WorldWideScience

Sample records for life-threatening neurovisceral attacks

  1. Life-threatening asthma attack during prolonged fingolimod treatment: case report

    Directory of Open Access Journals (Sweden)

    Zecca C

    2014-07-01

    Full Text Available Chiara Zecca,1,* Matteo Caporro,1,* Sandor Györik,2 Claudio Gobbi11Neurocenter of Southern Switzerland, Department of Neurology, Ospedale Regionale di Lugano, Lugano, Switzerland; 2Department of Internal Medicine, Ospedale Regionale di Bellinzona, Bellinzona, Switzerland*These authors contributed equally to this workBackground: Fingolimod (FTY mediates bronchoconstriction by interacting with sphingosine-1-phosphate receptors. The majority of the reported adverse respiratory events occur during the first weeks of treatment.Case presentation: A 49-year-old woman developed a life-threatening asthma attack after 6 months of continuous FTY treatment. The adverse event required prolonged hospitalization, and the patient recovered without sequelae after FTY interruption. A history of previous airway hyperreactivity and a concurrent viral respiratory infection possibly acted as predisposing factors.Conclusion: This first description of a severe, life-threatening asthma attack during prolonged FTY treatment suggests the need for long-term clinical surveillance, especially in patients with known predisposing factors.Keywords: multiple sclerosis, bronchial hyper-reactivity

  2. Life-threatening event reduces subjective well-being through activating avoidance motivation: a longitudinal study.

    Science.gov (United States)

    Van Dijk, Dina; Seger-Guttmann, Tali; Heller, Daniel

    2013-04-01

    Drawing on the approach-avoidance theory, we have examined the role of avoidance motivation in explaining the negative effects of a life-threatening event on subjective well-being (SWB). Residents of the south of Israel were surveyed during heavy missile attacks in January 2009 (T1; n = 283), and again after 6 months (T2; n = 212) and 1 year (T3; n = 154). During the missile attacks, we also surveyed a group from the center of the country (T1; n = 102), not exposed to the attacks. The results indicate that avoidance motivation was activated by the life threat and further mediated its detrimental influence on SWB measures (positive/negative affects, anxiety, and subjective health). Moreover, within the southern sample, the drop in avoidance motivation over time mediated the parallel drop in SWB. In contrast to avoidance motivation, approach motivation remained stable over time and was related to positive emotions. The role of avoidance and approach motivations in life-threatening situations is further discussed. PsycINFO Database Record (c) 2013 APA, all rights reserved.

  3. Sex Differences in Violent versus Non-Violent Life-Threatening Altruism

    Directory of Open Access Journals (Sweden)

    Carey J. Fitzgerald

    2009-07-01

    Full Text Available Many studies on Hamilton's (1964 inclusive fitness theory have used the burning house and kidney donation examples of life-threatening altruism. However, these examples may not be sufficiently exhibiting the risk involved with life-threatening altruism that would have occurred in hunter-gatherer societies, such as fighting off attackers and/or predators. The present study examined participants' estimated likelihood to perform altruistic acts for specific kin members/friends in two violent life-threatening situations (i.e., being mugged and being chased and two non-violent life-threatening situations (i.e., the burning house and kidney donation examples. Participants were 216 undergraduate students who completed a questionnaire on altruism toward an actual kin member/friend. Each questionnaire contained four life-or-death scenarios (two violent and two non-violent in which either the participant's sibling, cousin, or best friend was in danger and needed help. Results indicated that people were more likely to help siblings than cousins and friends in both the violent and non-violent hypothetical scenarios. Participants indicated a greater likelihood to help people in violent situations than in non-violent situations. Women indicated a greater estimated likelihood than men to help people in non-violent situations while men indicated a greater estimated likelihood than women to help people in violent situations. Both male and female participants indicated a greater estimated likelihood to help women than men in violent situations.

  4. Bidirectional asymmetry in the neurovisceral communication for the cardiovascular control: New insights

    Directory of Open Access Journals (Sweden)

    Prieto I

    2017-07-01

    Full Text Available The cardiovascular control involves a bidirectional functional connection between the brain and heart. We hypothesize that this connection could be extended to other organs using endocrine and autonomic nervous systems (ANS as communication pathways. This implies a neuroendocrine interaction controlling particularly the cardiovascular function where the enzymatic cascade of the renin-angiotensin system (RAS plays an essential role. It acts not only through its classic endocrine connection but also the ANS. In addition, the brain is functionally, anatomically, and neurochemically asymmetric. Moreover, this asymmetry goes even beyond the brain and it includes both sides of the peripheral nervous and neuroendocrine systems. We revised the available information and analyze the asymmetrical neuroendocrine bidirectional interaction for the cardiovascular control. Negative and positive correlations involving the RAS have been observed between brain, heart, kidney, gut, and plasma in physiologic and pathologic conditions. The central role of the peptides and enzymes of the RAS within this neurovisceral communication, as well as the importance of the asymmetrical distribution of the various RAS components in the pathologies involving this connection, are particularly discussed. In conclusion, there are numerous evidences supporting the existence of a neurovisceral connection with multiorgan involvement that controls, among others, the cardiovascular function. This connection is asymmetrically organized.

  5. Sevoflurane therapy for life-threatening acute severe asthma: a case report.

    Science.gov (United States)

    Ruszkai, Zoltán; Bokrétás, Gergely Péter; Bartha, Péter Töhötöm

    2014-10-01

    Acute severe asthma is a life-threatening form of bronchial constriction in which the progressively worsening airway obstruction is unresponsive to the usual appropriate bronchodilator therapy. Pathophysiological changes restrict airflow, which leads to premature closure of the airway on expiration, impaired gas exchange, and dynamic hyperinflation ("air-trapping"). Additionally, patients suffering from asthma for a prolonged period of time usually have serious comorbidities. These conditions constitute a challenge during the treatment of this disease. Therapeutic interventions are designed to reduce airway resistance and improve respiratory status. To achieve therapeutic goals, appropriate bronchodilator treatment is indispensable, and mechanical ventilation under adequate sedation may also be required. The volatile anesthetic agent, sevoflurane, meets both criteria; therefore, its use can be beneficial and should be considered. A 67-yr-old Caucasian male presented with acute life-threatening asthma provoked by an assumed upper airway infection and non-steroidal anti-inflammatory drug antipyretics, complicated by chronic atrial fibrillation and hemodynamic instability. Due to frequent premature ventricular contractions, conventional treatment was considered unsafe and discontinued, and sevoflurane inhalation was initiated via the AnaConDa (Anaesthetic Conserving Device). Symptoms of life-threatening bronchospasm resolved, and the patient's respiratory status improved within hours. Adequate sedation was also achieved without any hemodynamic adverse effects. The volatile anesthetic agent, sevoflurane, is used widely in anesthesia practice. Its utility for treatment of refractory bronchospasm has been appreciated for years; however, its administration was difficult within the environment of the intensive care unit due to the need for an anesthesia machine and a scavenging system. The introduction of the AnaConDa eliminates these obstacles and makes the use of

  6. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  7. Transarterial microcatheter glue embolization of the bronchial artery for life-threatening hemoptysis: Technical and clinical results

    Energy Technology Data Exchange (ETDEWEB)

    Baltacioglu, Feyyaz [Marmara University School of Medicine, Department of Radiology, Istanbul (Turkey)], E-mail: fbaltaci@yahoo.com; Cimsit, Nuri Cagatay [Marmara University School of Medicine, Department of Radiology, Istanbul (Turkey)], E-mail: cagataycimsit@gmail.com; Bostanci, Korkut [Marmara University School of Medicine, Department of Thoracic Surgery, Istanbul (Turkey)], E-mail: kbostanci@marmara.edu.tr; Yueksel, Mustafa [Marmara University School of Medicine, Department of Thoracic Surgery, Istanbul (Turkey)], E-mail: myuksel@marmara.edu.tr; Kodalli, Nihat [Marmara University School of Medicine, Department of Radiology, Istanbul (Turkey)], E-mail: nihatkodalli@yahoo.com

    2010-02-15

    Objectives: To report our experience with transarterial glue embolization of the bronchial artery for life-threatening hemoptysis. Materials and methods: Twenty-five patients underwent bronchial artery embolization, using coaxial microcatheter technique, with a liquid agent, n-butyl-2-cyanoacrylate (NBCA), named glue, for life-threatening hemoptysis. The technical and clinical outcomes were followed in terms of immediate control of bleeding, recurrence of hemoptysis and complications of the procedure. Results: Four patients had acute hemoptysis when they were evaluated. The average number of arteries embolized per patient was 2.9. BAEs were successful in controlling hemoptysis immediately in all 25 patients (100%) and in 24 patients (96%) at 1 month follow-ups. One patient had recurrent hemoptysis on the tenth day after embolization. The follow-up time ranged from 2 to 63 months (mean 14 months). Six patients (25%) died all as a result of their disease process. Bleeding recurred in 3 patients after 30 days (7th, 11th, 12th months). One patient had vomitting attacks with dysphagia after the procedure that lasted 24 h. Three patients had transient thoracic pain lasting 3-5 days. There were no procedure related spinal or vascular complications. Conclusions: Glue embolization with microcatheter technique is a safe and effective treatment in cases of life-threatening hemoptysis with a very high rate of success and low rate of complications.

  8. Guideline on management of the acute asthma attack in children by Italian Society of Pediatrics.

    Science.gov (United States)

    Indinnimeo, Luciana; Chiappini, Elena; Miraglia Del Giudice, Michele

    2018-04-06

    Acute asthma attack is a frequent condition in children. It is one of the most common reasons for emergency department (ED) visit and hospitalization. Appropriate care is fundamental, considering both the high prevalence of asthma in children, and its life-threatening risks. Italian Society of Pediatrics recently issued a guideline on the management of acute asthma attack in children over age 2, in ambulatory and emergency department settings. The Grading of Recommendations Assessment, Development, and Evaluation (GRADE) methodology was adopted. A literature search was performed using the Cochrane Library and Medline/PubMed databases, retrieving studies in English or Italian and including children over age 2 year. Inhaled ß 2 agonists are the first line drugs for acute asthma attack in children. Ipratropium bromide should be added in moderate/severe attacks. Early use of systemic steroids is associated with reduced risk of ED visits and hospitalization. High doses of inhaled steroids should not replace systemic steroids. Aminophylline use should be avoided in mild/moderate attacks. Weak evidence supports its use in life-threatening attacks. Epinephrine should not be used in the treatment of acute asthma for its lower cost / benefit ratio, compared to β 2 agonists. Intravenous magnesium solphate could be used in children with severe attacks and/or forced expiratory volume1 (FEV1) lower than 60% predicted, unresponsive to initial inhaled therapy. Heliox could be administered in life-threatening attacks. Leukotriene receptor antagonists are not recommended. This Guideline is expected to be a useful resource in managing acute asthma attacks in children over age 2.

  9. Caring for children with life-limiting and life-threatening illnesses ...

    African Journals Online (AJOL)

    2011-07-03

    Jul 3, 2011 ... She currently works with funding support from the Red Cross War Memorial Children's Hospital and the ... Children with life-limiting illnesses may also develop life-threatening ... bodies in an age-appropriate manner a basic.

  10. Threatened fertility and gonadal function after a polytraumatic, life-threatening injury

    Directory of Open Access Journals (Sweden)

    Ward Michael

    2010-01-01

    Full Text Available Trauma literature regarding management of genitalia trauma affecting future fertility and gonadal function in the face of coexisting life-threatening injuries is underdeveloped. We present a unique case that necessitated integrative management of a 24-year-old male who became entangled within the blades of a manure spreader and presented with life-threatening trauma in addition to severe genital trauma, including penile degloving, bilateral testicular avulsion and bilateral spermatic cord laceration. During the initial stabilization and surgical management, urology and plastic surgery were consulted to assess the urogenital injuries. Together, the surgical team orchestrated potentially life-saving interventions while successfully performing both a testicular sperm extraction and a testicular revascularization. Viable sperm was collected on the day of surgery and initial follow-up showed preserved sexual function and adequate perfusion to the testicle. This report presents a case and provides a review discussing the management of traumatic genital injuries and the importance of early involvement of surgical specialties in genitalia trauma to optimize future fertility and gonadal function. The literature search was performed in August 2008 using Medline for articles only in English, including any of the following terms: polytrauma, trauma, penis, testicle, degloving, avulsion, spermatic cord, laceration, fertility, reproduction or revascularization.

  11. Tracheal intubation in the ICU: Life saving or life threatening?

    Directory of Open Access Journals (Sweden)

    Jigeeshu V Divatia

    2011-01-01

    Full Text Available Tracheal intubation (TI is a routine procedure in the intensive care unit (ICU, and is often life saving. However, life-threatening complications occur in a significant proportion of procedures, making TI perhaps one the most common but underappreciated airway emergencies in the ICU. In contrast to the controlled conditions in the operating room (OR, the unstable physiologic state of critically ill patients along with underevaluation of the airways and suboptimal response to pre-oxygenation are the major factors for the high incidence of life-threatening complications like severe hypoxaemia and cardiovascular collapse in the ICU. Studies have shown that strategies planned for TI in the OR can be adapted and extrapolated for use in the ICU. Non-invasive positive-pressure ventilation for pre-oxygenation provides adequate oxygen stores during TI for patients with precarious respiratory pathology. The intubation procedure should include not only airway management but also haemodynamic, gas exchange and neurologic care, which are often crucial in critically ill patients. Hence, there is a necessity for the implementation of an Intubation Bundle during routine airway management in the ICU. Adherence to a plan for difficult airway management incorporating the use of intubation aids and airway rescue devices and strategies is useful.

  12. Incidence and management of life-threatening adverse events during cardiac catheterization for congenital heart disease.

    Science.gov (United States)

    Lin, C Huie; Hegde, Sanjeet; Marshall, Audrey C; Porras, Diego; Gauvreau, Kimberlee; Balzer, David T; Beekman, Robert H; Torres, Alejandro; Vincent, Julie A; Moore, John W; Holzer, Ralf; Armsby, Laurie; Bergersen, Lisa

    2014-01-01

    Continued advancements in congenital cardiac catheterization and interventions have resulted in increased patient and procedural complexity. Anticipation of life-threatening events and required rescue measures is a critical component to preprocedural preparation. We sought to determine the incidence and nature of life-threatening adverse events in congenital and pediatric cardiac catheterization, risk factors, and resources necessary to anticipate and manage events. Data from 8905 cases performed at the 8 participating institutions of the Congenital Cardiac Catheterization Project on Outcomes were captured between 2007 and 2010 [median 1,095/site (range 133-3,802)]. The incidence of all life-threatening events was 2.1 % [95 % confidence interval (CI) 1.8-2.4 %], whereas mortality was 0.28 % (95 % CI 0.18-0.41 %). Fifty-seven life-threatening events required cardiopulmonary resuscitation, whereas 9 % required extracorporeal membrane oxygenation. Use of a risk adjustment model showed that age events. Using this model, standardized life-threatening event ratios were calculated, thus showing that one institution had a life-threatening event rate greater than expected. Congenital cardiac catheterization and intervention can be performed safely with a low rate of life-threatening events and mortality; preprocedural evaluation of risk may optimize preparation of emergency rescue and bailout procedures. Risk predictors (age < 1, hemodynamic vulnerability, and procedure risk category) can enhance preprocedural patient risk stratification and planning.

  13. Tachycardia may prognosticate life- or organ-threatening diseases in children with abdominal pain.

    Science.gov (United States)

    Hayakawa, Itaru; Sakakibara, Hiroshi; Atsumi, Yukari; Hataya, Hiroshi; Terakawa, Toshiro

    2017-06-01

    Abdominal pain is common in children, but expeditious diagnosis of life- or organ-threatening diseases can be challenging. An evidence-based definition of tachycardia in children was established recently, but its diagnostic utility has not yet been studied. To test the hypothesis that abdominal pain with tachycardia may pose a higher likelihood of life- or organ-threatening diseases in children. A nested case-control study was conducted in a pediatric emergency department in 2013. Tachycardia was defined as a resting heart rate of more than 3 standard deviations above the average for that age. Life- or organ-threatening diseases were defined as "disorders that might result in permanent morbidity or mortality without appropriate intervention." A triage team recorded vital signs before emergency physicians attended patients. Patients with tachycardia (cases) and without tachycardia (controls) were systematically matched for age, sex, and month of visit. The groups were compared for the presence of life- or organ-threatening diseases. There were 1683 visits for abdominal pain, 1512 of which had vital signs measured at rest. Eighty-three patients experienced tachycardia, while 1429 did not. Fifty-eight cases and 58 controls were matched. Life- or organ-threatening diseases were more common in the case group (19%) than the control group (5%, p=0.043). The relative risk of tachycardia to the presence of the diseases was 3.7 (95% confidence interval 1.2-12.0). Tachycardia significantly increased the likelihood of life- or organ-threatening diseases. Tachycardia in children with abdominal pain should alert emergency physicians to the possibility of serious illness. Copyright © 2017 Elsevier Inc. All rights reserved.

  14. Life-threatening Cerebral Edema Caused by Acute Occlusion of a Superior Vena Cava Stent

    International Nuclear Information System (INIS)

    Sofue, Keitaro; Takeuchi, Yoshito; Arai, Yasuaki; Sugimura, Kazuro

    2013-01-01

    A71-year-old man with advanced lung cancer developed a life-threatening cerebral edema caused by the acute occlusion of a superior vena cava (SVC) stent and was successfully treated by an additional stent placement. Although stent occlusion is a common early complication, no life-threatening situations have been reported until now. Our experience highlights the fact that acute stent occlusion can potentially lead to the complete venous shutdown of the SVC, resulting in life-threatening cerebral edema, after SVC stent placement. Immediate diagnosis and countermeasures are required.

  15. [Pre-hospital management of adults with life-threatening emergencies].

    Science.gov (United States)

    Wattel, Francis; Dubois, François

    2012-01-01

    In France, acute life-threatening situations are handled by the French Secours a Personne (assistance to persons) and emergency medical facilities. An unequivocal success, this early management of life-threatening emergency situations relies upon centralized call reception, medical dispatching, and immediate on-site emergency medical care. We describe the different emergency care providers and steps involved in the response to emergency situations. Each call centre (Samu, phone number 15; Sapeurs-Pompiers, 18) provides a response tailored to the nature of incoming calls for assistance. A check-list of grounds for an "automatic response" by the SDIS (Service Départemental d'Incendie et de Secours--the French fire brigade) is in use, ensuring that firefighters are often the first on the spot, while the knowledge and skills of the dispatching physician are essential to ascertain the patient's needs, to preserve life and vital functions, and to ensure the patient is sent to the appropriate emergency healthcare facility. In life-threatening emergency situations, patients must be brought straight to the appropriate reference emergency healthcare facility, as quickly as possible, without prior admittance to an emergency department. This is the procedure for extremely acute emergency situations in the following areas: trauma (multiple trauma and/or uncontrolled bleeding, spinal cord trauma), delivery bleeding, other life-threatening situations such as ischemic heart disease, cardiac arrest (sudden death), cerebrovascular stroke and ensuing brain damage, some acute respiratory situations such as anaphylactic shock, foreign-body inhalation, electrocution, drowning, drug overdose, certain forms of poisoning, and conditions requiring initial hyperbaric oxygen (diving accidents, acute carbon monoxide and smoke poisoning). The reasons for suboptimal emergency care in life-threatening situations are currently a major issue, with medical facilities being reduced in some areas

  16. Life threatening arrhythmias: Knowledge and skills among nurses ...

    African Journals Online (AJOL)

    Conclusion: Although the majority of the participants scored highly in their level of knowledge regarding life threatening arrhythmias, they scored poorly in most of the observed skills when identifying and treating this patient group. It is important that hospital administration take into consideration the identified areas of ...

  17. Life threatening spinal shock and complete neurological recovery ...

    African Journals Online (AJOL)

    Mild to moderate trauma to the spinal cord that is complicated by existing cervical canal stenosis or spondylosis can be a life threatening event. It is against this background that we present a 41 year old male with cervical spinal stenosis who developed marked quadriparesis and respiratory embarrassment following ...

  18. Mobile phone use for contacting emergency services in life-threatening circumstances.

    Science.gov (United States)

    Wu, Olivia; Briggs, Andrew; Kemp, Tom; Gray, Alastair; MacIntyre, Kate; Rowley, Jack; Willett, Keith

    2012-03-01

    The potential health benefits of mobile phone use have not been widely studied, except for telemedicine-type applications. This study seeks to determine whether initial contact with emergency services via a mobile phone in life-threatening situations is associated with potential health benefits when compared to contact via a landline. A record-linkage study was carried out in which data from all emergency dispatches for immediately life-threatening events from a United Kingdom county ambulance service were linked to the Patient Admission System at two major local hospitals. Mortality (at the scene, at the emergency department [ED], and during hospitalization); transfer to the ED; admission (inpatient care, and intensive care unit); and length of stay were analyzed for calls classified as Code Red (immediately life-threatening) by initial exposure (mobile phone vs. landline), while controlling for potential confounding variables. Of 354,199 ambulances dispatched to attend emergency incidents, 66% transported patients to the hospital while 2% stood down due to death at the scene. Mobile phone compared to landline reporting of emergencies resulted in significant reductions in the risk of death at the scene (odds ratio [OR] 0.77), but not for death in the ED or during inpatient admission. The risk of being transferred to the ED and subsequent inpatient admission were significantly lower with reporting from mobile phones compared to landline (OR 0.93 and OR 0.82, respectively). In this study, evidence of statistical association was demonstrated between the use of mobile phones to alert ambulance services in life-threatening situations and improved outcomes for patients. Copyright © 2012 Elsevier Inc. All rights reserved.

  19. Jaguar Attack on a Child: Case Report and Literature Review

    Directory of Open Access Journals (Sweden)

    Iserson, Kenneth V.

    2015-02-01

    Full Text Available Jaguar attacks on humans rarely occur in the wild. When they do, they are often fatal. We describe a jaguar attack on a three-year-old girl near her home deep in a remote area of the Guyanese jungle. The patient had a complex but, relatively, rapid transport to a medical treatment facility for her life-threatening injuries. The child, who suffered typical jaguar-inflicted injury patterns and survived, is highlighted. We review jaguar anatomy, environmental status, hunting and killing behaviors, and discuss optimal medical management, given the resource-limited treatment environment of this international emergency medicine case. [West J Emerg Med. 2015;16(2:303–309.

  20. Optical illusions and life-threatening traffic crashes: A perspective on aerial perspective.

    Science.gov (United States)

    Redelmeier, Donald A; Raza, Sheharyar

    2018-05-01

    Aerial perspective illusion is a feature of visual perception where landscapes appear relatively close in clear light and distant in dim light. We hypothesized that bright sunlight might cause drivers to perceive distant terrain as relatively close and misinterpret the approach speed of surrounding landscape as unduly slow. This hypothesis would mean, in turn, that drivers in bright sunlight may underestimate their progress on the road, compensate by traveling at a faster baseline speed, and ultimately increase the prevailing risk of a life-threatening traffic crash. We conducted three pilot studies to illustrate how the illusion might contribute to a life- threatening traffic crash. The first illustration used a questionnaire to demonstrate that most respondents were mistaken when judging the distance between simple balls in different positions. The second illustration involved an experimental manipulation to assess whether aerial perspective influenced judgments about the relative positions of vehicles in traffic. The third illustration analyzed a segment of high-volume fast-speed traffic and found an increased frequency of speeding under bright sunlight. Together with past work based on the visual arts, these examples illustrate how an aerial perspective illusion can affect distance perception, may appear in realistic traffic situations, and could potentially contribute to the risk of a life-threatening traffic crash. An awareness of this hypothesis might lead to applications on how optical illusions could extend to everyday traffic and might potentially inform safety warnings to prevent life- threatening crashes. Copyright © 2018 Elsevier Ltd. All rights reserved.

