initiatives are inadequate and cannot be spread in Turkey. In this context, first of all, the supports provided by the government to improve agricultural marketing systems, such as EU funds for rural development should be compatible with the goals of sustainable marketing. For this purpose, it should be examined whether all proposed projects related to agricultural marketing meet the social, economic, and environmental principles of sustainable marketing. It is important that supporting organizations, especially civil society organisations, should take an active role for faster dissemination and adoption of sustainable agricultural marketing practices in Turkey. These organizations may provide technical assistance in preparing successful project proposals and training to farm groups. In addition, the other organizations, such as local administrations, producers' associations, cooperatives, can contribute to the success of sustainable agricultural marketing initiatives. The use of direct marketing strategies and vertical integration attempts in sustainable agricultural marketing initiatives that will likely be implemented in Turkey is

  15. Attacking Paper-Based E2E Voting Systems

    Science.gov (United States)

    Kelsey, John; Regenscheid, Andrew; Moran, Tal; Chaum, David

    In this paper, we develop methods for constructing vote-buying/coercion attacks on end-to-end voting systems, and describe vote-buying/coercion attacks on three proposed end-to-end voting systems: Punchscan, Prêt-à-voter, and ThreeBallot. We also demonstrate a different attack on Punchscan, which could permit corrupt election officials to change votes without detection in some cases. Additionally, we consider some generic attacks on end-to-end voting systems.

  16. Fuzzy Expert System for Heart Attack Diagnosis

    Science.gov (United States)

    Hassan, Norlida; Arbaiy, Nureize; Shah, Noor Aziyan Ahmad; Afizah Afif@Afip, Zehan

    2017-08-01

    Heart attack is one of the serious illnesses and reported as the main killer disease. Early prevention is significant to reduce the risk of having the disease. The prevention efforts can be strengthen through awareness and education about risk factor and healthy lifestyle. Therefore the knowledge dissemination is needed to play role in order to distribute and educate public in health care management and disease prevention. Since the knowledge dissemination in medical is important, there is a need to develop a knowledge based system that can emulate human intelligence to assist decision making process. Thereby, this study utilized hybrid artificial intelligence (AI) techniques to develop a Fuzzy Expert System for Diagnosing Heart Attack Disease (HAD). This system integrates fuzzy logic with expert system, which helps the medical practitioner and people to predict the risk and as well as diagnosing heart attack based on given symptom. The development of HAD is expected not only providing expert knowledge but potentially become one of learning resources to help citizens to develop awareness about heart-healthy lifestyle.

  17. Iraqi violence, Saudi attack and further bombings

    Energy Technology Data Exchange (ETDEWEB)

    Anon

    2006-03-15

    Iraq moved closer to all-out civil war following an attack on the Imam Ali al-Hadi mosque in Samarra, one of Shi'i Islam's holiest shrines, on 22nd February. In the days that followed, several hundred Iraqis died in inter-communal violence. Attacks on installations close to the Basrah Oil Terminal were reported. Earlier in the month, the main oil storage facility in Kirkuk was bombed, forcing the Northern Oil Company to shut-in the 0.3 mn bpd field. Oil and electricity supplies in southern Iraq were cut by attacks on installations some 40 miles south of Baghdad. Turkey agreed to resume product exports to Iraq after a deal was agreed on repaying Iraqi debts of $1 bn to Turkish suppliers. An official Australian inquiry into illegal payments made under the UN's oil-for-food programme is to investigate allegations involving two Australian-controlled oil firms. (author)

  18. Smoking behaviour under intense terrorist attacks.

    Science.gov (United States)

    Keinan-Boker, Lital; Kohn, Robert; Billig, Miriam; Levav, Itzhak

    2011-06-01

    Smoking is one of the varied psychological reactions to stress. This study examined the rate and changes in cigarette smoking among former Gaza and current West Bank Jewish settlers subjected to direct and indirect terrorist attacks during the Al-Aksa Intifada. The relationship with degree of religious observance and emotional distress was explored as well. In this cross-sectional study, the respondents were settlers randomly selected and interviewed by telephone (N = 706). The interview schedule included socio-demographic items, information on direct exposure to terrorist attacks (e.g. threat to life or physical integrity, personal losses, property damage) and on steady and changes in smoking habits, and a scale to measure emotional distress. In contrast with the country population, a larger percentage of settlers who smoked increased the number of cigarettes consumed with exposure to terrorism (10 and 27%, respectively). Respondents who were injured or had their home damaged reported a higher rate of smoking during the preceding year (30 and 20%, respectively). Emotional distress was related to cigarette smoking, but not in the controlled analysis. Religious observance had no effect. Direct or indirect exposure to terrorist attacks had an impact on smoking prevalence rates and on changes in smoking habits. Studies investigating reactions to traumatic events should include a detailed section on smoking while mental health interventions should address the needs of smokers.

  19. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  20. Link-layer Jamming Attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    2004-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  1. What Can We Learn?--The Algonquin Bear Attack.

    Science.gov (United States)

    Strickland, Dan

    1992-01-01

    Describes a bear attack in Algonquin Park in Lake Opeongo (Canada) in which a man and woman were killed. Hypothesizes that the bear deliberately preyed on its victims and concludes that the bear was physically normal. Despite this isolated attack, the chance of being attacked by a black bear when camping is virtually nonexistent. (KS)

  2. STAR Performance with SPEAR (Signal Processing Electronic Attack RFIC)

    Science.gov (United States)

    2017-03-01

    STAR Performance with SPEAR ( Signal Processing Electronic Attack RFIC) Luciano Boglione, Clayton Davis, Joel Goodman, Matthew McKeon, David...Parrett, Sanghoon Shin and Naomi Walker Naval Research Laboratory Washington, DC, 20375 Figure 1: The Signal Processing Electronic Attack RFIC...SPEAR) system. Abstract: The Signal Processing Electronic Attack RFIC (SPEAR) is a simultaneous transmit and receive (STAR) system capable of

  3. Quantitative Verification and Synthesis of Attack-Defence Scenarios Conference

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They represent in an intuitive, graphical way the interaction between an attacker and a defender who compete in order to achieve conflicting objectives. We propose a novel framework for the formal

  4. Regression Nodes: Extending attack trees with data from social sciences

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    In the field of security, attack trees are often used to assess security vulnerabilities probabilistically in relation to multi-step attacks. The nodes are usually connected via AND-gates, where all children must be executed, or via OR-gates, where only one action is necessary for the attack step to

  5. Pareto Efficient Solution of Attack-Defence Trees

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as

  6. Vulnerability Assessment by Learning Attack Specifications in Graphs

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Lopes, Raul H.C.