  1. Life-threatening hypokalemia following rapid correction of respiratory acidosis.

    Science.gov (United States)

    Hammond, Kendra; You, David; Collins, Eileen G; Leehey, David J; Laghi, Franco

    2013-01-01

    A 56-year-old woman with a history of paraplegia and chronic pain due to neuromyelitis optica (Devic's syndrome) was admitted to a spinal cord injury unit for management of a sacral decubitus ulcer. During the hospitalization, she required emergency transfer to the intensive care unit (ICU) because of progressive deterioration of respiratory muscle function, severe respiratory acidosis, obtundation and hypotension. Upon transfer to the ICU, arterial blood gas revealed severe acute-on-chronic respiratory acidosis (pH 7.00, PCO2 120 mm Hg, PO2 211 mm Hg). The patient was immediately intubated and mechanically ventilated. Intravenous fluid boluses of normal saline (10.5 L in about 24 h) and vasopressors were started with rapid correction of hypotension. In addition, she was given hydrocortisone. Within 40 min of initiation of mechanical ventilation, there was improvement in acute respiratory acidosis. Sixteen hours later, however, the patient developed life-threatening hypokalemia (K(+) of 2.1 mEq/L) and hypomagnesemia (Mg of 1.4 mg/dL). Despite aggressive potassium supplementation, hypokalemia continued to worsen over the next several hours (K(+) of 1.7 mEq/L). Urine studies revealed renal potassium wasting. We reason that the recalcitrant life-threatening hypokalemia was caused by several mechanisms including total body potassium depletion (chronic respiratory acidosis), a shift of potassium from the extracellular to intracellular space (rapid correction of respiratory acidosis with mechanical ventilation), increased sodium delivery to the distal nephron (normal saline resuscitation), hyperaldosteronism (secondary to hypotension plus administration of hydrocortisone) and hypomagnesemia. We conclude that rapid correction of respiratory acidosis, especially in the setting of hypotension, can lead to life-threatening hypokalemia. Serum potassium levels must be monitored closely in these patients, as failure to do so can lead to potentially lethal consequences

  2. Life-Threatening Atypical Case of Acute Generalized Exanthematous Pustulosis.

    Science.gov (United States)

    Tajmir-Riahi, Azadeh; Wörl, Petra; Harrer, Thomas; Schliep, Stefan; Schuler, Gerold; Simon, Miklos

    2017-01-01

    Antibiotics are known to cause severe cutaneous adverse reactions, such as the rare acute generalized exanthematous pustulosis (AGEP). Unlike Stevens-Johnson syndrome or toxic epidermal necrolysis, AGEP is rarely life-threatening. Systemic involvement is not typical, and if present usually coincides with a mild elevation of the hepatic enzymes and a decrease in renal function. Hence, AGEP is known to have a good prognosis and to be life-threatening only in elderly patients or patients with chronic diseases. Herein, we report a case of AGEP in a young healthy male leading to systemic inflammatory response syndrome and to treatment in an intensive care unit after being treated with 5 different antibiotics. Initial symptoms were not indicative for AGEP and the patient's course of disease led promptly to critical cardiorespiratory symptoms and systemic inflammatory response syndrome. We assume that the administration of the 5 different antibiotics resulted in type IV allergy as well as secondary infection with Enterococcus faecium and Staphylococcus aureus, while the underlying periodontitis also contributed to the severity of this case. © 2017 S. Karger AG, Basel.

  3. Identifying and treating a life-threatening disease.

    Science.gov (United States)

    Cole, Beverley

    2014-02-01

    Meningococcal septicaemia is a life-threatening condition that all nurses working in emergency and urgent care settings are likely to come across during their careers. This article presents, and reflects on, a case study involving a woman with the disease whose signs and symptoms were atypical, and who was not therefore diagnosed with the condition immediately. The author aims to raise awareness among emergency nurses and nurse practitioners of the atypical signs and symptoms of the infection, and its consequences. The article also discusses how referring to patient scenarios can improve practice.

  4. Duodenal Wedge Resection for Large Gastrointestinal Stromal Tumour Presenting with Life-Threatening Haemorrhage

    Directory of Open Access Journals (Sweden)

    Alexander Shaw

    2013-01-01

    Full Text Available Background. Duodenal gastrointestinal stromal tumours (GISTs are an uncommon malignancy of the gastrointestinal (GI tract. We present a case of life-threatening haemorrhage caused by a large ulcerating duodenal GIST arising from the third part of the duodenum managed by a limited duodenal wedge resection. Case Presentation. A 61-year-old patient presented with acute life-threatening gastrointestinal bleeding. After oesophagogastroduodenoscopy failed to demonstrate the source of bleeding, a 5 cm ulcerating exophytic mass originating from the third part of the duodenum was identified at laparotomy. A successful limited wedge resection of the tumour mass was performed. Histopathology subsequently confirmed a duodenal GIST. The patient remained well at 12-month followup with no evidence of local recurrence or metastatic spread. Conclusion. Duodenal GISTs can present with life-threatening upper GI haemorrhage. In the context of acute haemorrhage, even relatively large duodenal GISTs can be treated by limited wedge resection. This is a preferable alternative to duodenopancreatectomy with lower morbidity and mortality but comparable oncological outcome.

  5. Life-threatening motor vehicle crashes in bright sunlight

    OpenAIRE

    Redelmeier, Donald A.; Raza, Sheharyar

    2017-01-01

    Abstract Bright sunlight may create visual illusions that lead to driver error, including fallible distance judgment from aerial perspective. We tested whether the risk of a life-threatening motor vehicle crash was increased when driving in bright sunlight. This longitudinal, case-only, paired-comparison analysis evaluated patients hospitalized because of a motor vehicle crash between January 1, 1995 and December 31, 2014. The relative risk of a crash associated with bright sunlight was estim...

  6. Rivaroxaban-Induced Nontraumatic Spinal Subdural Hematoma: An Uncommon Yet Life-Threatening Complication

    Directory of Open Access Journals (Sweden)

    Mazen Zaarour

    2015-01-01

    Full Text Available In the last decade, the desire for safer oral anticoagulants (OACs led to the emergence of newer drugs. Available clinical trials demonstrated a lower risk of OACs-associated life-threatening bleeding events, including intracranial hemorrhage, compared to warfarin. Nontraumatic spinal hematoma is an uncommon yet life-threatening neurosurgical emergency that can be associated with the use of these agents. Rivaroxaban, one of the newly approved OACs, is a direct factor Xa inhibitor. To the best of our knowledge, to date, only two published cases report the incidence of rivaroxaban-induced nontraumatic spinal subdural hematoma (SSDH. Our case is the third one described and the first one to involve the cervicothoracic spine.

  7. Candida albicans-associated necrotizing vasculitis producing life-threatening gastrointestinal hemorrhage.

    LENUS (Irish Health Repository)

    Sargent, Jeremy

    2012-02-01

    Patients undergoing treatment of acute lymphoblastic leukemia are at risk for fungal infections including disseminated candidiasis. We describe a case of systemic Candida albicans infection associated with life-threatening gastrointestinal hemorrhage due to unusual necrotizing vasculitis involving the gastrointestinal tract. We explore the association between Candida and such vasculopathy.

  8. [Therapy costs of adult patients admitting to emergency unit of a university hospital with asthma acute attack].

    Science.gov (United States)

    Serinken, Mustafa; Dursunoğlu, Neşe; Cimrin, Arif H

    2009-01-01

    In the present study, hospital costs of patients who admitted to the emergency department with asthma attack and several variables that could effect this cost were analyzed and data were collected in order to reduce economical burden of that disease was aimed. Between September 2005 and February 2007 patients with acute asthma attack, admitted to Pamukkale University Hospital Emergency Department were retrospectively evaluated. Totally 108 patients who met the inclusion criteria admitted to the emergency department with asthma acute attack. Of those 97 were women (89.8%). Forty mild, 51 moderate, 15 severe and 2 life-threatening attacks were detected. Severe and life-threatening attacks were more frequent in patients graduated from primary school compared with the other groups. Mean therapy costs of the patients who were hospitalized and treated in the emergency department were 836.60 +/- 324.30 TL (Turkish Lira) and 170.66 +/- 86.71 TL respectively. Treatment procedures consisted of 45.8% of and 38.5% hospital costs for patients treated in the emergency department and for patients hospitalized respectively. There was a statistically significant difference in the comparison of costs according to the attack severity (p= 0.0001). Education level of the patients had a significant effect on hospital costs (p= 0.025). Comorbidities were found a significant increasing factor of treatment costs (p= 0.017). There were no effects of sex, age, medical insurance or duration of asthma disease on the hospital costs. The relation between low-education level, living in the rural area and admissions with severe attacks of asthma to emergency department show the importance of treatment success with patient compliance. Positive and negative factors effecting disease control should be detected by evaluating larger populations to reduce economical burden of asthma.

  9. Guidelines for Managing Life-Threatening Food Allergies in Massachusetts Schools

    Science.gov (United States)

    Sheetz, Anne H.; Goldman, Patricia G.; Millett, Kathleen; Franks, Jane C.; McIntyre, C. Lynne; Carroll, Constance R.; Gorak, Diane; Harrison, Christanne Smith; Carrick, Michele Abu

    2004-01-01

    During the past decade, prevalence of food allergies among children increased. Caring for children with life-threatening food allergies has become a major challenge for school personnel Prior to 2002, Massachusetts did not provide clear guidelines to assist schools in providing a safe environment for these children and preparing for an emergency…

  10. Life-threatening Pneumocystis jiroveci pneumonia following treatment of severe Cushing's syndrome

    NARCIS (Netherlands)

    Oosterhuis, J. K.; van den Berg, G.; Monteban-Kooistra, W. E.; Ligtenberg, J. J. M.; Tulleken, J. E.; Zijlstra, J. G.; Meertens, John

    We describe two patients with a severe Cushing's syndrome due to ectopic production of ACTH. Both patients developed a life-threatening Pneumocystis jiroveci pneumonia (PCP) shortly after treatment of the hypercortisolism was started by means of inhibition of production of glucocorticoids and

  11. An extended family suddenly confronted with a life-threatening hereditary arrhythmia

    NARCIS (Netherlands)

    Hendriks, K.S.W.H.; Van Langen, I.M.; Van Tintelen, J.P.; Grosfeld, F.J.M.; Wilde, A.A.M.; Ten Kroode, H.F.J.

    2005-01-01

    Objective. This exploratory study serves to illustrate the psychological impact on an extended family in the process of genetic counselling and testing for a potentially life-threatening arrhythmia, the long-QT syndrome (LQTS). Method. All members of the third generation and their partners (n=11)

  12. An extended family suddenly confronted with a life-threatening hereditary arrhythmia

    NARCIS (Netherlands)

    Hendriks, K. S. W. H.; van Langen, I. M.; van Tintelen, J. P.; Grosfeld, F. J. M.; Wilde, A. A. M.; ten Kroode, H. F. J.

    2005-01-01

    This exploratory study serves to illustrate the psychological impact on an extended family in the process of genetic counselling and testing for a potentially life-threatening arrhythmia, the long-QT syndrome (LQTS). All members of the third generation and their partners (n=11) were interviewed, the

  13. The effects of life review on psycho-spiritual well-being among patients with life-threatening illness: a systematic review and meta-analysis.

    Science.gov (United States)

    Chen, Ying; Xiao, Huimin; Yang, Yanqing; Lan, Xiuyan

    2017-07-01

    The aim of this study was to examine the strength of evidence regarding the effects of life review on psycho-spiritual well-being among patients with life-threatening illness. Life-threatening illness not only causes physical symptoms but also psycho-spiritual burdens. Life review has been widely implemented to assist people coping with these burdens. However, the effectiveness of life review is not clear. To date, no systematic review or meta-analysis has been published on this topic. A systematic review with meta- analysis consistent with the recommendations of the Cochrane Collaboration was conducted. Database searches included MEDLINE, Cochrane Central Register of Controlled Trials, EMBASE, CINAHL, PsycINFO, CNKI and VIP et al. up to April 2015. We also searched the grey literature, reviewed reference lists from relevant articles and book chapters and contacted experts. Nine randomized controlled trials (RCTs) and two controlled clinical trials (CCTs) were eligible for this systematic review and meta-analysis. The risk of bias for those studies were rated as moderate (n = 11). The meta-analyses demonstrated significant standardized mean differences or mean differences in favour of life review compared with the control for depression, quality of life and self-esteem. The findings indicate that life review can decrease depressive symptoms, improve quality of life and enhance self-esteem among patients with life-threatening illnesses. Multi-centre studies with adequate sample size and rigorous designs are needed in future research. © 2016 John Wiley & Sons Ltd.

  14. Factors for poor prognosis of near-fatal asthma after recovery from a life-threatening asthma attack.

    Science.gov (United States)

    Kim, Myung Shin; Cho, Young Joo; Moon, Hee Bom; Cho, Sang Heon

    2008-12-01

    The aim of this study was to investigate poor prognostic factors associated with a near-fatal asthma attack following patient recovery. We enrolled 68 patients who suffered near-fatal asthma attacks and were admitted to the intensive care units of five university hospitals. The patients were divided into two groups. The first group was comprised of patients who discontinued oral corticosteroids within 6 months after being discharged from the hospital and who maintained a forced expiratory volume in 1 s (FEV(1)) >/=60% of the maximum or estimated values of the corresponding patients. The second group included patients who continued on oral corticosteroids for >/=6 months or who maintained a FEV(1) asthma, factors for a poor prognosis included older age [48.47+/-3.53 vs. 64.69+/-2.59 years, pasthma, high values for inflammation-related laboratory markers (ESR, 8.75+/-2.05 vs. 23.88+/-4.40 mm/h, p=0.004; CRP, 1.72+/-0.46 vs. 6.68+/-9.36 mg/dL, pasthma exacerbated by pneumonia (28.1 vs. 52.8%, pasthma or the need for continual oral corticosteroids after being discharged from the hospital. Patients with these factors should be treated appropriately, under close surveillance.

  15. Psychotherapeutic work with Families with Life-threatening Maternal Illness

    OpenAIRE

    Chinoy, Freni

    2016-01-01

    This exploratory research study describes a child and adolescent psychotherapeutic clinical service offered to children/adolescents and their families with mothers with a life-threatening illness. The clinical service itself was also exploratory in nature. The research objectives of the study were (i) to explore whether this form of clinical work could be beneficial for such families in relieving distress and supporting their development; (ii) to discover the factors at play within and betwee...

  16. Transient complete atrioventricular block with Morgagni—Adams—Stokes attacks in a child after aortic valve replacement

    Directory of Open Access Journals (Sweden)

    D. R. Sabirova

    2014-01-01

    Full Text Available The diagnosis and treatment of life-threatening arrhythmias after surgical correction of congenital heart diseases is one the urgent problems in pediatrlc cardiology. The paper describes the clinical picture, diagnosis, and therapy in a patent with transient complete atrioventricular block after open heart surgery. A protracted Morgagni—Adams—Stokes attack is one of the causes of sudden cardiac death. The occurrence of even single syncopes in patients after surgery for congenital heart disease requires that the arrhythmogenic nature of the attack should be ruled out for the timely and adequate therapy including the implantation of antiarrhythmic devices.

  17. The radiology perspective: needs and tools for management of life-threatening events

    International Nuclear Information System (INIS)

    Gaca, Ana Maria; Lerner, Catherine B.; Frush, Donald P.

    2008-01-01

    Studies have shown that life-threatening contrast agent reactions in adults are very rare, and even less common in children. The rarity of severe allergic reactions to contrast material challenges educators to achieve radiology resident competency in this setting. However, using a simulated anaphylactic contrast reaction paradigm, we have drawn two conclusions: (1) Residents are insufficiently prepared to recognize and manage these life-threatening events and (2) with an interactive, computer-based tool we can significantly improve resident performance in these situations. Simulation is a growing tool in medicine and allows standardized resident exposure to uncommon events in a setting that is conducive to resident education without fear of repercussions (see Ruddy and Patterson in this issue of Pediatric Radiology). More important, simulation provides a cornerstone in patient safety resident education without putting patients at risk. (orig.)

  18. The radiology perspective: needs and tools for management of life-threatening events

    Energy Technology Data Exchange (ETDEWEB)

    Gaca, Ana Maria; Lerner, Catherine B.; Frush, Donald P. [Duke University Medical Center, Department of Radiology, Durham, NC (United States)

    2008-11-15

    Studies have shown that life-threatening contrast agent reactions in adults are very rare, and even less common in children. The rarity of severe allergic reactions to contrast material challenges educators to achieve radiology resident competency in this setting. However, using a simulated anaphylactic contrast reaction paradigm, we have drawn two conclusions: (1) Residents are insufficiently prepared to recognize and manage these life-threatening events and (2) with an interactive, computer-based tool we can significantly improve resident performance in these situations. Simulation is a growing tool in medicine and allows standardized resident exposure to uncommon events in a setting that is conducive to resident education without fear of repercussions (see Ruddy and Patterson in this issue of Pediatric Radiology). More important, simulation provides a cornerstone in patient safety resident education without putting patients at risk. (orig.)

  19. Preparing School Personnel to Assist Students with Life-Threatening Food Allergies.

    Science.gov (United States)

    Hay, Genevieve H.; And Others

    1994-01-01

    Knowledge of and preparation for life-threatening food allergies will enable school personnel to better respond to students who have severe allergic reactions. Given the high incidence of food-related anaphylaxis in public places, teachers and school personnel should be aware of and prepared to handle severe food allergy reactions. (SM)

  20. Citation Classics in "Suicide and Life Threatening Behavior": A Research Note

    Science.gov (United States)

    Stack, Steven

    2012-01-01

    The number of citations a scholarly work receives is a common measure of its impact on the scientific literature; "citation classics" are the most highly cited works. The content of "Suicide and Life-Threatening Behavior" ("SLTB") citation classics is described here. The impact of "SLTB" citation classics is compared to their counterparts in…

  1. Understanding, Predicting, and Preventing Life Changing and Life Threatening Health Changes among Aging Veterans and Civilians with Spinal Cord Injury

    Science.gov (United States)

    2017-10-01

    AWARD NUMBER: W81XWH-16-1-0629 TITLE: Understanding, Predicting, and Preventing Life -Changing and Life -Threatening Health Changes among Aging...Annual 3. DATES COVERED 30 Sep 2016 - 29 Sep 2017 4. TITLE AND SUBTITLE Understanding, Predicting, and Preventing Life -Changing and Life ... hope of preventing them. Our purpose is to better understand the how and why of the development of negative health spirals and how they may best be

  2. Detection of Life Threatening Ventricular Arrhythmia Using Digital Taylor Fourier Transform.

    Science.gov (United States)

    Tripathy, Rajesh K; Zamora-Mendez, Alejandro; de la O Serna, José A; Paternina, Mario R Arrieta; Arrieta, Juan G; Naik, Ganesh R

    2018-01-01

    Accurate detection and classification of life-threatening ventricular arrhythmia episodes such as ventricular fibrillation (VF) and rapid ventricular tachycardia (VT) from electrocardiogram (ECG) is a challenging problem for patient monitoring and defibrillation therapy. This paper introduces a novel method for detection and classification of life-threatening ventricular arrhythmia episodes. The ECG signal is decomposed into various oscillatory modes using digital Taylor-Fourier transform (DTFT). The magnitude feature and a novel phase feature namely the phase difference (PD) are evaluated from the mode Taylor-Fourier coefficients of ECG signal. The least square support vector machine (LS-SVM) classifier with linear and radial basis function (RBF) kernels is employed for detection and classification of VT vs. VF, non-shock vs. shock and VF vs. non-VF arrhythmia episodes. The accuracy, sensitivity, and specificity values obtained using the proposed method are 89.81, 86.38, and 93.97%, respectively for the classification of Non-VF and VF episodes. Comparison with the performance of the state-of-the-art features demonstrate the advantages of the proposition.

  3. Israeli Adolescents' Coping Strategies in Relation to Terrorist Attacks

    Science.gov (United States)

    Tatar, Moshe; Amram, Sima

    2007-01-01

    Exposure to terrorism seriously threatens the well-being of children and adolescents. Israeli citizens have witnessed massive ongoing terrorist attacks during the last few years. The present research, conducted among 330 Israeli adolescents, examined coping strategies in relation to terrorist attacks. We found that adolescents utilize more…

  4. Clinical risk factors for life-threatening lower respiratory tract infections in children: a retrospective study in an urban city in Malaysia.

    Science.gov (United States)

    Nathan, Anna Marie; Rani, Fairuz; Lee, Rachel Jiun Yi; Zaki, Rafdzah; Westerhout, Caroline; Sam, I-Ching; Lum, Lucy Chai See; de Bruyne, Jessie

    2014-01-01

    Lower respiratory tract infections (LRTIs) are an important cause of morbidity and mortality, especially in low income countries. The aim of this study was to determine risk factors of life-threatening LRTIs in hospitalised children in Malaysia. This retrospective study included children aged less than 18 years admitted for LRTIs over 13 months in a tertiary referral centre in Kuala Lumpur, Malaysia. Neonates, children with asthma and those with either no or a normal chest radiograph were excluded. Life-threatening infection was defined as that needing non-invasive ventilation or admission to the paediatric intensive care unit. Routine blood investigations and nasopharyngeal secretion results (bacterial and viral) were obtained. Chest radiographs were reviewed by a designated radiologist. Environmental data (rainfall, particulate matter ≤ 10 µm [PM10] and air pollution index [API]) was obtained from the respective government departments. Three hundred and ninety-one episodes of LRTIs were included. Viruses were implicated in 48.5% of LRTIs, with respiratory syncytial virus (RSV) being detected in 44% of viral LRTIs. Forty-six (11.8%) children had life-threatening disease and the overall mortality rate was 1.3% (5 children). RSV was detected in 26% of children with life-threatening LRTIs. In multivariate logistic regression, chronic lung disease, presenting history of apnoea and signs of hypoxia, was associated with life threatening LRTIs. Increased LRTI admissions were associated with low rainfall but not PM10 nor API. Of those on follow-up, 39% had persistent respiratory symptoms. One in nine children admitted with LRTI had a life-threatening LRTI. The aetiology was viral in almost half of admitted children. RSV was detected in a quarter of children with life-threatening LRTIs. Children who present with LRTIs and either have chronic lung disease, presenting history of apnoea or signs of hypoxia, should be observed carefully as the risk of deterioration to life-threatening

  5. Prospective effect of community distress and subcultural orientation on mortality following life-threatening diseases in later life.

    Science.gov (United States)

    Wen, Ming; Christakis, Nicholas A

    2006-07-01

    We conducted a prospective and contextual study to examine the effects of community social-economic-physical distress and subcultural orientation on mortality following onset of 13 life-threatening diseases in later life. We also examined the inter-relationship between the effects of community social, economic and physical distress (i.e. poverty, physical disorder and low collective efficacy) and subcultural orientation (i.e. anomie and tolerance of risk behaviour) on the survival chances of seriously ill older patients. Three data sources were combined to construct the working sample: 1990 Census data, the 1994-95 PHDCN-CS, and the COSI data. Fifty-one ZIP code areas in Chicago and 12,672 elderly patients were studied. Community distress (HR = 1.04; 95% CI = (1.01, 1.07)) and anomie (HR = 1.26; 95% CI = (1.02, 1.54)) are found to be significantly and positively associated with a higher hazard of death. Moreover, community anomie contributes to the effect of community distress on post-hospitalisation mortality. The social, economic, physical and cultural environment in which people live appears to exert a significant impact on whether older people facing life-threatening illness live or die.

  6. A life-threatening case of disseminated nocardiosis due to Nocardia brasiliensis.

    Science.gov (United States)

    Paramythiotou, Elisabeth; Papadomichelakis, Evangelos; Vrioni, Georgia; Pappas, Georgios; Pantelaki, Maria; Kontos, Fanourios; Zerva, Loukia; Armaganidis, Apostolos

    2012-10-01

    Nocardiosis is a rare disease caused by infection with Nocardia species, aerobic actinomycetes with a worldwide distribution. A rare life-threatening disseminated Nocardia brasiliensis infection is described in an elderly, immunocompromised patient. Microorganism was recovered from bronchial secretions and dermal lesions, and was identified using molecular assays. Prompt, timely diagnosis and appropriate treatment ensured a favorable outcome.

  7. Acute or chronic life-threatening diseases associated with Epstein-Barr virus infection.

    Science.gov (United States)

    Okano, Motohiko; Gross, Thomas G

    2012-06-01

    Infectious mononucleosis (IM) is one of the representative, usually benign, acute diseases associated with primary Epstein-Barr virus (EBV) infection. IM is generally self-limiting and is characterized mostly by transient fever, lymphadenopathy and hepatosplenomegaly. However, very rarely primary EBV infection results in severe or fatal conditions such as hemophagocytic lymphohistiocytosis together with fulminant hepatitis designated as severe or fatal IM or EBV-associated hemophagocytic lymphohistiocytosis alone. In addition, chronic EBV-associated diseases include Burkitt's lymphoma, undifferentiated nasopharyngeal carcinoma, Hodgkin lymphoma, T-cell lymphoproliferative disorder (LPD)/lymphoma, natural killer-cell LPD including leukemia or lymphoma, gastric carcinoma, pyothorax-associated lymphoma and senile B-cell LPD as well as chronic active EBV infection and LPD/lymphoma in patients with immunodeficiency. The number of chronic life-threatening diseases linked to the EBV infection is increasingly reported and many of these diseases have a poor prognosis. This review will focus on the historical, pathogenetic, diagnostic, therapeutic and prophylactic issues of EBV-associated life-threatening diseases.

  8. Hope in action—facing cardiac death: A qualitative study of patients with life-threatening disease

    Directory of Open Access Journals (Sweden)

    Margrethe Aase Schaufel

    2011-03-01

    Full Text Available Coping with existential challenges is important when struck by serious disease, but apart from cancer and palliative care little is known about how patients deal with such issues and maintain hope. To explore how patients with life-threatening heart disease experience hope when coping with mortality and other existential challenges, we conducted a qualitative study with semi-structured interviews. We made a purposive sample of 11 participants (26–88 years who had experienced life-threatening disease: eight participants with serious heart disease, two with cancer, and one with severe chronic obstructive pulmonary disease. Analysis was by systematic text condensation. The findings showed that hope could enhance coping and diminish existential distress when patients were confronted with mortality and other existential challenges. Hope was observed as three types of dynamic work: to shift perception of mortality from overwhelming horror toward suppression or peaceful acceptance, to foster reconciliation instead of uncertainty when adapting to the new phase of life, and to establish go-ahead spirit instead of resignation as their identity. Meaning of life could, hence, be sustained in spite of serious threats to the persons’ future, everyday life, and self-conception. The work of hoping could be supported or disturbed by relationships with family, friends, and health care professionals. Hope can be regarded as an active, dynamic state of existential coping among patients with life-threatening disease. Physicians may support this coping and thereby provide personal growth and alleviation of existential distress by skillfully identifying, acknowledging, and participating in the work of hoping performed by the patient.

  9. Hope in action—facing cardiac death: A qualitative study of patients with life-threatening disease

    Science.gov (United States)

    Schaufel, Margrethe Aase; Nordrehaug, Jan Erik; Malterud, Kirsti

    2011-01-01

    Coping with existential challenges is important when struck by serious disease, but apart from cancer and palliative care little is known about how patients deal with such issues and maintain hope. To explore how patients with life-threatening heart disease experience hope when coping with mortality and other existential challenges, we conducted a qualitative study with semi-structured interviews. We made a purposive sample of 11 participants (26–88 years) who had experienced life-threatening disease: eight participants with serious heart disease, two with cancer, and one with severe chronic obstructive pulmonary disease. Analysis was by systematic text condensation. The findings showed that hope could enhance coping and diminish existential distress when patients were confronted with mortality and other existential challenges. Hope was observed as three types of dynamic work: to shift perception of mortality from overwhelming horror toward suppression or peaceful acceptance, to foster reconciliation instead of uncertainty when adapting to the new phase of life, and to establish go-ahead spirit instead of resignation as their identity. Meaning of life could, hence, be sustained in spite of serious threats to the persons' future, everyday life, and self-conception. The work of hoping could be supported or disturbed by relationships with family, friends, and health care professionals. Hope can be regarded as an active, dynamic state of existential coping among patients with life-threatening disease. Physicians may support this coping and thereby provide personal growth and alleviation of existential distress by skillfully identifying, acknowledging, and participating in the work of hoping performed by the patient. PMID:21423599

  10. Hope in action-facing cardiac death: A qualitative study of patients with life-threatening disease.

    Science.gov (United States)

    Schaufel, Margrethe Aase; Nordrehaug, Jan Erik; Malterud, Kirsti

    2011-03-18

    Coping with existential challenges is important when struck by serious disease, but apart from cancer and palliative care little is known about how patients deal with such issues and maintain hope. To explore how patients with life-threatening heart disease experience hope when coping with mortality and other existential challenges, we conducted a qualitative study with semi-structured interviews. We made a purposive sample of 11 participants (26-88 years) who had experienced life-threatening disease: eight participants with serious heart disease, two with cancer, and one with severe chronic obstructive pulmonary disease. Analysis was by systematic text condensation. The findings showed that hope could enhance coping and diminish existential distress when patients were confronted with mortality and other existential challenges. Hope was observed as three types of dynamic work: to shift perception of mortality from overwhelming horror toward suppression or peaceful acceptance, to foster reconciliation instead of uncertainty when adapting to the new phase of life, and to establish go-ahead spirit instead of resignation as their identity. Meaning of life could, hence, be sustained in spite of serious threats to the persons' future, everyday life, and self-conception. The work of hoping could be supported or disturbed by relationships with family, friends, and health care professionals. Hope can be regarded as an active, dynamic state of existential coping among patients with life-threatening disease. Physicians may support this coping and thereby provide personal growth and alleviation of existential distress by skillfully identifying, acknowledging, and participating in the work of hoping performed by the patient.

  11. Role of Rhinovirus C in Apparently Life-Threatening Events in Infants, Spain

    Science.gov (United States)

    García, M. Luz; Pozo, Francisco; Reyes, Noelia; Pérez-Breña, Pilar; Casas, Inmaculada

    2009-01-01

    To assess whether infants hospitalized after an apparently life-threatening event had an associated respiratory virus infection, we analyzed nasopharyngeal aspirates from 16 patients. Nine of 11 infants with positive virus results were infected by rhinoviruses. We detected the new genogroup of rhinovirus C in 6 aspirates. PMID:19788827

  12. Denial-of-service attack detection based on multivariate correlation analysis

    NARCIS (Netherlands)

    Tan, Zhiyuan; Jamdagni, Aruna; He, Xiangjian; Nanda, Priyadarsi; Liu, Ren Ping; Lu, Bao-Liang; Zhang, Liqing; Kwok, James

    2011-01-01

    The reliability and availability of network services are being threatened by the growing number of Denial-of-Service (DoS) attacks. Effective mechanisms for DoS attack detection are demanded. Therefore, we propose a multivariate correlation analysis approach to investigate and extract second-order

  13. Ectopic pregnancy: a life-threatening gynecological emergency

    Directory of Open Access Journals (Sweden)

    Lawani OL

    2013-08-01

    Full Text Available Osaheni L Lawani, Okechukwu B Anozie, Paul O Ezeonu Department of Obstetrics and Gynecology, Federal Teaching Hospital, Abakaliki, Nigeria Background: Ectopic pregnancy is a life-threatening gynecological emergency, and a significant cause of maternal morbidity and mortality in Nigeria. Objective: The aim of this work was to determine and evaluate the incidence, clinical presentation, risk factors, and management outcomes of ectopic pregnancies at Ebonyi State University Teaching Hospital (EBSUTH in Abakaliki. Methods: This was a retrospective, descriptive study of ectopic pregnancies managed in EBSUTH during the study period (June 1, 2002 to May 31, 2012. The medical records of the patients managed for ectopic pregnancy as well as the total birth record and gynecological admission records during the period under review were retrieved, and data were collected with the aid of data-entry forms designed for this purpose. There were 4,610 gynecological admissions and 9,828 deliveries, with 215 cases of ectopic pregnancies. A total of 205 cases were suitable for analysis after excluding cases with incomplete records. The relevant data collected were analyzed with SPSS version 15.0 for Windows. Results: Ectopic pregnancy constituted 4.5% of all gynecological admissions, and its incidence was 2.1%. The mean age of the patients was 27 ± 2 years, 196 of 205 (95.6% had ruptured ectopic pregnancies, and the remaining nine (4.4% were unruptured. The commonest (166 of 205, 80.0% clinical presentation was abdominal pain, and the commonest (105 of 205, 51.2% identified risk factor was a previous history of induced abortion. Three deaths were recorded, giving a case-fatality rate of 1.4% (three of 205. Conclusion: Ectopic pregnancy is a recognized cause of maternal morbidity and mortality and has remained a reproductive health challenge to Nigerian women, as well as a threat to efforts in achieving the UN's Millennium Development Goal 5 in sub-Saharan Africa

  14. Potentialities of embolization of life threatening hemorrhages

    International Nuclear Information System (INIS)

    Moskvichev, V.G.

    1985-01-01

    The author analysed experience in the embolization of the abdominal vessels in 79 patients with diseases and lesions of the peritoneal cavity and retroperitoneal space accompanied by life threatening hemorrhage. In 51 cases embolization was used as an independent method of hemorrhage arrest and in 28 cases for patients' preoperative preparation. A hemostatic sponge combined with a superselective administration of 150-200 ml of aminocaproic acid was used as an emboilizing material. Complications attributed to embolization were noted in 5 patients: pancreatitis, subdiaphragmatic abscess, paranephritis, ischemia of the gluteal soft tissues, sciatic neuritis. An analysis has shown that urgent embolization of the abdominal vessels in diseases and lesions of the organs of the peritoneal cavity and retroperitoneal space accompanied by massive hemorrhage, can be used as an independent method for hemorrhage arrest

  15. Mesenteric vascular occlusion: Comparison of ancillary CT findings between arterial and venous occlusions and independent CT findings suggesting life-threatening events

    International Nuclear Information System (INIS)

    Wong, Yon Cheong; Wu, Cheng Hsien; Wang, Li Jen; Chen, Huan Wu; Lin, Being Chuan; Huang, Chen Chih

    2013-01-01

    To compare the ancillary CT findings between superior mesenteric artery thromboembolism (SMAT) and superior mesenteric vein thrombosis (SMVT), and to determine the independent CT findings of life-threatening mesenteric occlusion. Our study was approved by the institution review board. We included 43 patients (21 SMAT and 22 SMVT between 1999 and 2008) of their median age of 60.0 years, and retrospectively analyzed their CT scans. Medical records were reviewed for demographics, management, surgical pathology diagnosis, and outcome. We compared CT findings between SMAT and SMVT groups. Multivariate analysis was conducted to determine the independent CT findings of life-threatening mesenteric occlusion. Of 43 patients, 24 had life-threatening mesenteric occlusion. Death related to mesenteric occlusion was 32.6%. A thick bowel wall (p < 0.001), mesenteric edema (p < 0.001), and ascites (p = 0.009) were more frequently associated with SMVT, whereas diminished bowel enhancement (p = 0.003) and paralytic ileus (p = 0.039) were more frequent in SMAT. Diminished bowel enhancement (OR = 20; p = 0.007) and paralytic ileus (OR = 16; p = 0.033) were independent findings suggesting life-threatening mesenteric occlusion. The ancillary CT findings occur with different frequencies in SMAT and SMVT. However, the independent findings indicating life-threatening mesenteric occlusion are diminished bowel wall enhancement and paralytic ileus.

  16. Life-Threatening Thrombocytopenia Following Intravenous Contrast Media Infusion.

    Science.gov (United States)

    Park, Mihwa; Kim, Minjeong; Park, Jisun; Cho, Jinhyun

    2018-01-01

    Radiocontrast media-induced acute severe thrombocytopenia is a very rare complication and potentially life-threatening. Here, we report the case of a 63-year-old male patient with severe acute thrombocytopenia following first exposure to intravenous non-ionic contrast media without immediate allergic reactions. His platelet count dropped from 107000/μL to 2000/μL after six hours of radiocontrast infusion. After administration of corticosteroid and transfusion of platelet concentrates, the platelet count returned gradually to normal within 5 days. To the best of our knowledge, non-ionic contrast media-induced isolated acute severe thrombocytopenia following no signs or symptoms of immediate allergic reaction has never been described. © Copyright: Yonsei University College of Medicine 2018.

  17. Life-Threatening Hypernatremia In A Case Of Diabetes Insipidus/Panhypopituitarism

    Directory of Open Access Journals (Sweden)

    Ekamol Tantisattamo

    2012-06-01

    Water balance is controlled by thyroid, glucocorticoid, and principally ADH working at the renal effector level while the RAAS principally controls sodium balance. Together these hormones tightly regulate serum sodium concentration. Managing hospitalized patients with DI/panhypopituitarism requires knowledge of the intricate interplay between ADH and thyroid/glucocorticoid tone to minimize the risk for dangerous sodium fluctuations. It is usually better to err on the side of mild hyponatremia than holding DDAVP in these complex patients which can lead to life threatening hypernatremia.

  18. Organising pneumonia presenting as acute life threatening pulmonary haemorrhage.

    Science.gov (United States)

    Narasimhaiah, Damodhara Honnavally; Chakravorty, Indranil; Swamy, Rajiv; Prakash, Doraiswamy

    2011-11-08

    Organising pneumonia, previously called bronchiolitis obliterans organising pneumonia is a clinicopathological entity of unknown aetiology, which has been reported with increasing frequency. Various modes of presentation have been described such as cough, fever, weight loss and alveolar opacities on chest radiograph. Haemoptysis as primary presenting symptom has only rarely been reported. The authors report a case in which massive life-threatening haemoptysis was the major presenting symptom. No aetiology was identified for the haemoptysis and the diagnosis was confirmed on postmortem histology. This case highlights the importance of considering organising pneumonia in the differential diagnosis of acute severe haemoptysis.

  19. POSITIVE LIVING STRATEGIES THAT CAN BE LEARNED FROM STUDIES ON NEAR-DEATH EXPERIENCES AND LIFE-THREATENING ILLNESSES

    Directory of Open Access Journals (Sweden)

    Kasiram, Madhu

    2015-09-01

    Full Text Available This article addresses the two related issues of near-death experience and life-threatening illness with a view to helping survivors and helping professionals appreciate how to make sense of the experience whilst considering future living and future service provision. The article is based on two related research studies, citing literature from different disciplines of nursing, women’s health, spirituality and near death. This research was undertaken in the light of these experiences affecting so many aspects of life and living. The need to “dialogue with death” (Easwaran, 2008: Foreword and life-threatening illness is the key message as opposed to shunning what is not readily understood and appreciated

  20. Life-threatening hereditary angio-oedema: Challenges of care in South Africa.

    Science.gov (United States)

    Potter, P; Peter, J

    2018-03-28

    The report and description by Coovadia et al.[1] in this issue of SAMJ of a large cohort of patients in the Western Cape Province of South Africa (SA) suffering from type 1 hereditary angio-oedema (HAE) not only documents for the first time a significant presence of this life-threatening condition on the African continent but highlights the challenges of diagnosis and management in the SA socioeconomic and healthcare context.

  1. Heparin-Induced Cardiac Tamponade and Life-Threatening Hyperkalemia in a Patient with Chronic Hemodialysis

    Directory of Open Access Journals (Sweden)

    Ho-Ming Su

    2005-03-01

    Full Text Available Heparin, a commonly used anticoagulant agent, is frequently used in patients undergoing hemodialysis. As with most medications, heparin has a significant side effect profile. Two of its most important side effects, major bleeding and hyperkalemia, may be devastating without immediate diagnosis and treatment. Major bleeding such as gastrointestinal, genitourinary or intracranial bleeding is occasionally encountered and rarely neglected. However, heparin-induced cardiac tamponade is rarely encountered and may be easily overlooked. Another side effect, heparin-induced hyperkalemia, an unusual but well-described side effect, is frequently forgotten until life-threatening arrhythmia has occurred. We report a case involving a 40-year-old male patient with uremia, who had received heparin for 10 days for deep vein thrombosis in the left lower extremity. Hemopericardium with cardiac tamponade and life-threatening hyperkalemia were both noted in this patient.

  2. Parental spirituality in life-threatening pediatric cancer.

    Science.gov (United States)

    Nicholas, David B; Barrera, Maru; Granek, Leeat; D'Agostino, Norma Mammone; Shaheed, Jenny; Beaune, Laura; Bouffet, Eric; Antle, Beverley

    2017-01-01

    This study addressed parental spirituality in the context of pediatric cancer with a poor prognosis. Drawing upon previous research implementing a longitudinal grounded theory design examining parental hope, 35 parents were interviewed regarding their experiences with an emergent description of the role of spirituality in parents' daily lives. Spirituality included religious beliefs and practices, notions of a higher force or cosmos, relationship with a divine being, as well as elements emerging from meaning-making and relationships. Parental expectations of spirituality remained relatively constant across data collection time points (3-9 months postdiagnosis), although limited variation occurred relative to shifting circumstance (e.g., deterioration of the child's condition). Spirituality appeared to offer: greater acceptance of parents' inability to protect their child from harm related to her/his life-threatening illness, guidance and emotion decompression, and support from one's faith community. Recommendations for integrating spiritual assessment in clinical care practice are offered.

  3. On the eve of war: authoritarianism, social dominance, and American students' attitudes toward attacking Iraq.

    Science.gov (United States)

    McFarland, Sam G

    2005-03-01

    In the week before the 2003 American attack on Iraq, the effects of authoritarianism and the social dominance orientation on support for the attack were examined. Based on prior research on the nature of these constructs, a structural model was developed and tested. As predicted, authoritarianism strengthened support for the attack by intensifying the perception that Iraq threatened America. Social dominance increased support by reducing concern for the likely human costs of the war. Both also increased blind patriotism, which in turn reduced concern for the war's human costs and was reciprocally related to the belief that Iraq threatened America.

  4. Life-threatening necrotizing fasciitis of the neck: an unusual consequence of a sore throat

    NARCIS (Netherlands)

    Persaud, R.; Krahé, D.; Georgalas, C.; Kaniyur, S.; Das, S.; Alusi, G.

    2004-01-01

    BACKGROUND: Necrotizing fasciitis is life-threatening bacterial infection which spreads with frightening speed along the fascial planes resulting in extensive tissue necrosis and often death. The infection is caused by either Group A streptococci or a combination of aerobic and anaerobic bacteria.

  5. Resolution of a life-threatening complication after lung radiofrequency ablation.

    Science.gov (United States)

    Andreetti, Claudio; Maurizi, Giulio; Cassiano, Francesco; Rendina, Erino Angelo

    2014-10-01

    Lung radiofrequency ablation (RFA) is an option for the treatment of unresectable lung cancer. Clinical investigators have previously warned against severe complications associated with this procedure. We report a case of life-threatening complication after lung RFA for non-operable non-small-cell lung cancer consisting of pulmonary abscess evolving into a bronchopleural fistula, severe pneumothorax and septic pleuritis, which was successfully treated with a multimodal conservative approach. © The Author 2014. Published by Oxford University Press on behalf of the European Association for Cardio-Thoracic Surgery. All rights reserved.

  6. Can femoral dialysis catheter insertion cause a life threatening complication?

    Directory of Open Access Journals (Sweden)

    Nurkay Katrancıoğlu

    2014-09-01

    Full Text Available Venous catheter (VC insertion may be necessary for the patients with renal failure facing vascular access problem. Femoral VCs are commonly used for their lower complication rates especially in emergency clinics. The incidence of bleeding associated with VC is reported 0.5-1.6%, however, life threatening hemorrhage and complications requiring surgical intervention are very rare. In this manuscript, we aimed to present a case with hemolytic uremic syndrome complicated with retroperitoneal hematoma after femoral VC insertion. J Clin Exp Invest 2014; 5 (3: 472-474

  7. Life-threatening bleeding in a case of autoantibody-induced factor VII deficiency.

    Science.gov (United States)

    Okajima, K; Ishii, M

    1999-02-01

    A male patient presented with life-threatening bleeding induced by autoantibody-induced factor VII (F.VII) deficiency. This patient had macroscopic hematuria, skin ecchymosis, gastrointestinal bleeding, and a neck hematoma that was causing disturbed respiration. He developed acute renal failure and acute hepatic failure, probably due to obstruction of the ureters and the biliary tract, respectively. Although activated partial thromboplastin time was normal, prothrombin time (PT) was remarkably prolonged at 71.8 seconds compared to 14.0 seconds in a normal control. Both the immunoreactive level of F.VII antigen and the F.VII activity of the patient's plasma samples were VII activity. These findings suggested the presence of a plasma inhibitor for F.VII. After administration of large doses of methylprednisolone, PT was gradually shortened and plasma levels of F.VII increased over time. Bleeding, acute renal failure, and acute hepatic failure improved markedly following the steroid treatment. These observations suggest that life-threatening bleeding can be induced by autoantibody-induced F.VII deficiency and that immunosuppressive therapy using large doses of steroid can be successful in inhibiting the production of the autoantibody.

  8. Suicide to harass others: clues from mythology to understanding suicide bombing attacks.

    Science.gov (United States)

    Preti, Antonio

    2006-01-01

    Suicide by revenge, the Samsonic suicide, and the suicide by devotio, all described in classical mythology and also reported in the ethnographic literature, belong to the same class of suicidal behaviors as kamikaze suicide and the suicide bombing attack: suicide to harass and burden others or suicide with a hostile intent. The lack of a social dimension to share in a positive manner may lead an individual to integrate him/herself in another social structure, e.g., a military organization, which allows the individual to express his/her desires and personal identity only by destroying others and themselves. The dynamics of these forms of suicide are also likely to work in other displays of life-threatening behavior, such as family annihilation, mass murder, and spree killing. A more thorough investigation of the dynamics operating in suicide bombing attacks could, therefore, contribute to preventative strategies against violence at large.

  9. "Awake" ECCO2R superseded intubation in a near-fatal asthma attack.