    This paper presents an evolutionary approach for learning attack specifications that describe attack scenarios. The objective is to find vulnerabilities in computer networks which minimise the cost of an attack with maximum impact. Although we focus on Insider Threat, the proposed approach applies

  7. Limit Asthma Attacks Caused by Colds or Flu

    Science.gov (United States)

    Asthma: Limit asthma attacks caused by colds or flu A cold or the flu can trigger an asthma attack. Here's why — and how to keep your sneeze ... plan. If you notice warning signs of an asthma attack — such as coughing, wheezing, chest tightness or shortness ...

  8. Modeling and Analysis of Information Attack in Computer Networks

    National Research Council Canada - National Science Library

    Pepyne, David

    2003-01-01

    ... (as opposed to physical and other forms of attack) . Information based attacks are attacks that can be carried out from anywhere in the world, while sipping cappuccino at an Internet cafe' or while enjoying the comfort of a living room armchair...

  9. Attacks on the AJPS Mersenne-based cryptosystem

    NARCIS (Netherlands)

    K. de Boer (Koen); L. Ducas (Léo); S. Jeffery (Stacey); R. M. de Wolf (Ronald)

    2018-01-01

    textabstractAggarwal, Joux, Prakash and Santha recently introduced a new potentially quantum-safe public-key cryptosystem, and suggested that a brute-force attack is essentially optimal against it. They consider but then dismiss both Meet-in-the-Middle attacks and LLL-based attacks. Very soon after

  10. 12 CFR 747.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... INVESTIGATIONS Uniform Rules of Practice and Procedure § 747.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all or any part of an...

  11. 12 CFR 308.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... PRACTICE RULES OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 308.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any...

  12. 12 CFR 19.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 19.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all...

  13. Mining IP to Domain Name Interactions to Detect DNS Flood Attacks on Recursive DNS Servers.

    Science.gov (United States)

    Alonso, Roberto; Monroy, Raúl; Trejo, Luis A

    2016-08-17

    The Domain Name System (DNS) is a critical infrastructure of any network, and, not surprisingly a common target of cybercrime. There are numerous works that analyse higher level DNS traffic to detect anomalies in the DNS or any other network service. By contrast, few efforts have been made to study and protect the recursive DNS level. In this paper, we introduce a novel abstraction of the recursive DNS traffic to detect a flooding attack, a kind of Distributed Denial of Service (DDoS). The crux of our abstraction lies on a simple observation: Recursive DNS queries, from IP addresses to domain names, form social groups; hence, a DDoS attack should result in drastic changes on DNS social structure. We have built an anomaly-based detection mechanism, which, given a time window of DNS usage, makes use of features that attempt to capture the DNS social structure, including a heuristic that estimates group composition. Our detection mechanism has been successfully validated (in a simulated and controlled setting) and with it the suitability of our abstraction to detect flooding attacks. To the best of our knowledge, this is the first time that work is successful in using this abstraction to detect these kinds of attacks at the recursive level. Before concluding the paper, we motivate further research directions considering this new abstraction, so we have designed and tested two additional experiments which exhibit promising results to detect other types of anomalies in recursive DNS servers.

  14. Mining IP to Domain Name Interactions to Detect DNS Flood Attacks on Recursive DNS Servers

    Directory of Open Access Journals (Sweden)

    Roberto Alonso

    2016-08-01

    Full Text Available The Domain Name System (DNS is a critical infrastructure of any network, and, not surprisingly a common target of cybercrime. There are numerous works that analyse higher level DNS traffic to detect anomalies in the DNS or any other network service. By contrast, few efforts have been made to study and protect the recursive DNS level. In this paper, we introduce a novel abstraction of the recursive DNS traffic to detect a flooding attack, a kind of Distributed Denial of Service (DDoS. The crux of our abstraction lies on a simple observation: Recursive DNS queries, from IP addresses to domain names, form social groups; hence, a DDoS attack should result in drastic changes on DNS social structure. We have built an anomaly-based detection mechanism, which, given a time window of DNS usage, makes use of features that attempt to capture the DNS social structure, including a heuristic that estimates group composition. Our detection mechanism has been successfully validated (in a simulated and controlled setting and with it the suitability of our abstraction to detect flooding attacks. To the best of our knowledge, this is the first time that work is successful in using this abstraction to detect these kinds of attacks at the recursive level. Before concluding the paper, we motivate further research directions considering this new abstraction, so we have designed and tested two additional experiments which exhibit promising results to detect other types of anomalies in recursive DNS servers.

  15. Inducibility of chemical defenses in Norway spruce bark is correlated with unsuccessful mass attacks by the spruce bark beetle.