    Science.gov (United States)

    Schneider, Thomas-Michael; Bence, Tibor; Brettner, Franz

    2017-01-01

    Near-fatal asthma attacks are life threatening events that often require mechanical ventilation. Extracorporeal carbon dioxide removal (ECCO 2 R) is, beside extracorporeal membrane oxygenation (ECMO), a well-established rescue option whenever ventilation gets to its limits. But there seems to be very rare experience with those techniques in avoiding mechanical ventilation in severe asthma attacks. A 67-year-old man with a near-fatal asthma attack deteriorated under non-invasive ventilation conditions. Beside pharmacological treatment, the intensivists decided to use an extracorporeal carbon dioxide removal system (ECCO 2 R) to avoid sedation and intubation. Within only a few hours, there was a breakthrough and the patient's status improved continuously. One and a half days later, weaning from ECCO 2 R was already completed. The discussion deals with several advantages of extracorporeal lung support in acute asthma, the potential of avoiding intubation and sedation, as well as the benefits of a conscious and spontaneously breathing patient. Extracorporeal membrane oxygenation (ECMO) in general and ECCO 2 R in particular is a highly effective method for the treatment of an acute near-fatal asthma attack. Pathophysiological aspects favor the "awake" approach, without sedation, intubation, and mechanical ventilation. Therefore, experienced clinicians might consider "awake" ECCO 2 R in similar cases.

  10. Development of mental health first aid guidelines for panic attacks: a Delphi study

    Directory of Open Access Journals (Sweden)

    Jorm Anthony F

    2009-08-01

    Full Text Available Abstract Background Panic attacks are common, and while they are not life-threatening events, they can lead to the development of panic disorder and agoraphobia. Appropriate help at the time that a panic attack occurs may decrease the fear associated with the attack and reduce the risk of developing an anxiety disorder. However, few people have the knowledge and skills required to assist. Simple first aid guidelines may help members of the public to offer help to people who experience panic attacks. Methods The Delphi method was used to reach consensus in a panel of experts. Experts included 50 professionals and 6 people who had experience of panic attacks and were active in mental health advocacy. Statements about how to assist someone who is having a panic attack were sourced through a systematic search of both professional and lay literature. These statements were rated for importance as first aid guidelines by the expert and consumer panels and guidelines were written using the items most consistently endorsed. Results Of 144 statements presented to the panels, 27 were accepted. These statements were used to develop the guidelines appended to this paper. Conclusion There are a number of actions which are considered to be useful for members of the public to do if they encounter someone who is having a panic attack. These guidelines will be useful in revision of curricula of mental health first aid programs. They can also be used by members of the public who want immediate information about how to assist someone who is experiencing panic attacks.

  11. Partial protoporphyrinogen oxidase (PPOX gene deletions, due to different Alu-mediated mechanisms, identified by MLPA analysis in patients with variegate porphyria

    Directory of Open Access Journals (Sweden)

    Barbaro Michela

    2013-01-01

    Full Text Available Abstract Variegate porphyria (VP is an autosomal dominantly inherited hepatic porphyria. The genetic defect in the PPOX gene leads to a partial defect of protoporphyrinogen oxidase, the penultimate enzyme of heme biosynthesis. Affected individuals can develop cutaneous symptoms in sun-exposed areas of the skin and/or neuropsychiatric acute attacks. The identification of the genetic defect in VP families is of crucial importance to detect the carrier status which allows counseling to prevent potentially life threatening neurovisceral attacks, usually triggered by factors such as certain drugs, alcohol or fasting. In a total of 31 Swedish VP families sequence analysis had identified a genetic defect in 26. In the remaining five families an extended genetic investigation was necessary. After the development of a synthetic probe set, MLPA analysis to screen for single exon deletions/duplications was performed. We describe here, for the first time, two partial deletions within the PPOX gene detected by MLPA analysis. One deletion affects exon 5 and 6 (c.339-197_616+320del1099 and has been identified in four families, most probably after a founder effect. The other extends from exon 5 to exon 9 (c.339-350_987+229del2609 and was found in one family. We show that both deletions are mediated by Alu repeats. Our findings emphasize the usefulness of MLPA analysis as a complement to PPOX gene sequencing analysis for comprehensive genetic diagnostics in patients with VP.

  12. It is not just a Minor Thing - A Phenomenological-Hermeneutic Study of Patients' Experiences when afflicted by a Minor Heart Attack and Participating in Cardiac Rehabilitation

    DEFF Research Database (Denmark)

    Simonÿ, Charlotte P; Dreyer, Pia; Pedersen, Birthe D

    2017-01-01

    , leading to vulnerability and helplessness; Understanding that life has become frail: patients feel shaken as they realise that the disease is chronic and life-threatening; and An altered life: patients must adjust to new limitations in their everyday lives. Conclusions: Patients experience an overall...... demanding transition when they are afflicted by a minor heat attack, whereby their lives are sweepingly changed. Supporting patients’ integrity, which becomes vulnerable during the various stages of transitions, is essential to ensure a healthy outcome. Being together with fellow patients during cardiac...

  13. [Reduced number of fatal and life-threatening reactions to food. Reporting by the medical profession has resulted in effective measures].

    Science.gov (United States)

    Foucard, Tony; Yman, Ingrid Malmheden; Nordvall, Lennart

    The results from the Swedish system for reporting severe and fatal reactions caused by food for the period 1993-96 were published in Lakartidningen in 1997. We now report the results for the period 1997-2003. The number of fatal cases has decreased from 1.75 to 0.86 per year and the number of life-threatening cases from 3 to I per year. The most gratifying result was the large decrease in severe reactions caused by soy, from 3 deaths and 6 life-threatening cases during the first 4-year period to just one life-threatening case during the following 7-year period. This reduction is probably largely due to an increased awareness of identified risk persons, but also to a reduced use of soy protein. The ongoing study illustrates the usefulness of a national system for reporting severe and fatal reactions caused by food.

  14. A Novel Protective Framework for Defeating HTTP-Based Denial of Service and Distributed Denial of Service Attacks

    Directory of Open Access Journals (Sweden)

    Mohammed A. Saleh

    2015-01-01

    Full Text Available The growth of web technology has brought convenience to our life, since it has become the most important communication channel. However, now this merit is threatened by complicated network-based attacks, such as denial of service (DoS and distributed denial of service (DDoS attacks. Despite many researchers’ efforts, no optimal solution that addresses all sorts of HTTP DoS/DDoS attacks is on offer. Therefore, this research aims to fix this gap by designing an alternative solution called a flexible, collaborative, multilayer, DDoS prevention framework (FCMDPF. The innovative design of the FCMDPF framework handles all aspects of HTTP-based DoS/DDoS attacks through the following three subsequent framework’s schemes (layers. Firstly, an outer blocking (OB scheme blocks attacking IP source if it is listed on the black list table. Secondly, the service traceback oriented architecture (STBOA scheme is to validate whether the incoming request is launched by a human or by an automated tool. Then, it traces back the true attacking IP source. Thirdly, the flexible advanced entropy based (FAEB scheme is to eliminate high rate DDoS (HR-DDoS and flash crowd (FC attacks. Compared to the previous researches, our framework’s design provides an efficient protection for web applications against all sorts of DoS/DDoS attacks.

  15. Near-death-like experiences without life-threatening conditions or brain disorders: a hypothesis from a case report

    Directory of Open Access Journals (Sweden)

    Enrico eFacco

    2012-11-01

    Full Text Available Near-death experiences (NDEs are profound psychic experiences commonly occurring in life-threatening conditions. They include feeling a sense of peace, of seeing a bright light, encountering deceased relatives or religious figures, and of transcending space and time. To explain them, it has been suggested that they stem from brain disorders and/or psychological reactions to approaching death, a sort of wishful thinking in response to the perceived threat.This is a report on a case with most of the features typical of NDEs except that it occurred entirely without any life-threatening conditions. This evidence is theoretically incompatible with either of the above hypotheses, suggesting that a broader interpretation of the phenomenon is needed.

  16. At the heart of morality lies neuro-visceral integration: lower cardiac vagal tone predicts utilitarian moral judgment

    Science.gov (United States)

    Kappes, Andreas; Rho, Yeojin; Van Bavel, Jay J.

    2016-01-01

    To not harm others is widely considered the most basic element of human morality. The aversion to harm others can be either rooted in the outcomes of an action (utilitarianism) or reactions to the action itself (deontology). We speculated that the human moral judgments rely on the integration of neural computations of harm and visceral reactions. The present research examined whether utilitarian or deontological aspects of moral judgment are associated with cardiac vagal tone, a physiological proxy for neuro-visceral integration. We investigated the relationship between cardiac vagal tone and moral judgment by using a mix of moral dilemmas, mathematical modeling and psychophysiological measures. An index of bipolar deontology-utilitarianism was correlated with resting heart rate variability (HRV)—an index of cardiac vagal tone—such that more utilitarian judgments were associated with lower HRV. Follow-up analyses using process dissociation, which independently quantifies utilitarian and deontological moral inclinations, provided further evidence that utilitarian (but not deontological) judgments were associated with lower HRV. Our results suggest that the functional integration of neural and visceral systems during moral judgments can restrict outcome-based, utilitarian moral preferences. Implications for theories of moral judgment are discussed. PMID:27317926

  17. Systematic Poisoning Attacks on and Defenses for Machine Learning in Healthcare.

    Science.gov (United States)

    Mozaffari-Kermani, Mehran; Sur-Kolay, Susmita; Raghunathan, Anand; Jha, Niraj K

    2015-11-01

    Machine learning is being used in a wide range of application domains to discover patterns in large datasets. Increasingly, the results of machine learning drive critical decisions in applications related to healthcare and biomedicine. Such health-related applications are often sensitive, and thus, any security breach would be catastrophic. Naturally, the integrity of the results computed by machine learning is of great importance. Recent research has shown that some machine-learning algorithms can be compromised by augmenting their training datasets with malicious data, leading to a new class of attacks called poisoning attacks. Hindrance of a diagnosis may have life-threatening consequences and could cause distrust. On the other hand, not only may a false diagnosis prompt users to distrust the machine-learning algorithm and even abandon the entire system but also such a false positive classification may cause patient distress. In this paper, we present a systematic, algorithm-independent approach for mounting poisoning attacks across a wide range of machine-learning algorithms and healthcare datasets. The proposed attack procedure generates input data, which, when added to the training set, can either cause the results of machine learning to have targeted errors (e.g., increase the likelihood of classification into a specific class), or simply introduce arbitrary errors (incorrect classification). These attacks may be applied to both fixed and evolving datasets. They can be applied even when only statistics of the training dataset are available or, in some cases, even without access to the training dataset, although at a lower efficacy. We establish the effectiveness of the proposed attacks using a suite of six machine-learning algorithms and five healthcare datasets. Finally, we present countermeasures against the proposed generic attacks that are based on tracking and detecting deviations in various accuracy metrics, and benchmark their effectiveness.

  18. Life-Threatening Adverse Events Following Therapeutic Opioid Administration in Adults: Is Pharmacogenetic Analysis Useful?

    Directory of Open Access Journals (Sweden)

    Parvaz Madadi

    2013-01-01

    Full Text Available BACKGROUND: Systemic approaches are needed to understand how variations in the genes associated with opioid pharmacokinetics and response can be used to predict patient outcome. The application of pharmacogenetic analysis to two cases of life-threatening opioid-induced respiratory depression is presented. The usefulness of genotyping in the context of these cases is discussed.

  19. The Importance of Awareness and Communication for the Inclusion of Young People with Life-Limiting and Life-Threatening Conditions in Mainstream Schools and Colleges

    Science.gov (United States)

    Asprey, Anthea; Nash, Tricia

    2006-01-01

    Anthea Asprey and Tricia Nash both belong to the Children's Hospice South West Research Group, based at the University of Exeter. In this article, they report one aspect of a research project designed to determine the adequacy of support for young people with life-limiting and life-threatening conditions in the education system. They describe here…

  20. Recognizing Life-threatening Features of Dengue in Children and Health Seeking Behavior in Dengue Emergency Amongst Parents and Carers: A Cross-sectional study in Gombak District, Malaysia.

    Science.gov (United States)

    Ariffin, F; Ramli, A S; Naim, N; Selamat, M I; Syed-Jamal, S J

    2014-10-01

    Dengue is life-threatening and the paediatric population is highly susceptible to complications. Deterioration can occur rapidly and ability to recognise early warning signs is crucial. This study aims to determine the knowledge and awareness of parents and carers and to predict their ability in recognising life-threatening symptoms and signs of dengue in children and to assess their health-seeking behaviour in dengue emergency. Methods This is a crosssectional study involving parents and carers of children ≤ 12 years old in schools and kindergartens in the Gombak district. Demographic details, knowledge on life-threatening symptoms and signs of dengue and health-seeking behaviour were collected using a self-administered questionnaire and knowledge scoring was done. The questionnaire was pilot tested with a Cronbach alpha of 0.82. The results were analysed using SPSS version 20.0. Results Total respondents were 866 with 44.8% men and 55.2% women. The mean age was 40.3 years (SD ± 5.7). Knowledge score of dengue life threatening features among respondents were good (30.0%) to average (56.8%). Respondents were able to recognise fever (98.5%), petechial rash (97.1%) and bleeding (65.2%) but were less able to recognise abdominal pain (22.3%) and passing less urine (28.2%) as life threatening dengue features. However, the ability to recognise fever is a poor predictor in recognising life threatening dengue in children compared to all other symptoms which were good predictors. A respondent that recognise stomach pain or neck stiffness were five times more likely to recognise life-threatening dengue. Respondents preferred to bring their children to the clinic (50.8%) or hospital (37.8%) themselves Instead of calling for ambulance. Worryingly, some would give antipyretics (3.6%) or wait for improvements (7.8%). Conclusion Concerted efforts by the schools, healthcare professionals and health authorities are required to educate parents and carers to identify life-threatening

  1. Endogenous nocardial endophthalmitis in an immunosuppressed patient: A serious warning of an underlying life threatening and blinding disorder

    Directory of Open Access Journals (Sweden)

    Hemant Trehan

    2017-01-01

    Conclusion: Ocular nocardiosis is a serious vision and life threatening disorder, particularly in patients on immunosuppressive therapy. A high index of suspicion is required for successful treatment.

  2. At the heart of morality lies neuro-visceral integration: lower cardiac vagal tone predicts utilitarian moral judgment.

    Science.gov (United States)

    Park, Gewnhi; Kappes, Andreas; Rho, Yeojin; Van Bavel, Jay J

    2016-10-01

    To not harm others is widely considered the most basic element of human morality. The aversion to harm others can be either rooted in the outcomes of an action (utilitarianism) or reactions to the action itself (deontology). We speculated that the human moral judgments rely on the integration of neural computations of harm and visceral reactions. The present research examined whether utilitarian or deontological aspects of moral judgment are associated with cardiac vagal tone, a physiological proxy for neuro-visceral integration. We investigated the relationship between cardiac vagal tone and moral judgment by using a mix of moral dilemmas, mathematical modeling and psychophysiological measures. An index of bipolar deontology-utilitarianism was correlated with resting heart rate variability (HRV)-an index of cardiac vagal tone-such that more utilitarian judgments were associated with lower HRV. Follow-up analyses using process dissociation, which independently quantifies utilitarian and deontological moral inclinations, provided further evidence that utilitarian (but not deontological) judgments were associated with lower HRV. Our results suggest that the functional integration of neural and visceral systems during moral judgments can restrict outcome-based, utilitarian moral preferences. Implications for theories of moral judgment are discussed. © The Author (2016). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  3. Attack-Related Life Disruption and Child Psychopathology in New York City Public Schoolchildren 6-Months Post-9/11

    Science.gov (United States)

    Comer, Jonathan S.; Fan, Bin; Duarte, Cristiane S.; Wu, Ping; Musa, George J.; Mandell, Donald J.; Albano, Anne Marie; Hoven, Christina W.

    2010-01-01

    In the aftermath of disasters, understanding relationships between disaster-related life disruption and children's functioning is key to informing future postdisaster intervention efforts. The present study examined attack-related life disruptions and psychopathology in a representative sample (N = 8,236) of New York City public schoolchildren…

  4. Seronegative neuromyelitis optica presenting with life-threatening respiratory failure.

    Science.gov (United States)

    Nardone, Raffaele; Zuccoli, Giulio; Brigo, Francesco; Trinka, Eugen; Fitzgerald, Ryan T

    2016-11-01

    Dyspnea has rarely been reported as a presenting symptom in patients with neuromyelitis optica (NMO). We report an unusual case of NMO relapse presenting with rapidly progressive respiratory failure and briefly discuss the possible pathophysiological mechanisms of this potential life-threatening complication of NMO. The 58-year-old woman with a history of bilateral optic neuritis presented to the emergency department with rapidly worsening dyspnea. Cervical spine magnetic resonance imaging showed extensive abnormal signal with involvement of the medulla oblongata. Since in our patient chest radiography failed to disclose a diaphragmatic palsy that is commonly observed in patients with phrenic nerve involvement, this acute manifestation of the disease may be attributed to brainstem involvement instead of cervical myelitis. Clinicians should be aware of this atypical presentation of NMO, which needs to be promptly recognized and aggressively treated.

  5. Attacker Modelling in Ubiquitous Computing Systems

    DEFF Research Database (Denmark)

    Papini, Davide

    in with our everyday life. This future is visible to everyone nowadays: terms like smartphone, cloud, sensor, network etc. are widely known and used in our everyday life. But what about the security of such systems. Ubiquitous computing devices can be limited in terms of energy, computing power and memory...... attacker remain somehow undened and still under extensive investigation. This Thesis explores the nature of the ubiquitous attacker with a focus on how she interacts with the physical world and it denes a model that captures the abilities of the attacker. Furthermore a quantitative implementation...

  6. Cyber Attack on Critical Infrastructure and Its Influence on International Security

    OpenAIRE

    出口 雅史

    2017-01-01

     Since the internet appeared, with increasing cyber threats, the vulnerability of critical infrastructure has become a vital issue for international security. Although cyber attack was not lethal in the past, new type of cyber assaults such as stuxnet are able to damage not only computer system digitally, but also critical infrastructure physically. This article will investigate how the recent cyber attacks have threatened critical infrastructure and their influence on international security....

  7. Does decisional conflict differ across race and ethnicity groups? A study of parents whose children have a life-threatening illness.

    Science.gov (United States)

    Knapp, Caprice; Sberna-Hinojosa, Melanie; Baron-Lee, Jacqueline; Curtis, Charlotte; Huang, I-Chan

    2014-05-01

    Children with life-threatening illnesses and their families may face a myriad of medical decisions in their lifetimes. Oftentimes these complicated medical decisions cause disagreements among patients, families, and providers about what is the best course of action. Although no evidence exists, it is possible that conflict may affect subgroups of the population differently. This study aims to investigate how decisional conflict varies among racial and ethnic subgroups. Two hundred sixty-six surveys were completed with parents whose children have a life-threatening illness. All children lived in Florida and were enrolled in the Medicaid program. The Decisional Conflict Scale, overall and broken down into its five distinct subscales, was used to assess parental decision-making. Descriptive, bivariate, and multivariate analyses were conducted. Subgroup analyses were conducted on Latino respondents. Our bivariate results suggest that minority parents report less Effective Decision Making (pracial and ethnic differences in decisional conflict of parents of children with life-threatening illnesses. Significant differences exist by race, ethnicity, language spoken, and diagnosis time across several subdomains of decisional conflict. These differences are important to address when creating clinical care plans, engaging in shared decision-making, and creating interventions to alleviate decisional conflict.

  8. Near-death experiences in non-life-threatening events and coma of different etiologies

    Directory of Open Access Journals (Sweden)

    Vanessa eCharland-Verville

    2014-05-01

    Full Text Available Background: Near death experiences (NDEs are increasingly being reported as a clearly identifiable physiological and psychological reality of clinical significance. However, the definition and causes of the phenomenon as well as the identification of NDE experiencers is still a matter of debate. To date, the most widely used standardized tool to identify and characterize NDEs in research is the Greyson NDE Scale. Using this scale, retrospective and prospective studies have been trying to estimate their incidence in various populations but few studies have tackled to associate the experiences’ intensity and content related to etiology. Methods: This retrospective investigation assessed the most frequently recounted features of self-reported NDEs after a non-life-threatening event (i.e., NDE-like experience or after a pathological coma (i.e., classical NDEs and according to the etiology of the acute brain insult. We also compared our retrospectively acquired data in anoxic coma with historical data from the published literature on prospective post-anoxic studies using the Greyson NDE Scale. Results: From our 190 reports who met the criteria for NDE (i.e., NDE scale total score Conclusions: It appears that real NDEs after coma of different etiologies are similar to NDE-like experiences occurring after non-life threatening events. Subjects reporting NDEs retrospectively tend to have experienced a different content compared to the prospective experiencers

  9. Time-Efficient Cloning Attacks Identification in Large-Scale RFID Systems

    Directory of Open Access Journals (Sweden)

    Ju-min Zhao

    2017-01-01

    Full Text Available Radio Frequency Identification (RFID is an emerging technology for electronic labeling of objects for the purpose of automatically identifying, categorizing, locating, and tracking the objects. But in their current form RFID systems are susceptible to cloning attacks that seriously threaten RFID applications but are hard to prevent. Existing protocols aimed at detecting whether there are cloning attacks in single-reader RFID systems. In this paper, we investigate the cloning attacks identification in the multireader scenario and first propose a time-efficient protocol, called the time-efficient Cloning Attacks Identification Protocol (CAIP to identify all cloned tags in multireaders RFID systems. We evaluate the performance of CAIP through extensive simulations. The results show that CAIP can identify all the cloned tags in large-scale RFID systems fairly fast with required accuracy.

  10. Life-threatening angio-oedema after the first dose of an ACE inhibitor-not an anaphylactic reaction

    DEFF Research Database (Denmark)

    Krogh Nielsen, Troels; Bygum, Anette; Rye Rasmussen, Eva

    2016-01-01

    We present a case of a 60-year-old Caucasian woman, with no prior history of swellings, who was admitted to a hospital due to life-threatening angio-oedema. She had, the previous day, been prescribed an ACE inhibitor for her essential hypertension. She had taken one tablet at night-time, and awoke...

  11. Short-term starvation with a near-fatal asthma attack induced ketoacidosis in a nondiabetic pregnant woman: A case report.

    Science.gov (United States)

    Wei, Kuang-Yu; Chang, Shan-Yueh; Wang, Sheng-Huei; Su, Her-Young; Tsai, Chen-Liang

    2016-06-01

    Life-threatening refractory metabolic acidosis due to starvation ketoacidosis is rarely reported, even among nondiabetic pregnant women, and may be overlooked. Furthermore, stressful situations may increase the acidosis severity.In the present case, a nondiabetic multiparous woman was admitted for a near-fatal asthma attack and vomiting during the third trimester of pregnancy. She was intubated and rapidly developed high anion gap metabolic acidosis. We diagnosed the patient with starvation ketoacidosis based on vomiting with concomitant periods of stress during pregnancy and the absence of other causes of high anion gap metabolic acidosis. She responded poorly to standard treatment, although the ketoacidosis and asthma promptly resolved after an emergency caesarean section. The patient and her baby were safely discharged.Short-term starvation, if it occurs during periods of stress and medication, can result in life-threatening ketoacidosis, even among nondiabetic women during the third trimester of pregnancy. Awareness of this condition may facilitate prompt recognition and proactive treatment for dietary and stress control, and emergent interventions may also improve outcomes.

  12. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  13. Relationship of External Influence to Parental Distress in Decision Making Regarding Children with a Life-Threatening Illness

    Science.gov (United States)

    Luce, Mary Frances; Nelson, Robert M.

    2011-01-01

    Objective To examine the relationship of external influence to parental distress when making a decision about research or treatment for a child with a life-threatening illness and to test potential moderators of this relationship. Methods Parents (n = 219) who made a decision about research or treatment for a child completed measures of external influence, distress, decision-making preference, and coping. Results More external influence was associated with more hostility, uncertainty, and confusion. Decision-making preference and coping style moderated the relationship between external influence and distress: More external influence was associated with more distress when decision-making preference was low and task-focused coping was high. Conclusions External influence appears to be related to distress in parents making research and treatment decisions for children with life-threatening illnesses. However, it is important to consider parent characteristics, such as decision-making preference and coping style, when examining the effects of contextual factors on distress during decision making. PMID:21693541

  14. Relationship of external influence to parental distress in decision making regarding children with a life-threatening illness.

    Science.gov (United States)

    Miller, Victoria A; Luce, Mary Frances; Nelson, Robert M

    2011-01-01

    To examine the relationship of external influence to parental distress when making a decision about research or treatment for a child with a life-threatening illness and to test potential moderators of this relationship. Parents (n = 219) who made a decision about research or treatment for a child completed measures of external influence, distress, decision-making preference, and coping. More external influence was associated with more hostility, uncertainty, and confusion. Decision-making preference and coping style moderated the relationship between external influence and distress: More external influence was associated with more distress when decision-making preference was low and task-focused coping was high. External influence appears to be related to distress in parents making research and treatment decisions for children with life-threatening illnesses. However, it is important to consider parent characteristics, such as decision-making preference and coping style, when examining the effects of contextual factors on distress during decision making.

  15. Embolization of Life-Threatening Arterial Rupture in Patients with Vascular Ehlers–Danlos Syndrome

    Energy Technology Data Exchange (ETDEWEB)

    Okada, Takuya, E-mail: okabone@gmail.com [Assistance Publique des Hôpitaux de Paris, Georges Pompidou European Hospital, Interventional Radiology Department (France); Frank, Michael, E-mail: michael.frank@egp.aphp.fr [Assistance Publique des Hôpitaux de Paris, Georges Pompidou European Hospital, Rare Vascular Diseases Reference Center (France); Pellerin, Olivier, E-mail: olivier@pellerin.as; Primio, Massimiliano Di, E-mail: massimiliano.di.primio@gmail.com; Angelopoulos, Georgios, E-mail: giorginos78@msn.com [Assistance Publique des Hôpitaux de Paris, Georges Pompidou European Hospital, Interventional Radiology Department (France); Boughenou, Marie-Fazia, E-mail: marie-fazia.boughenou@egp.aphp.fr [Assistance Publique des Hôpitaux de Paris, Georges Pompidou European Hospital, Anesthesia and Surgical Intensive Care Unit (France); Pagny, Jean-Yves, E-mail: jean-yves.pagny@egp.aphp.fr [Assistance Publique des Hôpitaux de Paris, Georges Pompidou European Hospital, Interventional Radiology Department (France); Messas, Emmanuel, E-mail: emmanuel.messas@egp.aphp.fr [Assistance Publique des Hôpitaux de Paris, Georges Pompidou European Hospital, Rare Vascular Diseases Reference Center (France); Sapoval, Marc, E-mail: marc.sapoval2@egp.aphp.fr [Assistance Publique des Hôpitaux de Paris, Georges Pompidou European Hospital, Interventional Radiology Department (France)

    2013-05-09

    PurposeTo evaluate the safety and efficacy of transarterial embolization of life-threatening arterial rupture in patients with vascular Ehlers–Danlos syndrome (vEDS) in a single tertiary referral center.MethodsWe retrospectively analyzed transarterial embolization for vEDS performed at our institution from 2000 to 2012. The indication of embolization was spontaneous arterial rupture or pseudoaneurysm with acute bleeding. All interventions used a percutaneous approach through a 5F or less introducer sheath. Embolic agents were microcoils and glue in 3 procedures, glue alone in 2, and microcoils alone in 2.ResultsFive consecutive vEDS patients were treated by 7 embolization procedures (4 women, mean age 29.8 years). All procedures were successfully performed. Two patients required a second procedure for newly arterial lesions at a different site from the first procedure. Four of the five patients were still alive after a mean follow-up of 19.4 (range 1–74.7) months. One patient died of multiple organ failure 2 days after procedure. Minor procedural complications were observed in 3 procedures (43 %), all directly managed during the same session. Remote arterial lesions occurred after 3 procedures (43 %); one underwent a second embolization, and the other 2 were observed conservatively. Puncture site complication was observed in only one procedure (14 %).ConclusionEmbolization for vEDS is a safe and effective method to manage life-threatening arterial rupture.

  16. Embolization of Life-Threatening Arterial Rupture in Patients with Vascular Ehlers–Danlos Syndrome

    International Nuclear Information System (INIS)

    Okada, Takuya; Frank, Michael; Pellerin, Olivier; Primio, Massimiliano Di; Angelopoulos, Georgios; Boughenou, Marie-Fazia; Pagny, Jean-Yves; Messas, Emmanuel; Sapoval, Marc

    2014-01-01

    PurposeTo evaluate the safety and efficacy of transarterial embolization of life-threatening arterial rupture in patients with vascular Ehlers–Danlos syndrome (vEDS) in a single tertiary referral center.MethodsWe retrospectively analyzed transarterial embolization for vEDS performed at our institution from 2000 to 2012. The indication of embolization was spontaneous arterial rupture or pseudoaneurysm with acute bleeding. All interventions used a percutaneous approach through a 5F or less introducer sheath. Embolic agents were microcoils and glue in 3 procedures, glue alone in 2, and microcoils alone in 2.ResultsFive consecutive vEDS patients were treated by 7 embolization procedures (4 women, mean age 29.8 years). All procedures were successfully performed. Two patients required a second procedure for newly arterial lesions at a different site from the first procedure. Four of the five patients were still alive after a mean follow-up of 19.4 (range 1–74.7) months. One patient died of multiple organ failure 2 days after procedure. Minor procedural complications were observed in 3 procedures (43 %), all directly managed during the same session. Remote arterial lesions occurred after 3 procedures (43 %); one underwent a second embolization, and the other 2 were observed conservatively. Puncture site complication was observed in only one procedure (14 %).ConclusionEmbolization for vEDS is a safe and effective method to manage life-threatening arterial rupture

  17. Acute and potentially life-threatening tropical diseases in western travelers--a GeoSentinel multicenter study, 1996-2011

    NARCIS (Netherlands)

    Jensenius, Mogens; Han, Pauline V.; Schlagenhauf, Patricia; Schwartz, Eli; Parola, Philippe; Castelli, Francesco; von Sonnenburg, Frank; Loutan, Louis; Leder, Karin; Freedman, David O.; Simon, Fabrice; Delmont, Jean; Carosi, Giampiero; Chappuis, François; Caumes, Eric; Pérignon, Alice; Burchard, Gerd-Dieter; Torresi, Joseph; Brown, Graham; Kain, Kevin; Boggild, Andrea; Keystone, Jay S.; Pandey, Prativa; Pradhan, Rashila; Murphy, Holly; Coyle, Christina M.; Wittner, Murray; de Vries, Peter; Grobusch, Martin C.; Gadroen, Kartini; Rapp, Christophe; Aoun, Olivier; Kanagawa, Shuzo; Kato, Yasuyuki; Mizunno, Yasutaka; Gkrania-Klotsas, Effrossyni; McCarthy, Anne; Weber, Rainer; Steffen, Robert; Hagmann, Stefan; Henry, Michael; Miller, Andy O.; Hale, Devon C.; Anand, Rahul; Gelman, Stephanie S.; Kozarsky, Phyllis E.; Fairley, Jessica; Franco-Paredes, Carlos; Barnett, Elizabeth D.; Libman, Michael D.

    2013-01-01

    We performed a descriptive analysis of acute and potentially life-threatening tropical diseases among 82,825 ill western travelers reported to GeoSentinel from June of 1996 to August of 2011. We identified 3,655 patients (4.4%) with a total of 3,666 diagnoses representing 13 diseases, including

  18. Trends in a Life Threatening Condition: Morbid Obesity in Dutch, Turkish and Moroccan Children in The Netherlands

    NARCIS (Netherlands)

    Dommelen, P. van; Schönbeck, Y.; Buuren, S. van; Hirasing, R.

    2014-01-01

    Background: Morbid obesity can be a life threatening condition. The aim of our study is to assess the trend in morbid obesity in The Netherlands among children of Dutch origin since 1980, and among children of Turkish and Moroccan origin since 1997. Methods and Findings: Cross-sectional height and

  19. Trends in a life threatening condition : Morbid obesity in Dutch, Turkish and Moroccan children in the Netherlands

    NARCIS (Netherlands)

    Van Dommelen, Paula; Schönbeck, Yvonne; Van Buuren, Stef; HiraSing, Remy A.

    2014-01-01

    Background: Morbid obesity can be a life threatening condition. The aim of our study is to assess the trend in morbid obesity in The Netherlands among children of Dutch origin since 1980, and among children of Turkish and Moroccan origin since 1997. Methods and Findings: Cross-sectional height and

  20. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  1. TECRL, a new life-threatening inherited arrhythmia gene associated with overlapping clinical features of both LQTS and CPVT

    NARCIS (Netherlands)

    Devalla, Harsha D.; Gélinas, Roselle; Aburawi, Elhadi H.; Beqqali, Abdelaziz; Goyette, Philippe; Freund, Christian; Chaix, Marie-A.; Tadros, Rafik; Jiang, Hui; Le Béchec, Antony; Monshouwer-Kloots, Jantine J.; Zwetsloot, Tom; Kosmidis, Georgios; Latour, Frédéric; Alikashani, Azadeh; Hoekstra, Maaike; Schlaepfer, Jurg; Mummery, Christine L.; Stevenson, Brian; Kutalik, Zoltan; de Vries, Antoine Af; Rivard, Léna; Wilde, Arthur Am; Talajic, Mario; Verkerk, Arie O.; Al-Gazali, Lihadh; Rioux, John D.; Bhuiyan, Zahurul A.; Passier, Robert

    2016-01-01

    Genetic causes of many familial arrhythmia syndromes remain elusive. In this study, whole-exome sequencing (WES) was carried out on patients from three different families that presented with life-threatening arrhythmias and high risk of sudden cardiac death (SCD). Two French Canadian probands

  2. Animal Bites

    Science.gov (United States)

    Wild animals usually avoid people. They might attack, however, if they feel threatened, are sick, or are protecting their ... or territory. Attacks by pets are more common. Animal bites rarely are life-threatening, but if they ...

  3. Panic Attacks and Panic Disorder

    Science.gov (United States)

    ... Major changes in your life, such as a divorce or the addition of a baby Smoking or ... quality of life. Complications that panic attacks may cause or be linked to include: Development of specific ...

  4. Life-threatening rupture of a renal angiomyolipoma in a patient taking over-the-counter horse chestnut seed extract.

    LENUS (Irish Health Repository)

    Snow, Aisling

    2011-02-09

    BACKGROUND: Alternative medical therapies are increasingly being prescribed due to their good safety profile and perceived limited side effects. They are often unregulated and prescribed over the counter. One such medication is horse chestnut seed extract (HCSE), which is used for the treatment of chronic venous insufficiency and is known to affect blood coagulation. Angiomyolipoma (AML) is a benign fat-containing mesenchymal tumor of the kidney. It is often found incidentally and in most cases can be managed conservatively. Rupture of the kidney with hemorrhage is a well-known complication that may be serious and life-threatening. Known risk factors for hemorrhage include anticoagulation as well as pregnancy, increased size of the lesion, high lesion vascularity, and aneurysm formation within the tumor. OBJECTIVES: The aim is to raise awareness of potential HCSE-induced anticoagulation, including, as in the case presented, acute renal AML hemorrhage. CASE REPORT: The case of a patient taking HCSE for venous insufficiency is presented. The patient suffered a life-threatening rupture of the kidney in the presence of known renal AML. She underwent emergency embolization with a successful outcome. Because HCSE-containing products are thought to be generally safe in the treatment of chronic venous insufficiency, it is important to be mindful of their potential anticoagulant properties and, therefore, their relative contraindication both in patients taking other anticoagulants and those with known renal AML. CONCLUSION: We demonstrate a potentially life-threatening association between HSCE-containing products and renal AML, highlighting the risk associated with HSCE-induced anticoagulation.

  5. Life-Threatening Hypokalemic Paralysis in a Young Bodybuilder

    Directory of Open Access Journals (Sweden)

    Kitty K. T. Cheung

    2014-01-01

    Full Text Available We report a case of life-threatening hypokalemia in a 28-year-old bodybuilder who presented with sudden onset bilateral lower limbs paralysis few days after his bodybuilding competition. His electrocardiogram (ECG showed typical u-waves due to severe hypokalemia (serum potassium 1.6 mmol/L, reference range (RR 3.5–5.0 mmol/L. He was admitted to the intensive care unit (ICU and was treated with potassium replacement. The patient later admitted that he had exposed himself to weight loss agents of unknown nature, purchased online, and large carbohydrate loads in preparation for the competition. He made a full recovery after a few days and discharged himself from the hospital against medical advice. The severe hypokalemia was thought to be caused by several mechanisms to be discussed in this report. With the ever rising number of new fitness centers recently, the ease of online purchasing of almost any drug, and the increasing numbers of youngsters getting into the bodybuilding arena, clinicians should be able to recognize the possible causes of sudden severe hypokalemia in these patients in order to revert the pathophysiology.

  6. Life-threatening hypokalemic paralysis in a young bodybuilder.

    Science.gov (United States)

    Cheung, Kitty K T; So, Wing-Yee; Kong, Alice P S; Ma, Ronald C W; Chow, Francis C C

    2014-01-01

    We report a case of life-threatening hypokalemia in a 28-year-old bodybuilder who presented with sudden onset bilateral lower limbs paralysis few days after his bodybuilding competition. His electrocardiogram (ECG) showed typical u-waves due to severe hypokalemia (serum potassium 1.6 mmol/L, reference range (RR) 3.5-5.0 mmol/L). He was admitted to the intensive care unit (ICU) and was treated with potassium replacement. The patient later admitted that he had exposed himself to weight loss agents of unknown nature, purchased online, and large carbohydrate loads in preparation for the competition. He made a full recovery after a few days and discharged himself from the hospital against medical advice. The severe hypokalemia was thought to be caused by several mechanisms to be discussed in this report. With the ever rising number of new fitness centers recently, the ease of online purchasing of almost any drug, and the increasing numbers of youngsters getting into the bodybuilding arena, clinicians should be able to recognize the possible causes of sudden severe hypokalemia in these patients in order to revert the pathophysiology.

  7. Life-Threatening Hypokalemic Paralysis in a Young Bodybuilder

    Science.gov (United States)

    Cheung, Kitty K. T.; So, Wing-Yee; Kong, Alice P. S.; Ma, Ronald C. W.; Chow, Francis C. C.

    2014-01-01

    We report a case of life-threatening hypokalemia in a 28-year-old bodybuilder who presented with sudden onset bilateral lower limbs paralysis few days after his bodybuilding competition. His electrocardiogram (ECG) showed typical u-waves due to severe hypokalemia (serum potassium 1.6 mmol/L, reference range (RR) 3.5–5.0 mmol/L). He was admitted to the intensive care unit (ICU) and was treated with potassium replacement. The patient later admitted that he had exposed himself to weight loss agents of unknown nature, purchased online, and large carbohydrate loads in preparation for the competition. He made a full recovery after a few days and discharged himself from the hospital against medical advice. The severe hypokalemia was thought to be caused by several mechanisms to be discussed in this report. With the ever rising number of new fitness centers recently, the ease of online purchasing of almost any drug, and the increasing numbers of youngsters getting into the bodybuilding arena, clinicians should be able to recognize the possible causes of sudden severe hypokalemia in these patients in order to revert the pathophysiology. PMID:24660073

  8. Delayed life-threatening subdural hematoma after minor head injury in a patient with severe coagulopathy: a case report

    NARCIS (Netherlands)

    Engelen, Marc; Nederkoorn, Paul J.; Smits, Marion; van de Beek, Diederik

    2009-01-01

    Minor head injury is a frequent cause for neurologic consultation and imaging. Most patients with minor head injury will make an uneventful recovery, but in a very small proportion of these patients life threatening intracranial complications occur. We describe a patient on oral anticoagulation

  9. Delayed life-threatening subdural hematoma after minor head injury in a patient with severe coagulopathy: A case report

    NARCIS (Netherlands)

    M. Engelen (Marc); P.J. Nederkoorn (Paul); M. Smits (Marion); D. van de Beek (Diederik)

    2009-01-01

    textabstractMinor head injury is a frequent cause for neurologic consultation and imaging. Most patients with minor head injury will make an uneventful recovery, but in a very small proportion of these patients life threatening intracranial complications occur. We describe a patient on oral

  10. Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems

    Directory of Open Access Journals (Sweden)

    Omar Achbarou

    2017-03-01

    Full Text Available Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system has many common characteristics with distributed systems, hence, the cloud computing also uses the features of networking. Thus the security is the biggest issue of this system, because the services of cloud computing is based on the sharing. Thus, a cloud computing environment requires some intrusion detection systems (IDSs for protecting each machine against attacks. The aim of this work is to present a classification of attacks threatening the availability, confidentiality and integrity of cloud resources and services. Furthermore, we provide literature review of attacks related to the identified categories. Additionally, this paper also introduces related intrusion detection models to identify and prevent these types of attacks.

  11. A case report of life-threatening acute dysphagia in dermatomyositis: Challenges in diagnosis and treatment.

    Science.gov (United States)

    Kwon, Kyoung Min; Lee, Jung Soo; Kim, Yeo Hyung

    2018-04-01

    Although dysphagia is a known complication of dermatomyositis, sudden onset of dysphagia without the notable aggravation of other symptoms can make the diagnosis and treatment challenging. A 53-year-old male diagnosed as dermatomyositis 1 month ago came to our emergency department complaining of a sudden inability to swallow solid foods and liquids. The patient showed generalized edema, but the muscle power was not different compared with 1 month ago. Serum creatine kinase level was lower than that measured 2 weeks ago. Computed tomography scan of the larynx, chest, abdomen, and pelvis, an esophagogastroduodenoscopy, and brain magnetic resonance imaging were unremarkable. A videofluoroscopic swallowing study revealed inadequate pharyngeal contraction and slightly decreased upper esophageal sphincter opening with silent aspiration. Treatment with oral prednisolone, intravenous methylprednisolone, azathioprine, and intravenous immunoglobulins was applied. During the course of medical treatment for life-threatening dysphagia, he continued with rehabilitative therapy. He could swallow saliva at 2 months and showed normal swallowing function at 3 months from the onset of dysphagia. Dysphagia has not recurred for 3 years after recovery. A multidisciplinary approach is necessary to diagnose severe acute dysphagia due to exacerbation of underlying dermatomyositis rather than other structural or neurological causes. Appropriate supportive care is important because dysphagia can be life-threatening and last for a long time.

  12. Situational and Age-Dependent Decision Making during Life Threatening Distress in Myotis macrodactylus.

    Directory of Open Access Journals (Sweden)

    Xiaobin Huang

    Full Text Available Echolocation and audiovocal communication have been studied extensively in bats. The manner in which these abilities are incorporated within escape behaviors during life-threatening distress is largely unknown. Here we tested the hypothesis that behavioral response profiles expressed during distress are relatively stereotypic given their evolutionary adaptations to avoid predators. We subjected juvenile and adult big-footed myotis (Myotis macrodactylus to a sequence of three types of life threatening distress: 1 trapping them in a mist-net (environmental threat, 2 approaching them when trapped (predator threat, and 3 partially restraining their freedom to move (arrest, and recorded their escape behavior in each of the three conditions. Response profiles differed across individuals and with the context in which they were expressed. During environmental and predator threat, bats displayed significantly more biting and wing-flapping behaviors and emitted more echolocation pulses than during arrest. Response profiles also varied with age. During arrest, juveniles were more likely than adults to emit distress calls and vice-versa for biting and wing flapping during environmental and predator threat. Overall, individualized response profiles were classified into ten clusters that were aligned along two divergent response trajectories when viewed within two-dimensional, multifactorial decision space. Juvenile behaviors tended to follow a predominantly "social-dependence" trajectory, whereas adult behaviors were mostly aligned along a "self-reliance" trajectory. We conclude that bats modify their vocal behavior and make age-appropriate and contextually adaptive decisions when distressed. This decision-making ability is consistent with observations in other social species, including humans.

  13. Warfarin-induced sublingual hematoma mimicking Ludwig angina: Conservative management of a potentially life-threatening condition.

    LENUS (Irish Health Repository)

    Cashman, Emma

    2012-02-01

    Sublingual hematoma secondary to excessive anticoagulation is a rare, life-threatening condition. Reports in the literature have emphasized the importance of a prompt reversal of the causative coagulopathy by intravenous administration of vitamin K and fresh frozen plasma. In the event of an unstable airway, surgical intervention via tracheostomy or cricothyroidectomy is advocated. We report a case of sublingual hematoma that was treated conservatively, and we discuss the presentation and management of this entity.

  14. Warfarin-induced sublingual hematoma mimicking Ludwig angina: Conservative management of a potentially life-threatening condition.

    LENUS (Irish Health Repository)

    Cashman, Emma

    2011-02-01

    Sublingual hematoma secondary to excessive anticoagulation is a rare, life-threatening condition. Reports in the literature have emphasized the importance of a prompt reversal of the causative coagulopathy by intravenous administration of vitamin K and fresh frozen plasma. In the event of an unstable airway, surgical intervention via tracheostomy or cricothyroidectomy is advocated. We report a case of sublingual hematoma that was treated conservatively, and we discuss the presentation and management of this entity.

  15. A pediatric case of life-threatening airway obstruction caused by a cervicomediastinal thymic cyst

    Energy Technology Data Exchange (ETDEWEB)

    Komura, Makoto; Kanamori, Yutaka; Sugiyama, Masahiko; Iwanaka, Tadashi [University of Tokyo Hospital, Department of Pediatric Surgery, Tokyo (Japan); Fukushima, Noriyoshi [University of Tokyo Hospital, Department of Pathology, Tokyo (Japan)

    2010-09-15

    Most patients with thymic cysts complain of a slowly enlarging, asymptomatic cervical mass. Only 6-10% suffer dysphagia, dyspnoea, stridor, cervical pain or vocal paralysis. In some rare cases sudden onset of severe dyspnoea or asphyxia is the first symptom, especially in neonates and small infants. We report a unique case of a 20-month-old child, who required emergency tracheal intubation due to asphyxia. Cervicomediastinal thymic cyst might need to be included in causes of life-threatening airway obstruction in young children. (orig.)

  16. Life-threatening macroglossia after posterior fossa surgery: a surgical positioning problem?

    Science.gov (United States)

    Vermeersch, G; Menovsky, T; De Ridder, D; De Bodt, M; Saldien, V; Van de Heyning, P

    2014-01-01

    A 55-year-old woman was operated in the lateral park bench position with significant neck flexion and oral packing. Macroglossia was noticed immediately postoperatively after endotracheal extubation. The patient was reintubated for 13 days and subsequently required a tracheostoma. After the placement of the tracheostoma and the removal of the endotracheal tube, the congestion of the tongue decreased markedly within 24 hours. Macroglossia is a rare complication following posterior fossa procedures with few cases reported so far. It can cause airway obstruction, which could be a life-threatening complication, and it therefore requires prompt treatment. The aetiology of postoperative macroglossia remains uncertain and has been attributed to arterial, venous and lymphatic compression, mechanical compression, or neurogenic causes. This article describes new insights into aetiology and also describes preventive measures and possible treatment.

  17. Effectiveness of storytelling interventions on psychosocial outcomes in adult patients with a life-threatening illness: a systematic review protocol.