    Science.gov (United States)

    Schiebe, Christian; Hammerbacher, Almuth; Birgersson, Göran; Witzell, Johanna; Brodelius, Peter E; Gershenzon, Jonathan; Hansson, Bill S; Krokene, Paal; Schlyter, Fredrik

    2012-09-01

    Secondary attraction to aggregation pheromones plays a central role in the host colonization behavior of the European spruce bark beetle Ips typographus. However, it is largely unknown how the beetles pioneering an attack locate suitable host trees, and eventually accept or reject them. To find possible biomarkers for host choice by I. typographus, we analyzed the chemistry of 58 Norway spruce (Picea abies) trees that were subsequently either (1) successfully attacked and killed, (2) unsuccessfully attacked, or (3) left unattacked. The trees were sampled before the main beetle flight in a natural Norway spruce-dominated forest. No pheromones were used to attract beetles to the experimental trees. To test the trees' defense potential, each tree was treated in a local area with the defense hormone methyl jasmonate (MeJ), and treated and untreated bark were analyzed for 66 different compounds, including terpenes, phenolics and alkaloids. The chemistry of MeJ-treated bark correlated strongly with the success of I. typographus attack, revealing major chemical differences between killed trees and unsuccessfully attacked trees. Surviving trees produced significantly higher amounts of most of the 39 analyzed mono-, sesqui-, and diterpenes and of 4 of 20 phenolics. Alkaloids showed no clear pattern. Differences in untreated bark were less pronounced, where only 1,8-cineole and (-)-limonene were significantly higher in unsuccessfully attacked trees. Our results show that the potential of individual P. abies trees for inducing defense compounds upon I. typographus attack may partly determine tree resistance to this bark beetle by inhibiting its mass attack.

  16. Unified communications forensics anatomy of common UC attacks

    CERN Document Server

    Grant, Nicholas Mr

    2013-01-01

    Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures

  17. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    OpenAIRE

    Khaled Elleithy; Drazen Blagovic; Wang Cheng; Paul Sideleau

    2005-01-01

    A denial of service attack (DOS) is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack wil...

  18. Neutrophil Attack Triggers Extracellular Trap-Dependent Candida Cell Wall Remodeling and Altered Immune Recognition.

    Directory of Open Access Journals (Sweden)

    Alex Hopke

    2016-05-01

    Full Text Available Pathogens hide immunogenic epitopes from the host to evade immunity, persist and cause infection. The opportunistic human fungal pathogen Candida albicans, which can cause fatal disease in immunocompromised patient populations, offers a good example as it masks the inflammatory epitope β-glucan in its cell wall from host recognition. It has been demonstrated previously that β-glucan becomes exposed during infection in vivo but the mechanism behind this exposure was unknown. Here, we show that this unmasking involves neutrophil extracellular trap (NET mediated attack, which triggers changes in fungal cell wall architecture that enhance immune recognition by the Dectin-1 β-glucan receptor in vitro. Furthermore, using a mouse model of disseminated candidiasis, we demonstrate the requirement for neutrophils in triggering these fungal cell wall changes in vivo. Importantly, we found that fungal epitope unmasking requires an active fungal response in addition to the stimulus provided by neutrophil attack. NET-mediated damage initiates fungal MAP kinase-driven responses, particularly by Hog1, that dynamically relocalize cell wall remodeling machinery including Chs3, Phr1 and Sur7. Neutrophil-initiated cell wall disruptions augment some macrophage cytokine responses to attacked fungi. This work provides insight into host-pathogen interactions during disseminated candidiasis, including valuable information about how the C. albicans cell wall responds to the biotic stress of immune attack. Our results highlight the important but underappreciated concept that pattern recognition during infection is dynamic and depends on the host-pathogen dialog.

  19. Successful Aging

    Directory of Open Access Journals (Sweden)

    Taufiqurrahman Nasihun

    2015-06-01

    Full Text Available The emerging concept of successful aging is based on evidence that in healthy individual when they get aged, there are  considerable variations in physiological functions alteration. Some people exhibiting greater, but others very few or no age related alteration. The first is called poor aging and the later is called successful pattern of aging (Lambert SW, 2008. Thus, in the simple words the successful aging concept is define as an opportunity of old people to stay  active and productive condition despite they get aged chronologically. Aging itself might be defined as the progressive accumulation of changes with time associated with or responsible for the ever-increasing susceptibility to disease and death which accompanies advancing age (Harman D, 1981. The time needed to accumulate changes is attributable to aging process. The marked emerging questions are how does aging happen and where does aging start? To answer these questions and because of the complexity of aging process, there are more than 300 aging theories have been proposed to explain how and where aging occured and started respectively. There are too many to enumerate theories and classification of aging process. In summary, all of these aging theories can be grouped into three clusters: 1. Genetics program theory, this theory suggests that aging is resulted from program directed by the genes; 2. Epigenetic theory, in these theory aging is resulted from environmental random events not determined by the genes; 3. Evolutionary theory, which propose that aging is a medium for disposal mortal soma in order to avoid competition between organism and their progeny for food and space, did not try to explain how aging occur, but possibly answer why aging occur (De la Fuente. 2009. Among the three groups of aging theories, the epigenetic theory is useful to explain and try to solve the enigma of aging which is prominently caused by internal and external environmental influences

  20. Web Forms and Untraceable DDoS Attacks

    Science.gov (United States)

    Jakobsson, Markus; Menczer, Filippo

    We analyze a Web vulnerability that allows an attacker to perform an email-based attack on selected victims, using standard scripts and agents. What differentiates the attack we describe from other, already known forms of distributed denial of service (DDoS) attacks is that an attacker does not need to infiltrate the network in any manner - as is normally required to launch a DDoS attack. Thus, we see this type of attack as a poor man's DDoS. Not only is the attack easy to mount, but it is also almost impossible to trace back to the perpetrator. Along with descriptions of our attack, we demonstrate its destructive potential with (limited and contained) experimental results. We illustrate the potential impact of our attack by describing how an attacker can disable an email account by flooding its inbox; block competition during on-line auctions; harm competitors with an on-line presence; disrupt phone service to a given victim; disconnect mobile corporate leaders from their networks; and disrupt electronic elections. Finally, we propose a set of countermeasures that are light-weight, do not require modifications to the infrastructure, and can be deployed in a gradual manner.

  1. Machine Learning Methods for Attack Detection in the Smart Grid.

    Science.gov (United States)

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  2. Hybrid attacks on model-based social recommender systems

    Science.gov (United States)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  3. Communication: essential strategies for success.

    Science.gov (United States)

    O'Connor, Mary

    2013-06-01

    This department highlights change management strategies that may be successful in strategically planning and executing organizational change initiatives. With the goal of presenting practical approaches helpful to nurse leaders advance organizational change, content includes evidence-based projects, tool, and resources that mobilize and sustain organizational change initiatives. In this article, the author discusses strategies for communication for change processes, whether large or small. Intentional planning and development of a communication strategy alongside, not as an afterthought, to change initiatives are essential.