    Science.gov (United States)

    Schoenau, Mai Nanna; Jackson, Inger Marie

    2016-06-01

    The objective of this review is to identify the effectiveness of storytelling interventions on psychosocial outcomes. In this review, storytelling is where adult patients with a life-threatening illness tell their illness story, facilitated by a healthcare professional.Specifically the review questions are.

  18. Successful reversal of life threatening cardiac effect following dosulepin overdose using intravenous lipid emulsion

    DEFF Research Database (Denmark)

    Boegevig, Soeren; Rothe, Anders; Tfelt-Hansen, Jacob

    2011-01-01

    CONTEXT. We report a successful acute reversal of potential life threatening QRS complex widening and prolonged QT interval following dosulepin overdose using intravenous lipid emulsion 20% in an unstable patient. CASE DETAILS. A 36-year-old female following the ingestion of 5.25 g of dosulepin...... became shorter. DISCUSSION. Cyclic antidepressants affect the cardiac conduction system and the myocardium. The exact mechanism of action from intravenous lipid emulsions may not be determined from the data presented, and the obtained effect does not rule out the supposed effects of alkalinisation...

  19. Myasthenia gravis: descriptive analysis of life-threatening events in a recent nationwide registry.

    Science.gov (United States)

    Ramos-Fransi, A; Rojas-García, R; Segovia, S; Márquez-Infante, C; Pardo, J; Coll-Cantí, J; Jericó, I; Illa, I

    2015-07-01

    Myasthenia gravis (MG) may become life-threatening if patients have respiratory insufficiency or dysphagia. This study aimed to determine the incidence, demographic characteristics, risk factors, response to treatment and outcome of these life-threatening events (LTEs) in a recent, population-based sample of MG patients. A retrospective analysis of MG patients who presented with an LTE between 2000 and 2013 was performed. Participants were identified from a neuromuscular diseases registry in Spain that includes 648 patients with MG (NMD-ES). Sixty-two (9.56%) patients had an LTE. Thirty-two were classified as class V according to the MG Foundation of America, and 30 as class IVB. Fifty per cent were previously diagnosed with MG and median duration of the disease before the LTE was 24 months (3-406). The most common related factor was infection (n = 18). All patients received intravenous human immunoglobulin; 11 had a second infusion and six had plasma exchange. Median time to feeding tube removal was 13 days (1-434). Median time to weaning from ventilation was 12 days (3-176), and it was significantly shorter in late onset MG (≥50 years) (P = 0.019). LTEs improved <2 weeks in 55.8% but did not improve until after 1 month in 20% of patients. Four patients died. No other factors influenced mortality or duration of LTEs. The percentage of LTEs in MG patients was low, particularly amongst those previously diagnosed and treated for the disease. The significant percentage of treatment-resistant LTEs indicates that more effective treatment approaches are needed for this vulnerable sub-population. © 2015 EAN.

  20. JFCGuard: Detecting juice filming charging attack via processor usage analysis on smartphones

    DEFF Research Database (Denmark)

    Meng, Weizhi; Jiang, Lijun; Wang, Yu

    2017-01-01

    Smartphones have become necessities in people' lives, so that many more public charging stations are under deployment worldwide to meet the increasing demand of phone charging (i.e., in airports, subways, shops, etc). However, this situation may expose a hole for cyber-criminals to launch various...... attacks especially charging attacks and threaten user's privacy. As an example, juice filming charging (JFC) attack is able to steal users' sensitive and private information from both Android OS and iOS devices, through automatically recording phone-screen and monitoring users' inputs during the whole...... charging period. More importantly, this attack does not need any permission or installing any pieces of apps on user's side. The rationale is that users' information can be leaked through a standard micro USB connector that employs the Mobile High-Definition Link (MHL) standard. Motivated by the potential...

  1. Early psychological reactions in parents of children with a life threatening illness within a pediatric hospital setting.

    Science.gov (United States)

    Muscara, F; McCarthy, M C; Woolf, C; Hearps, S J C; Burke, K; Anderson, V A

    2015-07-01

    Parents of children with life threatening illness or injuries are at elevated risk of distress reactions, involving symptoms of acute stress disorder, depression and anxiety. Currently, the impact of child illness factors is unclear, and to date research systematically examining the prevalence of these psychological reactions across different illness groups with an acute life threat is sparse. This is important to explore given that studies show that parent functioning impacts on the psychological adjustment and recovery of the ill child. WHAT DOES THIS STUDY ADD?: At four weeks following a child's diagnosis of a serious illness, 49-54% of parents met DSM-IV criteria for acute stress disorder, across a number of illness groups, whereas 15-27% of parents were in the moderate/severe range for depression and anxiety, and 25-31% for stress. Results from this study demonstrate that rates and severity of these psychological reactions in parents of seriously ill children do not vary according to illness type. A life threatening childhood illness/injury can lead to significant distress reactions in parents, with independent studies finding such reactions in several different illness groups. To date, there is limited research systematically comparing the prevalence of adverse parental psychological reactions across different childhood illness groups with an acute life threat. This study aimed to investigate the frequency and severity of symptoms of acute traumatic stress, depression, anxiety and general stress in parents, following admission of their child to hospital for a life threatening illness. The study also aimed to explore the relationship between these symptoms, and to determine whether they differ according to illness/injury. Cross-sectional data from a prospective, longitudinal study are reported. Participants were 194 parents of 145 children (49 couples), admitted to cardiology (n=53), oncology (n=40) and pediatric intensive care units (n=52), for serious

  2. Dyspnea in a case of shoulder dislocation – to beware of this rare life-threatening symptom

    Directory of Open Access Journals (Sweden)

    Joshi Satyen Praful

    2016-01-01

    Full Text Available Shoulder dislocation is a common injury in orthopedic practice. In an acute presentation, closed reduction of the shoulder joint leads to an uneventful recovery. However, in the developing world neglected shoulder dislocation and treatments from quacks are not uncommon. Improper treatment and neglect can rarely become life threatening. We present one such case, emphasizing the need to investigate the symptom of dyspnea in a patient with history of shoulder dislocation.

  3. Is hockey just a game? Contesting meanings of the ice hockey life projects through a career-threatening injury

    DEFF Research Database (Denmark)

    Ronkainen, Noora J.; Ryba, Tatiana V.

    2017-01-01

    This study is situated within an existential–narrative theoretical framework to examine the impact of career-threatening injury on professional ice hockey players’ well-being and career construction. Professional ice hockey culture is construed as a privileged space characterised by hegemonic...... masculinity, fierce competition as well as high-risk behaviours often resulting in sports injuries. In this paper, we analyse two players’ life stories with a particular focus on injury as a boundary situation involving social and temporal breakdown and re-evaluation of meaning of sporting life projects...

  4. Life-Threatening Obstructive Sleep Apnea Caused by Adenoid Hypertrophy in an Infant with Noonan Syndrome

    Directory of Open Access Journals (Sweden)

    Sonia Khirani

    2012-01-01

    Full Text Available Adenoidectomy is a commonly performed surgery in children, even though its effectiveness is still under investigation. However, in children with risk factors such as age under 3 years old, associated comorbidities, or severe obstructive sleep apneas, a high postoperative respiratory morbidity is possible. We report the case of a 15-month-old boy with Noonan syndrome and a complex clinical history, who presented with a life-threatening obstructive sleep apnea due to hypertrophy of the adenoids which resolved completely after adenoidectomy.

  5. The List of Threatening Experiences: the reliability and validity of a brief life events questionnaire.

    Science.gov (United States)

    Brugha, T S; Cragg, D

    1990-07-01

    During the 23 years since the original work of Holmes & Rahe, research into stressful life events on human subjects has tended towards the development of longer and more complex inventories. The List of Threatening Experiences (LTE) of Brugha et al., by virtue of its brevity, overcomes difficulties of clinical application. In a study of 50 psychiatric patients and informants, the questionnaire version of the list (LTE-Q) was shown to have high test-retest reliability, and good agreement with informant information. Concurrent validity, based on the criterion of independently rated adversity derived from a semistructured life events interview, making use of the Life Events and Difficulties Scales (LEDS) method developed by Brown & Harris, showed both high specificity and sensitivity. The LTE-Q is particularly recommended for use in psychiatric, psychological and social studies in which other intervening variables such as social support, coping, and cognitive variables are of interest, and resources do not allow for the use of extensive interview measures of stress.

  6. Life-Threatening Contraceptive-Related Pulmonary Embolism in a 14-Year-Old Girl with Hereditary Thrombophilia

    DEFF Research Database (Denmark)

    Hellfritzsch, Maja; Grove, Erik Lerkevang

    2015-01-01

    . Based on a case of life-threatening COC-associated pulmonary embolism in a girl heterozygous for the prothrombin G20210A mutation and with a family history of thrombotic disease, we discuss the importance of assessing not just the genotype but also the phenotype when considering initiation of COCs...... in patients with thrombophilia. CASE REPORT: A 14-year-old girl presented with acute onset of chest pain and dyspnea followed by syncope. She was hypoxic and hemodynamically compromised at admission. Computed tomography pulmonary angiography revealed a large central "saddle" pulmonary embolism causing nearly...

  7. Secure Data Aggregation in Wireless Sensor Network-Fujisaki Okamoto(FO) Authentication Scheme against Sybil Attack.

    Science.gov (United States)

    Nirmal Raja, K; Maraline Beno, M

    2017-07-01

    In the wireless sensor network(WSN) security is a major issue. There are several network security schemes proposed in research. In the network, malicious nodes obstruct the performance of the network. The network can be vulnerable by Sybil attack. When a node illicitly assertions multiple identities or claims fake IDs, the WSN grieves from an attack named Sybil attack. This attack threatens wireless sensor network in data aggregation, synchronizing system, routing, fair resource allocation and misbehavior detection. Henceforth, the research is carried out to prevent the Sybil attack and increase the performance of the network. This paper presents the novel security mechanism and Fujisaki Okamoto algorithm and also application of the work. The Fujisaki-Okamoto (FO) algorithm is ID based cryptographic scheme and gives strong authentication against Sybil attack. By using Network simulator2 (NS2) the scheme is simulated. In this proposed scheme broadcasting key, time taken for different key sizes, energy consumption, Packet delivery ratio, Throughput were analyzed.

  8. Psychological distress and prejudice following terror attacks in France.

    Science.gov (United States)

    Goodwin, Robin; Kaniasty, Krzysztof; Sun, Shaojing; Ben-Ezra, Menachem

    2017-08-01

    Terrorist attacks have the capacity to threaten our beliefs about the world, cause distress across populations and promote discrimination towards particular groups. We examined the impact of two different types of attacks in the same city and same year on psychological distress and probable posttraumatic stress symptoms, and the moderating effects of religion or media use on distress/posttraumatic symptoms and inter-group relations. Two panel surveys four weeks after the January 2015 Charlie Hebdo attack (N = 1981) and the November 2015 Bataclan concert hall/restaurant attacks (N = 1878), measured intrinsic religiosity, social and traditional media use, psychological distress (K6), probable posttraumatic stress symptoms (proposed ICD-11), symbolic racism and willingness to interact with Muslims by non-Muslims. Prevalence of serious mental illness (K6 score > 18) was higher after November 2015 attacks (7.0% after the first attack, 10.2% the second, χ2 (1) = 5.67, p < 0.02), as were probable posttraumatic stress symptoms (11.9% vs. 14.1%; χ2 (1) = 4.15, p < 0.04). In structural equation analyses, sex, age, geographic proximity, media use and religiosity were associated with distress, as was the interaction between event and religiosity. Distress was then associated with racism symbolism and willingness to interact with Muslims. Implications are considered for managing psychological trauma across populations, and protecting inter-group harmony. Copyright © 2017 Elsevier Ltd. All rights reserved.

  9. Evaluation of Therapeutics for Advanced-Stage Heart Failure and Other Severely-Debilitating or Life-Threatening Diseases.

    Science.gov (United States)

    Prescott, J S; Andrews, P A; Baker, R W; Bogdanffy, M S; Fields, F O; Keller, D A; Lapadula, D M; Mahoney, N M; Paul, D E; Platz, S J; Reese, D M; Stoch, S A; DeGeorge, J J

    2017-08-01

    Severely-debilitating or life-threatening (SDLT) diseases include conditions in which life expectancy is short or quality of life is greatly diminished despite available therapies. As such, the medical context for SDLT diseases is comparable to advanced cancer and the benefit vs. risk assessment and development of SDLT disease therapeutics should be similar to that of advanced cancer therapeutics. A streamlined development approach would allow patients with SDLT conditions earlier access to therapeutics and increase the speed of progression through development. In addition, this will likely increase the SDLT disease therapeutic pipeline, directly benefiting patients and reducing the economic and societal burden of SDLT conditions. Using advanced-stage heart failure (HF) as an example that illustrates the concepts applicable to other SDLT indications, this article proposes a streamlined development paradigm for SDLT disease therapeutics and recommends development of aligned global regulatory guidance. © 2017 American Society for Clinical Pharmacology and Therapeutics.

  10. DMP: Detouring Using Multiple Paths against Jamming Attack for Ubiquitous Networking System

    Directory of Open Access Journals (Sweden)

    Mihui Kim

    2010-04-01

    Full Text Available To successfully realize the ubiquitous network environment including home automation or industrial control systems, it is important to be able to resist a jamming attack. This has recently been considered as an extremely threatening attack because it can collapse the entire network, despite the existence of basic security protocols such as encryption and authentication. In this paper, we present a method of jamming attack tolerant routing using multiple paths based on zones. The proposed scheme divides the network into zones, and manages the candidate forward nodes of neighbor zones. After detecting an attack, detour nodes decide zones for rerouting, and detour packets destined for victim nodes through forward nodes in the decided zones. Simulation results show that our scheme increases the PDR (Packet Delivery Ratio and decreases the delay significantly in comparison with rerouting by a general routing protocol on sensor networks, AODV (Ad hoc On Demand Distance Vector, and a conventional JAM (Jammed Area Mapping service with one reroute.

  11. Current and potential cyber attacks on medical journals; guidelines for improving security.

    Science.gov (United States)

    Dadkhah, Mehdi; Seno, Seyed Amin Hosseini; Borchardt, Glenn

    2017-03-01

    At the moment, scholarly publishing is faced with much academic misconduct and threats such as predatory journals, hijacked journals, phishing, and other scams. In response, we have been discussing this misconduct and trying to increase the awareness of researchers, but it seems that there is a lack of research that presents guidelines for editors to help them protect themselves against these threats. It seems that information security is missing in some parts of scholarly publishing that particularly involves medical journals. In this paper, we explain different types of cyber-attacks that especially threaten editors and academic journals. We then explain the details involved in each type of attack. Finally, we present general guidelines for detection and prevention of the attacks. In some cases, we use small experiments to show that our claim is true. Finally, we conclude the paper with a prioritization of these attacks. Copyright © 2016 European Federation of Internal Medicine. Published by Elsevier B.V. All rights reserved.

  12. DMP: detouring using multiple paths against jamming attack for ubiquitous networking system.

    Science.gov (United States)

    Kim, Mihui; Chae, Kijoon

    2010-01-01

    To successfully realize the ubiquitous network environment including home automation or industrial control systems, it is important to be able to resist a jamming attack. This has recently been considered as an extremely threatening attack because it can collapse the entire network, despite the existence of basic security protocols such as encryption and authentication. In this paper, we present a method of jamming attack tolerant routing using multiple paths based on zones. The proposed scheme divides the network into zones, and manages the candidate forward nodes of neighbor zones. After detecting an attack, detour nodes decide zones for rerouting, and detour packets destined for victim nodes through forward nodes in the decided zones. Simulation results show that our scheme increases the PDR (Packet Delivery Ratio) and decreases the delay significantly in comparison with rerouting by a general routing protocol on sensor networks, AODV (Ad hoc On Demand Distance Vector), and a conventional JAM (Jammed Area Mapping) service with one reroute.

  13. Nonepileptic attack disorder among married women.

    Science.gov (United States)

    Dhanaraj, M; Rangaraj, R; Arulmozhi, T; Vengatesan, A

    2005-06-01

    To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD) among married women. Prospective cohort study with 1-year follow-up. A tertiary care teaching hospital. Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the generalized 'attack.' The data collected included clinical characteristics, semiology of the attacks, precipitating stressful events, and co-morbid psychiatric disorders. The control group included 30 age-matched married women with generalized tonic-clonic seizures. The long-term outcome and factors influencing the outcomes were analyzed. The mean duration of illness was 18 months, and the pattern of the attack was 'fall and lying still' in 53% and 'fall with generalized motor movements' in 47%. The frequency was one or more per week in 57% and occasionally in 43%. The important stressful events were matrimonial discord following illegal relationship of the husband with another woman (chi2 = 9.02, P = 0.003) and constant quarrel with other family members (chi2 = 5.19, P = 0.02). The prevalence of sexual abuse was low (7%). Co-morbid psychiatric disorder was observed in 70%. At the end of 1 year, 39% were free from the attack. Resolution of the stressful life events (chi2 = 4.52, P = 0.03) and lower frequency of attack at the time of reporting (chi2 = 3.88, P = 0.05) correlated with good outcomes. Among patients with NEAD in India, the major precipitating factors were matrimonial discord following illegal relationship of the husband with another woman and constant quarrel with other family members and not sexual abuse. Women with low frequency of attack at the time of reporting and the remission of the stressful events had better outcomes.

  14. Headache associated with sexual activity: From the benign to the life threatening

    Directory of Open Access Journals (Sweden)

    Frank Aiwansoba Imarhiagbe

    2016-01-01

    Full Text Available Background: Neurologic syndromes like headache may on occasion complicate sexual activity. Though largely benign, the headache may seldom be a symptom of an underlying sinister and life threatening neurologic disorder such as aneurysmal subarachnoid heamorrhage. Method: Relevant published materials on the subject of headache associated with sexual intercourse and their cross references from Pubmed Medline, Cochrane Library, International Headache society, EMBASE and other relevant bibliographic repositories were ferreted since 1980 till date. Result: HAS is mainly a diagnosis of exclusion. The secondary or malignant form has a course that is dictated by its underlying cause. HAS in the primary or benign form is amenable to treatment with drugs including indomethacin, propranolol and calcium channel blockers (nimodipine, verapamil and diltiazem with excellent prognosis. Conclusion: Early evaluation for underlying cause of HAS and institution of appropriate treatment is recommended.

  15. Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses

    Directory of Open Access Journals (Sweden)

    Stephen Herzog

    2011-01-01

    Full Text Available In April 2007, the Estonian Government moved a memorial commemorating the Soviet liberation of the country from the Nazis to a less prominent and visible location in Tallinn. This decision triggered rioting among Russian-speaking minorities and cyber terrorism targeting Estonia's critical economic and political infrastructure. Drawing upon the Estonian cyber attacks, this article argues that globalization and the Internet have enabled transnational groups—such as the Russian diaspora—to avenge their grievances by threatening the sovereignty of nation-states in cyberspace. Sophisticated and virtually untraceable political "hacktivists" may now possess the ability to disrupt or destroy government operations, banking transactions, city power grids, and even military weapon systems. Fortunately, western countries banded together to effectively combat the Estonian cyber attacks and minimize their effects. However, this article concludes that in the age of globalization, interdependence, and digital interconnectedness, nation-states must engage in increased cooperative cyber-defense activities to counter and prevent devastating Internet attacks and their implications.

  16. Life-Threatening Retropharyngeal Hemorrhage Secondary to Rupture of the Inferior Thyroid Artery

    Directory of Open Access Journals (Sweden)

    Cristina G. Calogero

    2015-01-01

    Full Text Available Inferior thyroid artery (ITA rupture is rare and may progress to life-threatening conditions. We present a patient who visited the emergency department after an episode of syncope and dizziness in which he had a mechanical fall that resulted in abrasions and a hematoma to his left forehead. The patient presented with dysphagia and anterior neck swelling that progressed rapidly into airway compromise requiring endotracheal intubation. Emergent computed tomography revealed a large retropharyngeal hematoma, with active arterial extravasation that was thought to be arising from the thyrocervical trunk on the left. The hematoma measured approximately 6.7 cm transversely and 3.2 cm anteroposteriorly and extended from the level of the lower nasopharynx, down the neck into the retropharyngeal and danger space and into the mediastinum posterior to the esophagus, overall approximately 25 cm. The larynx was deviated anteriorly and there was esophageal compression. An emergent arteriogram and catheterization confirmed bleeding from branches of the ITA, and successful embolization was performed. It is important to recognize the ITA rupture as a potential etiology of an acute airway compromise. In emergent situations, while securing an airway is a priority, rapidly initiating diagnostic testing to confirm the diagnosis and arranging for arterial embolization can be life-saving.

  17. Taxonomies for Reasoning About Cyber-physical Attacks in IoT-based Manufacturing Systems

    Directory of Open Access Journals (Sweden)

    Yao Pan

    2017-03-01

    Full Text Available The Internet of Things (IoT has transformed many aspects of modern manufacturing, from design to production to quality control. In particular, IoT and digital manufacturing technologies have substantially accelerated product development- cycles and manufacturers can now create products of a complexity and precision not heretofore possible. New threats to supply chain security have arisen from connecting machines to the Internet and introducing complex IoT-based systems controlling manufacturing processes. By attacking these IoT-based manufacturing systems and tampering with digital files, attackers can manipulate physical characteristics of parts and change the dimensions, shapes, or mechanical properties of the parts, which can result in parts that fail in the field. These defects increase manufacturing costs and allow silent problems to occur only under certain loads that can threaten safety and/or lives. To understand potential dangers and protect manufacturing system safety, this paper presents two taxonomies: one for classifying cyber-physical attacks against manufacturing processes and another for quality control measures for counteracting these attacks. We systematically identify and classify possible cyber-physical attacks and connect the attacks with variations in manufacturing processes and quality control measures. Our taxonomies also provide a scheme for linking emerging IoT-based manufacturing system vulnerabilities to possible attacks and quality control measures.

  18. Challenges in the management of massive intraorbital and hemifacial arteriovenous malformation as causing life-threatening epistaxis

    Directory of Open Access Journals (Sweden)

    Anura Michelle Manuel

    2017-03-01

    Full Text Available Arteriovenous malformations are congenital lesions that may evolve with time and manifest in a plethora of presentations. They can occur as torrential epistaxis when it extensively involves the facial region. Multi-imaging modalities are available to assist in characterizing the structure of the lesion as well as its location and extent. This complex disease requires a multidisciplinary team approach with preoperative embolization and surgery. We present a rare cause of life-threatening epistaxis in a gentleman with a longstanding orbital and hemifacial arteriovenous malformation and discuss the complexities involved in its management.

  19. The Diabetic Foot Attack: "'Tis Too Late to Retreat!"

    Science.gov (United States)

    Vas, Prashanth R J; Edmonds, Michael; Kavarthapu, Venu; Rashid, Hisham; Ahluwalia, Raju; Pankhurst, Christian; Papanas, Nikolaos

    2018-03-01

    The "diabetic foot attack" is one of the most devastating presentations of diabetic foot disease, typically presenting as an acutely inflamed foot with rapidly progressive skin and tissue necrosis, at times associated with significant systemic symptoms. Without intervention, it may escalate over hours to limb-threatening proportions and poses a high amputation risk. There are only best practice approaches but no international protocols to guide management. Immediate recognition of a typical infected diabetic foot attack, predominated by severe infection, with prompt surgical intervention to debride all infected tissue alongside broad-spectrum antibiotic therapy is vital to ensure both limb and patient survival. Postoperative access to multidisciplinary and advanced wound care therapies is also necessary. More subtle forms exist: these include the ischemic diabetic foot attack and, possibly, in a contemporary categorization, acute Charcot neuroarthropathy. To emphasize the importance of timely action especially in the infected and ischemic diabetic foot attack, we revisit the concept of "time is tissue" and draw parallels with advances in acute myocardial infarction and stroke care. At the moment, international protocols to guide management of severe diabetic foot presentations do not specifically use the term. However, we believe that it may help increase awareness of the urgent actions required in some situations.