  4. Induction of cellular accessibility and inaccessibility and suppression and potentiation of cell death in oat attacked by ¤Blumeria graminis¤ f.sp. ¤avenae¤

    DEFF Research Database (Denmark)

    Carver, T.L.W.; Lyngkjær, M.F.; Neyron, L.

    1999-01-01

    , suggesting that induced changes in (in)accessibility may be a common consequence of B. graminis attack in cereals. As expected, in Maldwyn, cell death was a consistent but infrequent response to attack (5-20%, of attacks caused cell death in controls). Here, the successful formation of an inducer haustorium......, or of a papilla due to failed attack, totally suppressed the cell death response to later challenge attack on D0 cells, but had less effect on neighbouring cells. Conversely, death of a Maldwyn epidermal cell due to inducer attack potentiated cell death in adjacent cells where up to 80% of challenge attacks...... caused death. This effect was transmitted to some extent to two cells distance. (C) 1999 Academic Press....

  5. Cyber Attacks and Energy Infrastructures: Anticipating Risks

    International Nuclear Information System (INIS)

    Desarnaud, Gabrielle

    2017-01-01

    This study analyses the likelihood of cyber-attacks against European energy infrastructures and their potential consequences, particularly on the electricity grid. It also delivers a comparative analysis of measures taken by different European countries to protect their industries and collaborate within the European Union. The energy sector experiences an unprecedented digital transformation upsetting its activities and business models. Our energy infrastructures, sometimes more than a decade old and designed to remain functional for many years to come, now constantly interact with light digital components. The convergence of the global industrial system with the power of advanced computing and analytics reveals untapped opportunities at every step of the energy value chain. However, the introduction of digital elements in old and unprotected industrial equipment also exposes the energy industry to the cyber risk. One of the most compelling example of the type of threat the industry is facing, is the 2015 cyber-attack on the Ukraine power grid, which deprived about 200 000 people of electricity in the middle of the winter. The number and the level of technical expertise of cyber-attacks rose significantly after the discovery of the Stuxnet worm in the network of Natanz uranium enrichment site in 2010. Energy transition policies and the growing integration of renewable sources of energy will intensify this tendency, if cyber security measures are not part of the design of our future energy infrastructures. Regulators try to catch up and adapt, like in France where the authorities collaborate closely with the energy industry to set up a strict and efficient regulatory framework, and protect critical operators. This approach is adopted elsewhere in Europe, but common measures applicable to the whole European Union are essential to protect strongly interconnected energy infrastructures against a multiform threat that defies frontiers

  6. Suicide bomb attack causing penetrating craniocerebral injury

    OpenAIRE

    Hussain Manzar; Bari Muhammad Ehsan

    2013-01-01

    【Abstract】Penetrating cerebral injuries caused by foreign bodies are rare in civilian neurosurgical trauma, al-though there are various reports of blast or gunshot inju-ries in warfare due to multiple foreign bodies like pellets and nails. In our case, a 30-year-old man presented to neurosur-gery clinic with signs and symptoms of right-sided weak-ness after suicide bomb attack. The skull X-ray showed a single intracranial nail. Small craniotomy was done and the nail was removed wi...

  7. Suicide bomb attack causing penetrating craniocerebral injury.

    Science.gov (United States)

    Hussain, Manzar; Bari, Muhammad-Ehsan

    2013-01-01

    Penetrating cerebral injuries caused by foreign bodies are rare in civilian neurosurgical trauma, although there are various reports of blast or gunshot injuries in warfare due to multiple foreign bodies like pellets and nails. In our case, a 30-year-old man presented to neurosurgery clinic with signs and symptoms of right-sided weakness after suicide bomb attack. The skull X-ray showed a single intracranial nail. Small craniotomy was done and the nail was removed with caution to avoid injury to surrounding normal brain tissue. At 6 months'follow-up his right-sided power improved to against gravity.

  8. Close Air Support versus Close Combat Attack

    Science.gov (United States)

    2012-12-06

    consequence when discussing the two different processes of close air support and close combat attack. This section focuses on service culture. Understanding...According to a RAND study written by Carl Builder, the Air Force “could be said to worship at the altar of technology.”67 These are not what Hofstede...characteristics that are highly prized in a culture and thus serve as models for behavior,” people like Billy Mitchell, Hap Arnold, Tooey Spaatz to name a

  9. Neutralizing SQL Injection Attack Using Server Side Code Modification in Web Applications

    OpenAIRE

    Dalai, Asish Kumar; Jena, Sanjay Kumar

    2017-01-01

    Reports on web application security risks show that SQL injection is the top most vulnerability. The journey of static to dynamic web pages leads to the use of database in web applications. Due to the lack of secure coding techniques, SQL injection vulnerability prevails in a large set of web applications. A successful SQL injection attack imposes a serious threat to the database, web application, and the entire web server. In this article, the authors have proposed a novel method for prevent...

  10. Practising of radiological emergency caused by a terrorist attack

    International Nuclear Information System (INIS)

    Racana, R.; Terrado, C.

    2006-01-01

    After the events of September 11, 2001 terrorist working has become an important factor in the forecasts to adopt in the face of the possibility of confronting different radiological emergencies. The not wanted events of exposure to ionizing radiations can take place by flaws of systems or accidents, or also by criminal voluntary actions. These malevolent actions can include attacks or sabotages in nuclear plants, detonation of manufactured nuclear devices or acquired under ground, robbery of radioactive sources to manufacture the calls dirty bombs or to cause damage, panic or threats. In the scenarios in that the radiological emergency is voluntarily provoked the moment and place of the attack are chosen by the aggressors, therefore the ionizing radiations will be in not prepared atmospheres neither equipped to the effect. This increases the confusion, the panic and the damage not only caused by the radiation effects but also by the uncertainty and consequent reactions. To diminish the effects of this type of threats it is necessary to make forecasts and to train the personnel that it can be direct or indirectly involved. During 2005, an exercise in which it was outlined the robbery by part of a group command of a source of Co 60 of 5000 Ci that it was transported to make a decanting in a medical center of The Pampa county, Argentina. It was about a cabinet exercise, planned and executed jointly among the Nuclear Regulatory Authority and the Secretary of Interior Safety, in which participated the professionals of the nuclear area that by law are the responsible ones of coordinating the actions in the event of an emergency of this type, and the safety forces that depend of the Secretary of Interior Safety, Federal and Provincial Policemen, Naval Prefecture and National Gendarmerie. The exercise last one day during which 9 main situations were approached that were unchained after having produced the attack and initial robbery. For each situation it was checked the

  11. Consciousness in non-epileptic attack disorder.

    Science.gov (United States)

    Reuber, Markus; Kurthen, M

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consciousness should not only distinguish between the 'level' and `content' of consciousness but also between 'phenomenal consciousness' (consciousness of states it somehow "feels to be like") and 'access consciousness' (having certain 'higher' cognitive processes at one's disposal). The existing evidence shows that there is a great intra- and interindividual variability of NEA experience. However, in most NEAs phenomenal experience - and, as a precondition for that experience, vigilance or wakefulness - is reduced to a lesser degree than in those epileptic seizures involving impairment of consciousness. In fact, complete loss of "consciousness" is the exception rather than the rule in NEAs. Patients, as well as external observers, may have a tendency to overestimate impairments of consciousness during the seizures.

  12. Recent computer attacks via Instant Messaging

    CERN Multimedia

    IT Department

    2008-01-01

    Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. Several computers at CERN have recently been broken into by attackers who have tricked users of Instant Messaging applications (e.g. MSN, Yahoo Messenger, etc.) into clicking on web links which appeared to come from known contacts. The links appeared to be photos from ‘friends’ and requested software to be installed. In practice, attacker software was installed and the messages did not come from real contacts. In the past such fake messages were mainly sent by email but now a wider range of applications are being targeted, including Instant Messaging. Cybercriminals are making growing use of fake messages to try to trick you into clicking on Web links which will help them to install malicious software on your computer. Anti-virus software cann...

  13. [Diagnosis, pathogenesis and treatment of panic attacks].

    Science.gov (United States)

    Turczyński, J

    Panic accompanies several diseases both psychological and somatic. It may be secondary, i.e. produced by other symptoms and morbid processes. It may also be primary--"neurotic". In such cases there are two forms of panic: generalized and paroxysmal. Attacks of panic are seen in 1.6-2.9% of women and in 0.4-1.7% of men. Main pathogenetic role is played by the psychologic factors (psychical trauma precedes the onset of diseases). The role of biological factors is also important. It is believed that disorders of the noradrenergic, serotonin-ergic, and GABA-ergic transmission may produce the attacks of panic. Psychotherapy is a treatment of choice. Pharmacotherapy plays only an adjuvant role. Antidepressants (tricyclic of II generation) are most frequently used for this purpose and--exceptionally due to possible addiction--benzodiazepines. The highest impact on the development of disease has first contact physician attitude. Patient and thoughtful listening to the patient, explanation of the complaints and their source often produce and improvement, and even complete recovery.

  14. Consciousness in Non-Epileptic Attack Disorder

    Science.gov (United States)

    Reuber, M.; Kurthen, M.

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consciousness should not only distinguish between the ‘level’ and ‘content’ of consciousness but also between ‘phenomenal consciousness’ (consciousness of states it somehow “feels to be like”) and ‘access consciousness’ (having certain ‘higher’ cognitive processes at one’s disposal). The existing evidence shows that there is a great intra- and interindividual variability of NEA experience. However, in most NEAs phenomenal experience – and, as a precondition for that experience, vigilance or wakefulness – is reduced to a lesser degree than in those epileptic seizures involving impairment of consciousness. In fact, complete loss of “consciousness” is the exception rather than the rule in NEAs. Patients, as well as external observers, may have a tendency to overestimate impairments of consciousness during the seizures. PMID:21447903

  15. STABILITY OF UNDERWATER STRUCTURE UNDER WAVE ATTACK

    Directory of Open Access Journals (Sweden)

    C. Paotonan

    2012-02-01

    Full Text Available Geotube is, among others, a type of coastal structure that is increasingly accepted for coastal protection especially underwater breakwater. Besides its relatively low cost, it has other advantages such as flexibility, ease of construction and the fact that it can be filled with local sand material. Similar to all other coastal structures, it should also be stable under wave attack. A simple theoretical approach based on linear wave was adopted to estimate the stability of such structure. The theoretical solution was then compared with an experimental study. The experimental study was conducted at the Hydraulics and Hydrology Laboratory of Universitas Gadjah Mada. However, instead of a real geotube, PVC pipe was used where the weight of the PVC was varied by adjusting the volume of sand in the pipe. The result indicated that the agreement between the theoretical solution and the experiment was encouraging. The analytical solution may be utilized to predict underwater pipe stability under wave attack with certain degree of accuracy.

  16. Baiting Inside Attackers Using Decoy Documents

    Science.gov (United States)

    Bowen, Brian M.; Hershkop, Shlomo; Keromytis, Angelos D.; Stolfo, Salvatore J.

    The insider threat remains one of the most vexing problems in computer security. A number of approaches have been proposed to detect nefarious insider actions including user modeling and profiling techniques, policy and access enforcement techniques, and misuse detection. In this work we propose trap-based defense mechanisms and a deployment platform for addressing the problem of insiders attempting to exfiltrate and use sensitive information. The goal is to confuse and confound an adversary requiring more effort to identify real information from bogus information and provide a means of detecting when an attempt to exploit sensitive information has occurred. “Decoy Documents” are automatically generated and stored on a file system by the D3 System with the aim of enticing a malicious user. We introduce and formalize a number of properties of decoys as a guide to design trap-based defenses to increase the likelihood of detecting an insider attack. The decoy documents contain several different types of bogus credentials that when used, trigger an alert. We also embed “stealthy beacons” inside the documents that cause a signal to be emitted to a server indicating when and where the particular decoy was opened. We evaluate decoy documents on honeypots penetrated by attackers demonstrating the feasibility of the method.