  20. Life After the Event: A Review of Basic Life Support Training for Parents Following Apparent Life-Threatening Events and Their Experience and Practices Following Discharge

    LENUS (Irish Health Repository)

    2017-05-01

    Apparent Life-Threatening Events (ALTEs) are a common presentation to paediatric hospitals and represent a significant cause of parental anxiety. Basic Life Support (BLS) training is recommended for all caregivers following ALTEs. This study aimed to assess the rate of caregiver BLS training and reviewed parents experience following discharge. Parents were interviewed by phone following discharge. Over the study period 25 children attended the Emergency Department with ALTE, 17\\/25 (68%) were trained and 13\\/17 (76%) were contactable for interview. All parents found training decreased their anxiety level and were interested in attending for re-training. BLS resuscitation was subsequently required by 2\\/13 (15%) of children. Non-medical grade monitors were in use by 10\\/13 (77%) of caregivers following discharge. Caregivers are eager to engage in BLS training and it effectively reduces their caregiver anxiety. We recommend an increase in instructor staff and use of group re-training post discharge

  1. Life After the Event: A Review of Basic Life Support Training for Parents Following Apparent Life-Threatening Events and Their Experience and Practices Following Discharge.

    Science.gov (United States)

    Macken, W L; Clarke, N; Nadeem, M; Coghlan, D

    2017-05-10

    Apparent Life-Threatening Events (ALTEs) are a common presentation to paediatric hospitals and represent a significant cause of parental anxiety. Basic Life Support (BLS) training is recommended for all caregivers following ALTEs. This study aimed to assess the rate of caregiver BLS training and reviewed parents experience following discharge. Parents were interviewed by phone following discharge. Over the study period 25 children attended the Emergency Department with ALTE, 17/25 (68%) were trained and 13/17 (76%) were contactable for interview. All parents found training decreased their anxiety level and were interested in attending for re-training. BLS resuscitation was subsequently required by 2/13 (15%) of children. Non-medical grade monitors were in use by 10/13 (77%) of caregivers following discharge. Caregivers are eager to engage in BLS training and it effectively reduces their caregiver anxiety. We recommend an increase in instructor staff and use of group re-training post discharge.

  2. Core Body and Skin Temperature in Type 1 Narcolepsy in Daily Life; Effects of Sodium Oxybate and Prediction of Sleep Attacks

    NARCIS (Netherlands)

    van der Heide, Astrid; Werth, Esther; Donjacour, Claire E H M; Reijntjes, Robert H A M; Lammers, Gert Jan; Van Someren, Eus J W; Baumann, Christian R; Fronczek, Rolf

    2016-01-01

    STUDY OBJECTIVES: Previous laboratory studies in narcolepsy patients showed altered core body and skin temperatures, which are hypothesised to be related to a disturbed sleep wake regulation. In this ambulatory study we assessed temperature profiles in normal daily life, and whether sleep attacks

  3. Are first rib fractures a marker for other life-threatening injuries in patients with major trauma? A cohort study of patients on the UK Trauma Audit and Research Network database.

    Science.gov (United States)

    Sammy, Ian Ayenga; Chatha, Hridesh; Lecky, Fiona; Bouamra, Omar; Fragoso-Iñiguez, Marisol; Sattout, Abdo; Hickey, Michael; Edwards, John E

    2017-04-01

    First rib fractures are considered indicators of increased morbidity and mortality in major trauma. However, this has not been definitively proven. With an increased use of CT and the potential increase in detection of first rib fractures, re-evaluation of these injuries as a marker for life-threatening injuries is warranted. Patients sustaining rib fractures between January 2012 and December 2013 were investigated using data from the UK Trauma Audit and Research Network. The prevalence of life-threatening injuries was compared in patients with first rib fractures and those with other rib fractures. Multivariate logistic regression was performed to determine the association between first rib fractures, injury severity, polytrauma and mortality. There were 1683 patients with first rib fractures and 8369 with fractures of other ribs. Life-threatening intrathoracic and extrathoracic injuries were more likely in patients with first rib fractures. The presence of first rib fractures was a significant predictor of injury severity (Injury Severity Score >15) and polytrauma, independent of mechanism of injury, age and gender with an adjusted OR of 2.64 (95% CI 2.33 to 3.00) and 2.01 (95% CI 1.80 to 2.25), respectively. Risk-adjusted mortality was the same in patients with first rib fractures and those with other rib fractures (adjusted OR 0.97, 95% CI 0.79 to 1.19). First rib fractures are a marker of life-threatening injuries in major trauma, though they do not independently increase mortality. Management of patients with first rib fractures should focus on identification and treatment of associated life-threatening injuries. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) [year]. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  4. Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?

    Directory of Open Access Journals (Sweden)

    Ines Goicoechea-Telleria

    2018-01-01

    Full Text Available The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or to have access to places such as the gym or the office, so we rely on the security manufacturers offer when protecting our privileges and private life. It is well known that it is possible to hack into a fingerprint sensor using fake fingers made of Play-Doh and other easy-to-obtain materials but to what extent? Is this true for all users or only for specialists with a deep knowledge on biometrics? Are smartphone fingerprint sensors as reliable as desktop sensors? To answer these questions, we performed 3 separate evaluations. First, we evaluated 4 desktop fingerprint sensors of different technologies by attacking them with 7 different fake finger materials. All of them were successfully attacked by an experienced attacker. Secondly, we carried out a similar test on 5 smartphones with embedded sensors using the most successful materials, which also hacked the 5 sensors. Lastly, we gathered 15 simulated attackers with no background in biometrics to create fake fingers of several materials, and they had one week to attack the fingerprint sensors of the same 5 smartphones, with the starting point of a short video with the techniques to create them. All 5 smartphones were successfully attacked by an inexperienced attacker. This paper will provide the results achieved, as well as an analysis on the attack potential of every case. All results are given following the metrics of the standard ISO/IEC 30107-3.

  5. The dorsolateral periaqueductal gray and its role in mediating fear learning to life threatening events.

    Directory of Open Access Journals (Sweden)

    Grasielle C Kincheski

    Full Text Available The dorsolateral column of the periaqueductal gray (dlPAG integrates aversive emotional experiences and represents an important site responding to life threatening situations, such as hypoxia, cardiac pain and predator threats. Previous studies have shown that the dorsal PAG also supports fear learning; and we have currently explored how the dlPAG influences associative learning. We have first shown that N-methyl-D-aspartate (NMDA 100 pmol injection in the dlPAG works as a valuable unconditioned stimulus (US for the acquisition of olfactory fear conditioning (OFC using amyl acetate odor as conditioned stimulus (CS. Next, we revisited the ascending projections of the dlPAG to the thalamus and hypothalamus to reveal potential paths that could mediate associative learning during OFC. Accordingly, the most important ascending target of the dlPAG is the hypothalamic defensive circuit, and we were able to show that pharmacological inactivation using β-adrenoceptor blockade of the dorsal premammillary nucleus, the main exit way for the hypothalamic defensive circuit to thalamo-cortical circuits involved in fear learning, impaired the acquisition of the OFC promoted by NMDA stimulation of the dlPAG. Moreover, our tracing study revealed multiple parallel paths from the dlPAG to several thalamic targets linked to cortical-hippocampal-amygdalar circuits involved in fear learning. Overall, the results point to a major role of the dlPAG in the mediation of aversive associative learning via ascending projections to the medial hypothalamic defensive circuit, and perhaps, to other thalamic targets, as well. These results provide interesting perspectives to understand how life threatening events impact on fear learning, and should be useful to understand pathological fear memory encoding in anxiety disorders.

  6. Pseudohypoaldosteronism in a Neonate Presenting as Life-Threatening Hyperkalemia

    Directory of Open Access Journals (Sweden)

    Najya A. Attia

    2016-01-01

    Full Text Available Context. Pseudohypoaldosteronism type 1 (PHA1 is a life-threatening disease that causes severe hyperkalemia and cardiac arrest if not treated appropriately or if diagnosis is missed. Objective. To report a case of a newborn with vomiting and lethargy, ultimately diagnosed with pseudohypoaldosteronism. Patient. This case presented to the ED at an age of 14 days in hypovolemic shock. There was a family history of sudden infant death, her sister who was diagnosed with CAH and passed away at 3 months of age despite regular hormone replacement. Our patient had cardiac arrest in ED, due to hyperkalemia; while receiving fluid boluses, cardiopulmonary resuscitation was initiated. After stabilization, diagnostic workup demonstrated persistently low sodium, acidosis, and high potassium, which required peritoneal dialysis. Based on these findings, the patient was diagnosed with CAH. It turned out later that the patient had PHA1. Two years later, the patient had a new sibling with the same disease diagnosed at birth and started immediately on treatment without any complication. Conclusions and Outcome. This case highlights the significant diagnostic and therapeutic challenges in treating children with PHA1. Adrenal crisis is not always CAH; delayed diagnosis can lead to complication and even death. The presence of high plasma renin activity, aldosterone, and cortisol, along with the presence of hyponatremia and hyperkalemia, established the diagnosis of PHA type 1 and ruled out CAH.

  7. Thyrotoxic periodic paralysis in a Saudi patient complicated by life-threatening arrhythmia

    International Nuclear Information System (INIS)

    Aldasouqi, Saleh; Bokhari, Samia A; Khan, Patan M; AlZahrani, Ali S

    2009-01-01

    Thyrotoxic periodic paralysis (TPP) is rare in non-Orientals, and sporadic case reports were reported world-wide. Eight cases were reported in Arabs, including 3 Saudis. We present an additional case of TPP in a 38-year-old Saudi man, and review the literature on TPP in Arabs. Our patient presented with complete flaccid quadriplegia, 5 weeks after he was diagnosed with Graves' disease that was treated with carbimazole and propranolol. He was hyperthyroid, and his potassium was extremely low (1.5 mmol/L). During initial evaluation in the emergency room, he developed transient asystole manifested by syncope. He was resuscitated and his hypokalemia was corrected, and he had a full recovery. This case emphasizes the notion that TPP can occur in patients of any ethnic background. The development of serious cardiac complications in our patient underscores the importance of early and correct diagnosis of this potentially life-threatening complication of hyperthyroidism. (author)

  8. Challenges in the management of massive intraorbital and hemifacial arteriovenous malformation as causing life-threatening epistaxis.

    Science.gov (United States)

    Manuel, Anura Michelle; Kalimuthu, Santhi; Pathmanathan, Sitra Siri; Narayanan, Prepageran; Zainal Abidin, Zurina; Azmi, Khairul; Khalil, Alizan

    2017-04-01

    Arteriovenous malformations are congenital lesions that may evolve with time and manifest in a plethora of presentations. They can occur as torrential epistaxis when it extensively involves the facial region. Multi-imaging modalities are available to assist in characterizing the structure of the lesion as well as its location and extent. This complex disease requires a multidisciplinary team approach with preoperative embolization and surgery. We present a rare cause of life-threatening epistaxis in a gentleman with a longstanding orbital and hemifacial arteriovenous malformation and discuss the complexities involved in its management. Copyright © 2017. Published by Elsevier Taiwan.

  9. Infantile Apparent Life-Threatening Events, an Educational Review

    Directory of Open Access Journals (Sweden)

    Hamed Aminiahidashti

    2015-01-01

    Full Text Available Many physicians have received a frantic call from anxious parents stating that their child had stopped breathing, become limp, or turned blue but then had recovered quickly. An apparent life-threatening event (ALTE is defined as “an episode that is frightening to the observer, and is characterized by some combination of apnea, color change, marked change in muscle tone, choking, gagging, or coughing”. The incidence of ALTE is reported to be 0.05% to 6%. The knowledge about the most common causes and factors associated with higher risk of ALTE could be resulted in a more purposeful approach, improving the decision making process, and benefiting both children and parents. The aim of this review article was to report the epidemiology, etiology, evaluation, management, and disposition of ALTE. Infants with an ALTE might present no signs of acute illness and are commonly managed in the emergency settings that often require significant medical attention; hence, the emergency medicine personnel should be aware of the its clinical importance. There is no specific treatment for ALTE; therefore, the clinical evaluations should be focused on the detection of the underlying causes, which will define the outcomes and prognosis. ALTE is a confusing entity, representing a constellation of descriptive symptoms and signs; in other words, it is not a diagnosis. There are multiple possible etiologies and difficulties in evaluating and managing infants with these events, which are challenges to primary care physicians, emergency medicine specialists, and subspecialty pediatricians. The evaluation of these events in infants includes a detailed history, appropriate physical examination, diagnostic tests guided by obtained clues from the history and physical examination, and observation in the emergency department.

  10. CDC: Tips from Former Smokers – Jessica PSA (:30)

    Centers for Disease Control (CDC) Podcasts

    Exposure to secondhand smoke can trigger a life-threatening asthma attack. This 30 second PSA features Jessica, a mother with a young son who suffers from asthma attacks triggered by secondhand smoke exposure.

  11. An assessment of meaning in life-threatening illness: development of the Healing Experience in All Life Stressors (HEALS).

    Science.gov (United States)

    Sloan, Danetta Hendricks; BrintzenhofeSzoc, Karlynn; Kichline, Tiffany; Baker, Karen; Pinzon, Jean-Paul; Tafe, Christina; Li, Lingsheng; Cheng, M Jennifer; Berger, Ann

    2017-01-01

    Patients with life-threatening or chronic illness report an experience of increased positive psychological, social, and/or spiritual change during diagnosis and/or treatment of their illness, even in the face of unfavorable prognosis. This transformation begins through the ability to make their life meaningful by forming meaningful connections that emerge through self-introspection and relationships with a divine entity, nature, and other people. The Healing Experience in All Life Stressors (HEALS) assessment provides a way to identify distress-causing changes that may interfere with the development of meaning and psycho-social-spiritual homeostasis. Preliminary examination of responses to items on the HEALS and examination of the factor structure. The 48-item HEALS questionnaire was developed using a multistep process: literature review for concept development, item generation from qualitative data, and face and content validity by expert panel. In the current study, HEALS was completed by 100 patients diagnosed with life-limiting disease and seen by the palliative care team at a large research institution in the US. Exploratory factor analysis techniques were used to determine scale structure of the instrument. Outcome testing of sample adequacy using Kaiser-Meyer-Olkin statistic was 0.75, which exceeds the recommended value of 0.60. The HEALS show very good internal consistency with a Cronbach's a of 0.94. Overall results of the exploratory factor analysis established a four-factor questionnaire: 1) religion; 2) spirituality, demonstrated by a) interaction with a religious community and b) belief in higher power; 3) intrapersonal; and 4) interpersonal relationships expressed through psychological changes resulting in enhanced outlook and improvement in relationships with family and friends. This study involved the initial step to commence the process of scale validation, with promising outcomes identifying subscales as an effective way to assess the construct of

  12. Recurrent life-threatening reactions to platelet transfusion in an aplastic anaemia patient with a paroxysmal nocturnal haemoglobinuria clone.

    Science.gov (United States)

    Mohamed, M; Bates, G; Richardson, D; Burrows, L

    2014-09-01

    A 60-year-old woman was diagnosed with non-severe aplastic anaemia when she presented with anaemia and thrombocytopenia. She developed recurrent life-threatening hypotensive reactions during transfusion of leukodepleted platelet concentrates, and washed platelet concentrates prevented the development of such reactions subsequently. A paroxysmal nocturnal haemoglobinuria clone was detected on investigating for aplastic anaemia, which has been speculated to play a role in the recurrent hypotensive reactions. © 2014 The Authors; Internal Medicine Journal © 2014 Royal Australasian College of Physicians.

  13. Premenstrual Exacerbation of Life-Threatening Asthma: Effect of Gonadotrophin Releasing Hormone Analogue Therapy

    Directory of Open Access Journals (Sweden)

    Alun L Edwards

    1996-01-01

    Full Text Available Variability in the severity of asthma during various phases of the menstrual cycle has been frequently suspected. However, the hormonal changes that might affect mediators of bronchospasm have yet to be elucidated. The case of a 41-year-old woman suffering from longstanding asthma with life-threatening exacerbations is reported. The patient was treated with buserelin, a gonadotropin releasing hormone (GnRH analogue, which created a temporary chemical menopause and thus permitted diagnosis of a premenstrual exacerbation of asthma and offered insight into potential therapy. GnRH analogues may therefore be of value in assessing women with severe asthma suspected to vary with the menstrual cycle. The addition of estrogens and progestins at the same time as treatment with GnRH analogue may be of value in determining the role of these hormones in the pathogenesis of menstrually related exacerbations of asthma.

  14. Effect of threatening life experiences and adverse family relations in ulcerative colitis: analysis using structural equation modeling and comparison with Crohn's disease.

    Science.gov (United States)

    Slonim-Nevo, Vered; Sarid, Orly; Friger, Michael; Schwartz, Doron; Sergienko, Ruslan; Pereg, Avihu; Vardi, Hillel; Singer, Terri; Chernin, Elena; Greenberg, Dan; Odes, Shmuel

    2017-05-01

    We published that threatening life experiences and adverse family relations impact Crohn's disease (CD) adversely. In this study, we examine the influence of these stressors in ulcerative colitis (UC). Patients completed demography, economic status (ES), the Patient-Simple Clinical Colitis Activity Index (P-SCCAI), the Short Inflammatory Bowel Disease Questionnaire (SIBDQ), the Short-Form Health Survey (SF-36), the Brief Symptom Inventory (BSI), the Family Assessment Device (FAD), and the List of Threatening Life Experiences (LTE). Analysis included multiple linear and quantile regressions and structural equation modeling, comparing CD. UC patients (N=148, age 47.55±16.04 years, 50.6% women) had scores [median (interquartile range)] as follows: SCAAI, 2 (0.3-4.8); FAD, 1.8 (1.3-2.2); LTE, 1.0 (0-2.0); SF-36 Physical Health, 49.4 (36.8-55.1); SF-36 Mental Health, 45 (33.6-54.5); Brief Symptom Inventory-Global Severity Index (GSI), 0.5 (0.2-1.0). SIBDQ was 49.76±14.91. There were significant positive associations for LTE and SCAAI (25, 50, 75% quantiles), FAD and SF-36 Mental Health, FAD and LTE with GSI (50, 75, 90% quantiles), and ES with SF-36 and SIBDQ. The negative associations were as follows: LTE with SF-36 Physical/Mental Health, SIBDQ with FAD and LTE, ES with GSI (all quantiles), and P-SCCAI (75, 90% quantiles). In structural equation modeling analysis, LTE impacted ES negatively and ES impacted GSI negatively; LTE impacted GSI positively and GSI impacted P-SCCAI positively. In a split model, ES had a greater effect on GSI in UC than CD, whereas other path magnitudes were similar. Threatening life experiences, adverse family relations, and poor ES make UC patients less healthy both physically and mentally. The impact of ES is worse in UC than CD.

  15. Health-Related Quality of Life with Subcutaneous C1-Inhibitor for Prevention of Attacks of Hereditary Angioedema.

    Science.gov (United States)

    Lumry, William R; Craig, Timothy; Zuraw, Bruce; Longhurst, Hilary; Baker, James; Li, H Henry; Bernstein, Jonathan A; Anderson, John; Riedl, Marc A; Manning, Michael E; Keith, Paul K; Levy, Donald S; Caballero, Teresa; Banerji, Aleena; Gower, Richard G; Farkas, Henriette; Lawo, John-Philip; Pragst, Ingo; Machnig, Thomas; Watson, Douglas J

    2018-01-31

    Hereditary angioedema with C1-inhibitor deficiency (C1-INH-HAE) impairs health-related quality of life (HRQoL). The objective of this study was to assess HRQoL outcomes in patients self-administering subcutaneous C1-INH (C1-INH[SC]; HAEGARDA) for routine prevention of HAE attacks. Post hoc analysis of data from the placebo-controlled, crossover phase III COMPACT study (Clinical Studies for Optimal Management of Preventing Angioedema with Low-Volume Subcutaneous C1-Inhibitor Replacement Therapy). Ninety patients with C1-INH-HAE were randomized to 1 of 4 treatment sequences: C1-INH(SC) 40 or 60 IU/kg twice weekly for 16 weeks, preceded or followed by 16 weeks of twice weekly placebo injections. All HAE attacks were treated with open-label on-demand treatment as necessary. HRQoL assessments at week 14 (last visit) included the European Quality of Life-5 Dimensions Questionnaire (EQ-5D-3L), the Hospital Anxiety and Depression Scale (HADS), the Work Productivity and Activity Impairment Questionnaire (WPAI), and the Treatment Satisfaction Questionnaire for Medication (TSQM). Compared with placebo (on-demand treatment alone), treatment with twice weekly C1-INH(SC) (both doses combined) was associated with better EQ-5D visual analog scale general health, less HADS anxiety, less WPAI presenteeism, work productivity loss, and activity impairment, and greater TSQM effectiveness and overall treatment satisfaction. More patients self-reported a "good/excellent" response during routine prevention with C1-INH(SC) compared with on-demand only (placebo prophylaxis) management. For each HRQoL measure, a greater proportion of patients had a clinically meaningful improvement during C1-INH(SC) treatment compared with placebo. In patients with frequent HAE attacks, a treatment strategy of routine prevention with self-administered twice weekly C1-INH(SC) had a greater impact on improving multiple HAE-related HRQoL impairments, most notably anxiety and work productivity, compared with on

  16. Dissociative experiences and quality of life in patients with non-epileptic attack disorder.

    Science.gov (United States)

    Mitchell, James W; Ali, Fizzah; Cavanna, Andrea E

    2012-11-01

    Dissociative experiences are commonly reported by patients with non-epileptic attack disorder (NEAD). This cross-sectional study examined the prevalence and characteristics of dissociative experiences in patients with NEAD and assessed their association with health-related quality of life (HRQoL). Fifty-three patients diagnosed with NEAD were consecutively recruited (70.0% female, mean age=42 years, 22.0% with comorbid epilepsy) from a specialist neuropsychiatric clinic. Our sample reported high levels of dissociative experiences, with 36.7% of patients scoring ≥30 on the Dissociative Experiences Scale (DES). Significant negative correlations were found between total DES scores and HRQoL, as measured by the QOLIE-31 questionnaire (r=-0.64, pdissociative experiences in this patient population, highlighting the importance of routinely screening patients for dissociative symptoms and their impact on patients' lives. Copyright © 2012 Elsevier Inc. All rights reserved.