  17. Command Disaggregation Attack and Mitigation in Industrial Internet of Things.

    Science.gov (United States)

    Xun, Peng; Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-10-21

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  18. Quantitative Method for Network Security Situation Based on Attack Prediction

    Directory of Open Access Journals (Sweden)

    Hao Hu

    2017-01-01

    Full Text Available Multistep attack prediction and security situation awareness are two big challenges for network administrators because future is generally unknown. In recent years, many investigations have been made. However, they are not sufficient. To improve the comprehensiveness of prediction, in this paper, we quantitatively convert attack threat into security situation. Actually, two algorithms are proposed, namely, attack prediction algorithm using dynamic Bayesian attack graph and security situation quantification algorithm based on attack prediction. The first algorithm aims to provide more abundant information of future attack behaviors by simulating incremental network penetration. Through timely evaluating the attack capacity of intruder and defense strategies of defender, the likely attack goal, path, and probability and time-cost are predicted dynamically along with the ongoing security events. Furthermore, in combination with the common vulnerability scoring system (CVSS metric and network assets information, the second algorithm quantifies the concealed attack threat into the surfaced security risk from two levels: host and network. Examples show that our method is feasible and flexible for the attack-defense adversarial network environment, which benefits the administrator to infer the security situation in advance and prerepair the critical compromised hosts to maintain normal network communication.

  19. Command Disaggregation Attack and Mitigation in Industrial Internet of Things

    Directory of Open Access Journals (Sweden)

    Peng Xun

    2017-10-01

    Full Text Available A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1 the command sequence is disordered and (2 disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  20. How oxygen attacks [FeFe] hydrogenases from photosynthetic organisms

    Science.gov (United States)

    Stripp, Sven T.; Goldet, Gabrielle; Brandmayr, Caterina; Sanganas, Oliver; Vincent, Kylie A.; Haumann, Michael; Armstrong, Fraser A.; Happe, Thomas

    2009-01-01

    Green algae such as Chlamydomonas reinhardtii synthesize an [FeFe] hydrogenase that is highly active in hydrogen evolution. However, the extreme sensitivity of [FeFe] hydrogenases to oxygen presents a major challenge for exploiting these organisms to achieve sustainable photosynthetic hydrogen production. In this study, the mechanism of oxygen inactivation of the [FeFe] hydrogenase CrHydA1 from C. reinhardtii has been investigated. X-ray absorption spectroscopy shows that reaction with oxygen results in destruction of the [4Fe-4S] domain of the active site H-cluster while leaving the di-iron domain (2FeH) essentially intact. By protein film electrochemistry we were able to determine the order of events leading up to this destruction. Carbon monoxide, a competitive inhibitor of CrHydA1 which binds to an Fe atom of the 2FeH domain and is otherwise not known to attack FeS clusters in proteins, reacts nearly two orders of magnitude faster than oxygen and protects the enzyme against oxygen damage. These results therefore show that destruction of the [4Fe-4S] cluster is initiated by binding and reduction of oxygen at the di-iron domain—a key step that is blocked by carbon monoxide. The relatively slow attack by oxygen compared to carbon monoxide suggests that a very high level of discrimination can be achieved by subtle factors such as electronic effects (specific orbital overlap requirements) and steric constraints at the active site. PMID:19805068

  1. Simulation of Attacks for Security in Wireless Sensor Network.

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-11-18

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  2. Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions

    NARCIS (Netherlands)

    M.M.J. Stevens (Marc); D. Shumow

    2017-01-01

    textabstractCounter-cryptanalysis, the concept of using cryptanalytic techniques to detect cryptanalytic attacks, was introduced by Stevens at CRYPTO 2013 [22] with a hash collision detection algorithm. That is, an algorithm that detects whether a given single message is part of a colliding message

  3. Non-Normal Impact and Penetration. Analysis for Hard Targets and Small Angles of Attack

    Science.gov (United States)

    1978-09-01

    acceleration of the projectile CG for different initial values of the attack angle. Beyond the point of nose embedment (0.2 ms), there is a marked difference...DeBoesser, Jr. Technical Library Director, Defense Intelligence Agency ATN : DI-TE Comander , Frankford Arsenal DT-2, Weapons & Systems ATTN: L. Baldini...Monitored Battlefield A’TN: STSI (Archives) Sensor System 2 cy STTL (Technical Library) ATTN: Chuck Higgins 15 cy SPSS DDST Comanding Officer, Picatinny

  4. Analysis Of Default Passwords In Routers Against Brute-Force Attack

    OpenAIRE

    Mohammed Farik; ABM Shawkat Ali

    2015-01-01

    Abstract Password authentication is the main means of access control on network routers and router manufacturers provide a default password for initial login to the router. While there has been many publications regarding the minimum requirements of a good password how widely the manufacturers themselves are adhering to the minimum standards and whether these passwords can withstand brute-force attack are not widely known. The novelty of this research is that this is the first time default...

  5. Intelligent Intrusion Detection of Grey Hole and Rushing Attacks in Self-Driving Vehicular Networks

    Directory of Open Access Journals (Sweden)

    Khattab M. Ali Alheeti

    2016-07-01

    Full Text Available Vehicular ad hoc networks (VANETs play a vital role in the success of self-driving and semi self-driving vehicles, where they improve safety and comfort. Such vehicles depend heavily on external communication with the surrounding environment via data control and Cooperative Awareness Messages (CAMs exchanges. VANETs are potentially exposed to a number of attacks, such as grey hole, black hole, wormhole and rushing attacks. This work presents an intelligent Intrusion Detection System (IDS that relies on anomaly detection to protect the external communication system from grey hole and rushing attacks. These attacks aim to disrupt the transmission between vehicles and roadside units. The IDS uses features obtained from a trace file generated in a network simulator and consists of a feed-forward neural network and a support vector machine. Additionally, the paper studies the use of a novel systematic response, employed to protect the vehicle when it encounters malicious behaviour. Our simulations of the proposed detection system show that the proposed schemes possess outstanding detection rates with a reduction in false alarms. This safe mode response system has been evaluated using four performance metrics, namely, received packets, packet delivery ratio, dropped packets and the average end to end delay, under both normal and abnormal conditions.

  6. Acanthopria and Mimopriella parasitoid wasps (Diapriidae) attack Cyphomyrmex fungus-growing ants (Formicidae, Attini)

    Science.gov (United States)

    Fernández-Marín, Hermógenes; Zimmerman, Jess K.; Wcislo, William T.

    2006-01-01

    New World diapriine wasps are abundant and diverse, but the biology of most species is unknown. We provide the first description of the biology of diapriine wasps, Acanthopria spp. and Mimopriella sp., which attack the larvae of Cyphomyrmex fungus-growing ants. In Puerto Rico, the koinobiont parasitoids Acanthopria attack Cyphomyrmex minutus, while in Panama at least four morphospecies of Acanthopria and one of Mimopriella attack Cyphomyrmex rimosus. Of the total larvae per colony, 0 100% were parasitized, and 27 70% of the colonies per population were parasitized. Parasitism rate and colony size were negatively correlated for C. rimosus but not for C. minutus. Worker ants grasped at, bit, and in some cases, killed adult wasps that emerged in artificial nests or tried to enter natural nests. Parasitoid secondary sex ratios were female-biased for eclosing wasps, while field collections showed a male-biased sex ratio. Based on their abundance and success in attacking host ants, these minute wasps present excellent opportunities to explore how natural enemies impact ant colony demography and population biology.

  7. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia.

    Science.gov (United States)

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources.

  8. Analysis of Network Vulnerability Under Joint Node and Link Attacks

    Science.gov (United States)

    Li, Yongcheng; Liu, Shumei; Yu, Yao; Cao, Ting

    2018-03-01

    The security problem of computer network system is becoming more and more serious. The fundamental reason is that there are security vulnerabilities in the network system. Therefore, it’s very important to identify and reduce or eliminate these vulnerabilities before they are attacked. In this paper, we are interested in joint node and link attacks and propose a vulnerability evaluation method based on the overall connectivity of the network to defense this attack. Especially, we analyze the attack cost problem from the attackers’ perspective. The purpose is to find the set of least costs for joint links and nodes, and their deletion will lead to serious network connection damage. The simulation results show that the vulnerable elements obtained from the proposed method are more suitable for the attacking idea of the malicious persons in joint node and link attack. It is easy to find that the proposed method has more realistic protection significance.

  9. A Secure Localization Approach against Wormhole Attacks Using Distance Consistency

    Directory of Open Access Journals (Sweden)

    Lou Wei

    2010-01-01

    Full Text Available Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or wireless link to another point, and the other relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization and propose a novel distance-consistency-based secure localization scheme against wormhole attacks, which includes three phases of wormhole attack detection, valid locators identification and self-localization. The theoretical model is further formulated to analyze the proposed secure localization scheme. The simulation results validate the theoretical results and also demonstrate the effectiveness of our proposed scheme.

  10. Attack and Vulnerability Penetration Testing: FreeBSD

    Directory of Open Access Journals (Sweden)

    Abdul Hanan Abdullah

    2013-07-01

    Full Text Available Computer system security has become a major concern over the past few years. Attacks, threasts or intrusions, against computer system and network have become commonplace events. However, there are some system devices and other tools that are available to overcome the threat of these attacks. Currently, cyber attack is a major research and inevitable. This paper presents some steps of penetration in FreeBSD operating system, some tools and new steps to attack used in this experiment, probes for reconnaissance, guessing password via brute force, gaining privilege access and flooding victim machine to decrease availability. All these attacks were executed and infiltrate within the environment of Intrusion Threat Detection Universiti Teknologi Malaysia (ITD UTM data set. This work is expected to be a reference for practitioners to prepare their systems from Internet attacks.

  11. Spreading of localized attacks in spatial multiplex networks

    Science.gov (United States)

    Vaknin, Dana; Danziger, Michael M.; Havlin, Shlomo

    2017-07-01

    Many real-world multilayer systems such as critical infrastructure are interdependent and embedded in space with links of a characteristic length. They are also vulnerable to localized attacks or failures, such as terrorist attacks or natural catastrophes, which affect all nodes within a given radius. Here we study the effects of localized attacks on spatial multiplex networks of two layers. We find a metastable region where a localized attack larger than a critical size induces a nucleation transition as a cascade of failures spreads throughout the system, leading to its collapse. We develop a theory to predict the critical attack size and find that it exhibits novel scaling behavior. We further find that localized attacks in these multiplex systems can induce a previously unobserved combination of random and spatial cascades. Our results demonstrate important vulnerabilities in real-world interdependent networks and show new theoretical features of spatial networks.

  12. Attribution Of Cyber Attacks On Process Control Systems

    Science.gov (United States)

    Hunker, Jeffrey; Hutchinson, Robert; Margulies, Jonathan

    The attribution of cyber attacks is an important problem. Attribution gives critical infrastructure asset owners and operators legal recourse in the event of attacks and deters potential attacks. This paper discusses attribution techniques along with the associated legal and technical challenges. It presents a proposal for a voluntary network of attributable activity, an important first step towards a more complete attribution methodology for the control systems community.

  13. Attack polish for nickel-base alloys and stainless steels

    Science.gov (United States)

    Not Available

    1980-05-28

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels is described. The chemical attack polich comprises FeNO/sub 3/, concentrated CH/sub 3/COOH, concentrated H/sub 2/SO/sub 4/ and H/sub 2/O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  14. Different Types of Attacks on Integrated MANET-Internet Communication

    OpenAIRE

    Abhay Kumar Rai, Rajiv Ranjan Tewari & Saurabh Kant Upadhyay

    2010-01-01

    Security is an important issue in the integrated MANET-Internet environment because inthis environment we have to consider the attacks on Internet connectivity and also onthe ad hoc routing protocols. The focus of this work is on different types of attacks onintegrated MANET-Internet communication. We consider most common types of attackson mobile ad hoc networks and on access point through which MANET is connected tothe Internet. Specifically, we study how different attacks affect the perfor...

  15. Backside polishing detector: a new protection against backside attacks

    OpenAIRE

    Manich Bou, Salvador; Arumi Delgado, Daniel; Rodríguez Montañés, Rosa; Mujal Colell, Jordi; Hernández García, David

    2015-01-01

    Secure chips are in permanent risk of attacks. Physical attacks usually start removing part of the package and accessing the dice by different means: laser shots, electrical or electromagnetic probes, etc. Doing this from the backside of the chip gives some advantages since no metal layers interfere between the hacker and the signals of interest. The bulk silicon is thinned from hundreds to some tens of micrometers in order to improve the performance of the attack. In thi...

  16. TCP-SYN Flooding Attack in Wireless Networks

    OpenAIRE

    Bogdanoski, Mitko; Suminoski, Tomislav; Risteski, Aleksandar

    2012-01-01

    This paper concerns the TCP (Transmission Control Protocol) vulnerabilities which gives space for a DoS (Denial of Service) attacks called TCP-SYN flooding which is well-known to the community for several years. The paper shows this attack in wireless as well as wired networks using perl synflood script, Wireshark network analyzer server, Windows 2008 server, and OPNET simulation environment. Using these tools an effects of this attack are shown. Finally, some effective practical mitigation t...

  17. Neurobrucellosis with transient ischemic attack, vasculopathic changes, intracerebral granulomas and basal ganglia infarction: a case report

    Directory of Open Access Journals (Sweden)

    Ozyurek Seyfi C

    2010-10-01

    Full Text Available Abstract Introduction Central nervous system involvement is a rare but serious manifestation of brucellosis. We present an unusual case of neurobrucellosis with transient ischemic attack, intracerebral vasculopathy granulomas, seizures, and paralysis of sixth and seventh cranial nerves. Case presentation A 17-year-old Caucasian man presented with nausea and vomiting, headache, double vision and he gave a history of weakness in the left arm, speech disturbance and imbalance. Physical examination revealed fever, doubtful neck stiffness and left abducens nerve paralysis. An analysis of his cerebrospinal fluid showed a pleocytosis (lymphocytes, 90%, high protein and low glucose levels. He developed generalized tonic-clonic seizures, facial paralysis and left hemiparesis. Cranial magnetic resonance imaging demonstrated intracerebral vasculitis, basal ganglia infarction and granulomas, mimicking the central nervous system involvement of tuberculosis. On the 31st day of his admission, neurobrucellosis was diagnosed with immunoglobulin M and immunoglobulin G positivity by standard tube agglutination test and enzyme-linked immunosorbent assay in both serum and cerebrospinal fluid samples (the tests had been negative until that day. He was treated successfully with trimethoprim and sulfamethoxazole, doxycyline and rifampicin for six months. Conclusions Our patient illustrates the importance of suspecting brucellosis as a cause of meningoencephalitis, even if cultures and serological tests are negative at the beginning of the disease. As a result, in patients who have a history of residence or travel to endemic areas, neurobrucellosis should be considered in the differential diagnosis of any neurologic symptoms. If initial tests fail, repetition of these tests at appropriate intervals along with complementary investigations are indicated.

  18. Entanglement generation secure against general attacks

    Science.gov (United States)

    Pirker, Alexander; Dunjko, Vedran; Dür, Wolfgang; Briegel, Hans J.

    2017-11-01

    We present a security proof for establishing private entanglement by means of recurrence-type entanglement distillation protocols over noisy quantum channels. We consider protocols where the local devices are imperfect, and show that nonetheless a confidential quantum channel can be established, and used to e.g. perform distributed quantum computation in a secure manner. While our results are not fully device independent (which we argue to be unachievable in settings with quantum outputs), our proof holds for arbitrary channel noise and noisy local operations, and even in the case where the eavesdropper learns the noise. Our approach relies on non-trivial properties of distillation protocols which are used in conjunction with de-Finetti and post-selection-type techniques to reduce a general quantum attack in a non-asymptotic scenario to an i.i.d. setting. As a side result, we also provide entanglement distillation protocols for non-i.i.d. input states.

  19. Detecting Cyber Attacks On Nuclear Power Plants

    Science.gov (United States)

    Rrushi, Julian; Campbell, Roy

    This paper proposes an unconventional anomaly detection approach that provides digital instrumentation and control (I&C) systems in a nuclear power plant (NPP) with the capability to probabilistically discern between legitimate protocol frames and attack frames. The stochastic activity network (SAN) formalism is used to model the fusion of protocol activity in each digital I&C system and the operation of physical components of an NPP. SAN models are employed to analyze links between protocol frames as streams of bytes, their semantics in terms of NPP operations, control data as stored in the memory of I&C systems, the operations of I&C systems on NPP components, and NPP processes. Reward rates and impulse rewards are defined in the SAN models based on the activity-marking reward structure to estimate NPP operation profiles. These profiles are then used to probabilistically estimate the legitimacy of the semantics and payloads of protocol frames received by I&C systems.

  20. Suicide bomb attack causing penetrating craniocerebral injury

    Directory of Open Access Journals (Sweden)

    Hussain Manzar

    2013-02-01

    Full Text Available 【Abstract】Penetrating cerebral injuries caused by foreign bodies are rare in civilian neurosurgical trauma, al-though there are various reports of blast or gunshot inju-ries in warfare due to multiple foreign bodies like pellets and nails. In our case, a 30-year-old man presented to neurosur-gery clinic with signs and symptoms of right-sided weak-ness after suicide bomb attack. The skull X-ray showed a single intracranial nail. Small craniotomy was done and the nail was removed with caution to avoid injury to surround-ing normal brain tissue. At 6 months’ follow-up his right-sided power improved to against gravity. Key words: Head injury, penetrating; Bombs; Nails