  17. Splenic Abscess: An Uncommon Entity with Potentially Life-Threatening Evolution

    Directory of Open Access Journals (Sweden)

    Mei-Chun Lee

    2018-01-01

    Full Text Available Background/Purpose. Splenic abscess is rare with potentially life-threatening evolution. The aim of this study is to review the clinical features, microbiological etiologies, treatment, and outcomes of patients with splenic abscess. Methods. We reviewed the admitted patients with suspected splenic abscess and made the diagnosis of splenic abscess. The clinical characteristics, underlying diseases, treatment course, organism spectra, abscess number and size, therapeutic methods, and clinical outcome at a tertiary medical center in Taiwan over a period of 5 years were analyzed. Results. Of 16 patients with splenic abscess, the male to female ratio was 1 : 1. Common presentations were fever (11 patients, 68.7%, diffuse abdominal pain (6 patients, 37.5%, left upper quadrant pain or tenderness (6 patients, 37.5%, and left-sided pleural effusions (8 patients, 50%. Antimicrobial therapy was administered in all patients. Fourteen (87.5% patients recovered under medical treatment. One (6.2% patient underwent splenectomy, four (25% patients performed percutaneous drainage of their splenic abscess, and 11 (68.7% patients received antimicrobial therapy alone. Conclusion. We noted that mortality may be more related to patients with underlying immunodeficiency. Patients with splenic abscesses receiving antimicrobial therapy alone were in a relatively high proportion and got a good prognosis especially in patients with small and multiple abscesses.

  18. Biodegradable airway stents in infants - Potential life-threatening pitfalls.

    Science.gov (United States)

    Sztanó, B; Kiss, G; Márai, K; Rácz, G; Szegesdi, I; Rácz, K; Katona, G; Rovó, L

    2016-12-01

    The solution of severe tracheobronchial obstructions in early childhood means a great challenge. Biodegradable stents were intended to be a minimally invasive temporary solution which may decrease the number of interventions and limit the possible complications of stenting procedures. However, our first experiences have brought out a new, - especially in childhood - potentially life-threatening complication of this concept. Five SX-ELLA biodegradable polydioxanone stents was applied in three patients because of severe tracheobronchial obstruction: congenital tracheomalacia (7 day-old), acquired tracheomalacia (10 month-old), and congenital trachea-bronchomalacia (10 month-old). The breathing of all children improved right after the procedure. We observed degradation of the stent from the 5th postoperative week which resulted in large intraluminar fragments causing significant airway obstruction: one patient died of severe pneumonia, the other baby required urgent bronchoscopy to remove the obstructing 'foreign body' from the trachea. In the third case repeated stent placements successfully maintained the tracheal lumen. Polydioxanone stents may offer an alternative to metallic or silastic stents for collapse or external compression of the trachea in children; however, large decaying fragments mean a potential risk especially in the small size pediatric airway. The fragmentation of the stent, which generally starts in the 4-6 postoperative weeks, may create large sharp pieces. These may be anchored to the mucosa and covered by crust leading to obstruction. As repeated interventions are required, we do not consider the application of biodegradable stents unambiguously advantageous. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  19. New efficient utility upper bounds for the fully adaptive model of attack trees

    NARCIS (Netherlands)

    Buldas, Ahto; Lenin, Aleksandr

    2013-01-01

    We present a new fully adaptive computational model for attack trees that allows attackers to repeat atomic attacks if they fail and to play on if they are caught and have to pay penalties. The new model allows safer conclusions about the security of real-life systems and is somewhat

  20. Docetaxel induced Lyell′s syndrome: A rare life threatening cause of dermatitis medicamentosas

    Directory of Open Access Journals (Sweden)

    Faheem Arshad

    2014-01-01

    Full Text Available Lyell′s syndrome or toxic epidermal necrolysis (TEN is a life threatening complication mostly caused by medications, characterized by desquamative lesions of the skin and mucous membranes with 30 percent or more epidermal involvement along with mucus membrane. We report a rare case of toxic epidermal necrolysis following administration of docetaxel, a semi-synthetic taxane. A female diagnosed as having metastatic breast carcinoma received chemotherapy in form of docetaxel after being exposed to adjuvant chemotherapy, developed severe involvement of skin and mucus membrane. Diagnosis of TEN was made and she was managed with steroids, antibiotics, intravenous fluids and antiseptic dressings. Common toxicities reported with this drug include myelosuppression, alopecia, nail damage, erythema multiforme major and neuropathy. We believe this is the first case report of Lyell′s syndrome following docetaxel. Main aim of this case is to make physicians aware of the severe skin reactions with docetaxel, measures to avoid them, early recognition and prompt treatment.

  1. Life-threatening intoxication with methylene bis(thiocyanate: clinical picture and pitfalls. A case report

    Directory of Open Access Journals (Sweden)

    Schnuelle Peter

    2006-04-01

    Full Text Available Abstract Background Methylene bis(thiocyanate (MBT is a microbiocidal agent mainly used in industrial water cooling systems and paper mills as an inhibitor of algae, fungi, and bacteria. Case presentation We describe the first case of severe intoxication following inhalation of powder in an industrial worker. Profound cyanosis and respiratory failure caused by severe methemoglobinemia developed within several minutes. Despite immediate admission to the intensive care unit, where mechanical ventilation and hemodialysis for toxin elimination were initiated, multi-organ failure involving liver, kidneys, and lungs developed. While liver failure was leading, the patient was successfully treated with the MARS (molecular adsorbent recirculating system procedure. Conclusion Intoxication with MBT is a potentially life-threatening intoxication causing severe methemoglobinemia and multi-organ failure. Extracorporeal liver albumin dialysis (MARS appears to be an effective treatment to allow recovery of hepatic function.

  2. A Smart Trust Management Method to Detect On-Off Attacks in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Jean Caminha

    2018-01-01

    Full Text Available Internet of Things (IoT resources cooperate with themselves for requesting and providing services. In heterogeneous and complex environments, those resources must trust each other. On-Off attacks threaten the IoT trust security through nodes performing good and bad behaviors randomly, to avoid being rated as a menace. Some countermeasures demand prior levels of trust knowledge and time to classify a node behavior. In some cases, a malfunctioning node can be mismatched as an attacker. In this paper, we introduce a smart trust management method, based on machine learning and an elastic slide window technique that automatically assesses the IoT resource trust, evaluating service provider attributes. In simulated and real-world data, this method was able to identify On-Off attackers and fault nodes with a precision up to 96% and low time consumption.

  3. Sodium hypochlorite accident resulting in life-threatening airway obstruction during root canal treatment: a case report

    Directory of Open Access Journals (Sweden)

    Al-Sebaei MO

    2015-03-01

    Full Text Available Maisa O Al-Sebaei,1 Omar A Halabi,2 Ibrahim E El-Hakim3 1Department of Oral and Maxillofacial Surgery, King Abdulaziz University – Faculty of Dentistry, Jeddah, Kingdom of Saudi Arabia; 2Saudi Board of Oral and Maxillofacial Surgery, Al-Noor Specialist Hospital, Makkah, Kingdom of Saudi Arabia; 3Department of Oral and Maxillofacial Surgery, Riyadh Colleges of Dentistry and Pharmacy, Riyadh, Kingdom of Saudi Arabia Aim: This case report describes a serious and life-threatening complication of the use of sodium hypochlorite as an irrigation solution in root canal therapy. Summary: This case report describes a hypochlorite accident that occurred in a healthy 42-year-old female who was undergoing routine root canal therapy for the lower right central incisor (tooth #41. After approximately 1 hour of irrigation with 3% sodium hypochlorite (for a total of 12 cc, the patient complained of severe pain and burning in the lip. The swelling progressed over the next 8 hours to involve the sublingual and submental fascial spaces with elevation of the tongue and resultant upper airway obstruction. The patient was intubated and remained on mechanical ventilation for 3 days. She recovered without any skin necrosis or nerve deficits. Key learning points: This case report highlights the importance of carefully performing root canal irrigation with sodium hypochlorite to avoid complications. Careful injection without pressure, the use of proper rubber dam isolation, and the use of the endodontic needle are necessary to avoid this type of complication. Although it is a safe root canal irrigation solution, its use may lead to life-threatening complications. Early recognition and management of the untoward effects of sodium hypochlorite are vital for the patient's safety. Keywords: complications of root canal, facial edema, root canal irrigation, root canal therapy, sodium hypochlorite, upper airway obstruction

  4. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  5. Robustness of non-interdependent and interdependent networks against dependent and adaptive attacks

    Science.gov (United States)

    Tyra, Adam; Li, Jingtao; Shang, Yilun; Jiang, Shuo; Zhao, Yanjun; Xu, Shouhuai

    2017-09-01

    Robustness of complex networks has been extensively studied via the notion of site percolation, which typically models independent and non-adaptive attacks (or disruptions). However, real-life attacks are often dependent and/or adaptive. This motivates us to characterize the robustness of complex networks, including non-interdependent and interdependent ones, against dependent and adaptive attacks. For this purpose, dependent attacks are accommodated by L-hop percolation where the nodes within some L-hop (L ≥ 0) distance of a chosen node are all deleted during one attack (with L = 0 degenerating to site percolation). Whereas, adaptive attacks are launched by attackers who can make node-selection decisions based on the network state in the beginning of each attack. The resulting characterization enriches the body of knowledge with new insights, such as: (i) the Achilles' Heel phenomenon is only valid for independent attacks, but not for dependent attacks; (ii) powerful attack strategies (e.g., targeted attacks and dependent attacks, dependent attacks and adaptive attacks) are not compatible and cannot help the attacker when used collectively. Our results shed some light on the design of robust complex networks.

  6. AMC Model for Denial of Sleep Attack Detection

    OpenAIRE

    Bhattasali, Tapalina; Chaki, Rituparna

    2012-01-01

    Due to deployment in hostile environment, wireless sensor network is vulnerable to various attacks. Exhausted sensor nodes in sensor network become a challenging issue because it disrupts the normal connectivity of the network. Affected nodes give rise to denial of service that resists to get the objective of sensor network in real life. A mathematical model based on Absorbing Markov Chain (AMC)is proposed for Denial of Sleep attack detection in sensor network. In this mechanism, whether sens...

  7. A Study on the VHCF Fatigue Behaviors of Hydrogen Attacked Inconel 718 Alloy

    Energy Technology Data Exchange (ETDEWEB)

    Suh, Chang-Min [Kyungpook National Univ., DMI Senior Fellow, Daegu (Korea, Republic of); Nahm, Seung-Hoon [Korea Research Institute of Standards and Science, Daejeon (Korea, Republic of); Kim, Jun-Hyong; Pyun, Young-Sik [Sun Moon Univ., Chunan (Korea, Republic of)

    2016-07-15

    This study is to investigate the influence of hydrogen attack and UNSM on fatigue behaviors of the Inconel 718 alloy. The decrease of the fatigue life between the untreated and the hydrogen attacked material is 10-20%. The fatigue lives of hydrogen attacked specimen decreased without a fatigue limit, similar to those of nonferrous materials. Due to hydrogen embrittlement, about 80% of the surface cracks were smaller than the average grain size of 13 μm. Many small surface cracks caused by the embrittling effect of hydrogen attack were initiated at the grain boundaries and surface scratches. Cracks were irregularly distributed, grew, and then coalesced through tearing, leading to a reduction of fatigue life. Results revealed that the fatigue lives of UNSM-treated specimens were longer than those of the untreated specimens.

  8. Neonatal near miss and mortality: factors associated with life-threatening conditions in newborns at six public maternity hospitals in Southeast Brazil

    Directory of Open Access Journals (Sweden)

    Pauline Lorena Kale

    Full Text Available Abstract: We aimed to evaluate factors associated with cases of neonatal near miss and neonatal deaths at six public maternity hospitals in São Paulo and Rio de Janeiro States, Brazil, in 2011. A prospective hospital-based birth cohort investigated these outcomes among live births with life-threatening conditions. Associations were tested using multinomial logistic regression models with hierarchical levels. High rates of near miss were observed for maternal syphilis (52.2‰ live births and lack of prenatal care (80.8‰ live births. Maternal black skin color (OR = 1.9; 95%CI: 1.2-3.2, hemorrhage (OR = 2.2; 95%CI: 1.3-3.9, hypertension (OR = 3.0; 95%CI: 2.0-4.4, syphilis (OR = 3.3; 95%CI: 1.5-7.2, lack of prenatal care (OR = 5.6; 95%CI: 2.6-11.7, cesarean section and hospital, were associated with near miss; while hemorrhage (OR = 4.6; 95%CI: 1,8-11.3, lack of prenatal care (OR = 17.4; 95%CI: 6.5-46.8 and hospital, with death. Improvements in access to qualified care for pregnant women and newborns are necessary to reduce neonatal life-threatening conditions.

  9. Personality characteristics of victims of illegal attacks on the Internet

    Directory of Open Access Journals (Sweden)

    Safuanov F.S.

    2016-01-01

    Full Text Available The article examines the personality characteristics of victims of illegal attacks on the Internet. We used methods as follow: 16 factors Cattell personality questionnaire, subjective control level, life-style index, Buss-Perry questionnaire, Spielberger State-Trait Anxiety Inventory, a COPE inventory. 78 internet users were divided into two groups of 38 persons: the main group included people falling victim to illegal attacks on the Internet, the control group participants were not attacked on the internet. We identified specific aggregated symptoms of individual psychological characteristics of internet attack victims and show that victims of "non-forced" and "forced" offenses have different levels of situational and personal anxiety, aggression and locus of control.

  10. Crouzon’s Syndrome with Life-Threatening Ear Bleed: Ruptured Jugular Vein Diverticulum Treated by Endovascular Embolization

    International Nuclear Information System (INIS)

    Mondel, Prabath Kumar; Anand, Sunanda; Limaye, Uday S.

    2015-01-01

    Crouzon’s syndrome is the commonest variety of syndromic craniosynostosis. Life-threatening ear bleed due to ruptured jugular venous diverticulum in Crouzon’s syndrome has not been described previously. In patients with syndromic craniosynostosis, definitive repair of jugular diverticulum by open surgery is fraught with high risk of bleeding, poor functional outcomes, and even death. A 24-year-old woman with Crouzon’s syndrome presented with conductive hearing loss and recurrent episodes of torrential bleeding from her left ear. On computed tomography, a defect in the roof of jugular fossa containing jugular venous diverticulum immediately inferior to the bony external auditory canal was seen. The clinical presentation, imaging features, and endovascular management of Crouzon’s syndrome due to a ruptured jugular venous diverticulum is described

  11. Crouzon’s Syndrome with Life-Threatening Ear Bleed: Ruptured Jugular Vein Diverticulum Treated by Endovascular Embolization

    Energy Technology Data Exchange (ETDEWEB)

    Mondel, Prabath Kumar, E-mail: prabathmondel@gmail.com; Anand, Sunanda, E-mail: sunandaanand@gmail.com; Limaye, Uday S., E-mail: uslkem@gmail.com [Lilavati Hospital and Research Centre, Department of Interventional Neuroradiology (India)

    2015-08-15

    Crouzon’s syndrome is the commonest variety of syndromic craniosynostosis. Life-threatening ear bleed due to ruptured jugular venous diverticulum in Crouzon’s syndrome has not been described previously. In patients with syndromic craniosynostosis, definitive repair of jugular diverticulum by open surgery is fraught with high risk of bleeding, poor functional outcomes, and even death. A 24-year-old woman with Crouzon’s syndrome presented with conductive hearing loss and recurrent episodes of torrential bleeding from her left ear. On computed tomography, a defect in the roof of jugular fossa containing jugular venous diverticulum immediately inferior to the bony external auditory canal was seen. The clinical presentation, imaging features, and endovascular management of Crouzon’s syndrome due to a ruptured jugular venous diverticulum is described.

  12. Evento com aparente risco de morte: uma revisão Evento con aparente riesgo de muerte (alte: una revisión Apparent life-threatening event: a review

    Directory of Open Access Journals (Sweden)

    Mariana Tresoldi das N. Romaneli

    2012-12-01

    Full Text Available OBJETIVO: Realizar uma revisão crítica reunindo informações disponíveis a respeito dos eventos com aparente risco de morte. FONTES DE DADOS: Revisão bibliográfica dos artigos (em português, inglês e espanhol obtidos dos bancos de dados eletrônicos Medline, Lilacs e SciELO, utilizando as palavras-chave: eventos com aparente risco de morte, evento com aparente risco de vida infantil, lactente, apneia, monitorização e cianose. SÍNTESE DOS DADOS: Os eventos com aparente risco de mortesão súbitos e caracterizados por uma combinação de apneia, alteração na coloração da pele e tônus muscular, com inúmeras causas subjacentes. Sua incidência verdadeira é desconhecida e a faixa etária mais acometida é de 11 a 12 semanas. Não há correlação entre o evento com aparente risco de morte e a síndrome da morte súbita do lactente, embora já tenham sido consideradas manifestações da mesma doença. Muitas vezes, o lactente tem aparência saudável ao ser avaliado pelo pediatra após apresentar eventos com aparente risco de morte, porém, isso não afasta a possibilidade de existir uma doença grave associada ao evento, que deve ser investigada e tratada. Quando não são encontradas as causas, o evento é idiopático, geralmente com boa evolução. CONCLUSÕES: É necessário investigar os lactentes levados ao pronto-socorro após apresentarem eventos com aparente risco de morte, devido ao risco de sequelas e mortalidade. Não há uma padronização das condutas a serem realizadas diante de um lactente com aparência saudável que tenha evento com aparente risco de morte, mas recomenda-se que o paciente seja internado e a causa do evento, investigada. A observação e o monitoramento em ambiente hospitalar devem ocorrer no mínimo 24 horas após o evento.OBJETIVO: Realizar una revisión crítica, reuniendo las informaciones disponibles respecto a los Eventos con Aparente Riesgo de Muerte (ALTE - Apparent life-threatening event

  13. A Centralized Detection of Sinkhole Attacks Based on Energy Level of the Nodes on Cluster-Based Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Merve Nilay Aydın

    2017-10-01

    Full Text Available Wireless Sensor Networks is consist of thousands of small and low-cost devices, which communicate over wireless medium. Due to locating in harsh environment and having limited resources, WSN is prone to various attacks. One of the most dangerous attacks threatening WSN is the sinkhole attack. In this paper, sinkhole attack is modelled on a cluster-based WSN, and a centralized detection algorithm based on the remaining energies of the nodes is proposed. The simulations were run for different values of energy thresholds and various numbers of nodes. The performance of the system was investigated over total energy consumption in the system, the number of packets arrived at base station and true detection rate of the sinkhole node(s. The results showed that the proposed method is energy-efficient and detects the malicious nodes with a 100% accuracy for all number of nodes.

  14. Mind's response to the body's betrayal: Gestalt/Existential therapy for clients with chronic or life-threatening illnesses.

    Science.gov (United States)

    Imes, Suzanne A; Clance, Pauline Rose; Gailis, Andra T; Atkeson, Ellen

    2002-11-01

    In the literature on chronic or life-threatening illness, there is an overriding emphasis on clients' psychological coping styles and how they relate to psychological functioning. By contrast, in our approach, we look at the subjective mind/body experiences that clients have of their illness and how their lives are impacted by their illness. As psychotherapists, we address their existential distress, pain, body experience, thoughts, and feelings, as well as their efforts to cope or find meaning in their illness. We summarize Gestalt/Existential therapy for chronic illness, illustrate the approach with three case-vignettes, and stress the importance of attending to each client's unique responses to illness. Copyright 2002 Wiley Periodicals, Inc.

  15. The promise and perils of Antarctic fishes: The remarkable life forms of the Southern Ocean have much to teach science about survival, but human activity is threatening their existence

    OpenAIRE

    O'Brien, Kristin M; Crockett, Elizabeth L

    2012-01-01

    The waters around the Antarctic are a treasure trove of fauna specially adapted to extreme cold temperatures. However, as with many other marine ecosystems, its life forms are threatened by human actions.

  16. Tension pneumothorax, is it a really life-threatening condition?

    Science.gov (United States)

    2013-01-01

    Background Tension pneumothorax is a life-threatening occurrence that is infrequently the consequence of spontaneous pneumothorax. The aim of this study was to identify the risk factors for the development of tension pneumothorax and its effect on clinical outcomes. Methods We reviewed patients who were admitted with spontaneous pneumothorax between August 1, 2003 and December 31, 2011. Electronic medical records and the radiological findings were reviewed with chest x-ray and high-resolution computed tomography scans that were retrieved from the Picture Archiving Communication System. Results Out of the 370 patients included in this study, tension pneumothorax developed in 60 (16.2%). The bullae were larger in patients with tension pneumothorax than in those without (23.8 ± 16.2 mm vs 16.1 ± 19.1 mm; P = 0.007). In addition, the incidence of tension pneumothorax increased with the lung bulla size. Fibrotic adhesion was more prevalent in the tension pneumothorax group than in that without (P = 0.000). The bullae were large in patients with fibrotic adhesion than in those without adhesion (35.0 ± 22.3 mm vs 10.4 ± 11.5 mm; P = 0.000). On multivariate analysis, the size of bullae (odds ratio (OR) = 1.03, P = 0.001) and fibrotic adhesion (OR = 10.76, P = 0.000) were risk factors of tension pneumothorax. Hospital mortality was 3.3% in the tension pneumothorax group and it was not significantly different from those patients without tension pneunothorax (P = 0.252). Conclusions Tension pneumothorax is not uncommon, but clinically fatal tension pneumothorax is extremely rare. The size of the lung bullae and fibrotic adhesion contributes to the development of tension pneumothorax. PMID:24128176

  17. Oropharyngeal Dysphagia Is Strongly Correlated With Apparent Life-Threatening Events.

    Science.gov (United States)

    Duncan, Daniel R; Amirault, Janine; Mitchell, Paul D; Larson, Kara; Rosen, Rachel L

    2017-08-01

    The aim of the present study was to investigate the prevalence of oropharyngeal dysfunction with resultant aspiration in patients admitted after apparent life-threatening events (ALTE) and to determine whether historical characteristics could predict this oropharyngeal dysphagia and aspiration risk. We retrospectively reviewed the records of all patients admitted to Boston Children's Hospital between 2012 and 2015 with a diagnosis of ALTE to determine the frequency of evaluation for oropharyngeal dysphagia using video fluoroscopic swallow studies (VFSS) and clinical feeding evaluations, to determine the prevalence of swallowing dysfunction in subjects admitted after ALTE and to compare presenting historical characteristics to swallow study results. A total of 188 children were admitted with a diagnosis of ALTE of which 29% (n = 55) had an assessment of swallowing by VFSS. Of those who had a VFSS, 73% (n = 40) had evidence of aspiration or penetration on VFSS. Of all of the diagnostic tests ordered on patients with ALTEs, the VFSS had the highest rate of abnormalities of any test ordered. None of the historical characteristics of ALTE predicted which patients were at risk for aspiration. In patients who had both clinical feeding evaluations and VFSS, observed clinical feedings incorrectly identified 26% of patients as having no oropharyngeal dysphagia when in fact aspiration was present on VFSS. Oropharyngeal dysphagia with aspiration is the most common diagnosis identified in infants presenting with ALTEs. The algorithm for ALTE should be revised to include an assessment of VFSS as clinical feeding evaluations are inadequate to assess for aspiration.

  18. The use of recombinant factor VIIa in a patient with Noonan syndrome and life-threatening bleeding.

    Science.gov (United States)

    Tofil, Nancy M; Winkler, Margaret K; Watts, Raymond G; Noonan, Jacqueline

    2005-05-01

    To present a case report of a patient with Noonan syndrome who developed life-threatening gastrointestinal bleeding shortly after cardiac surgery that was successfully treated with recombinant factor VIIa. Case report. Pediatric intensive care unit of a children's hospital. Ten-month-old with Noonan syndrome and massive gastrointestinal bleeding resulting in severe hypovolemic shock. Recombinant factor VIIa was used in this patient's severe bleeding associated with Noonan syndrome after no other supportive measures were successful. Recombinant Factor VIIa significantly decreased the patient's bleeding and allowed his hypovolemic shock to improve. Ultimately, the patient made a complete recovery. Noonan syndrome has a constellation of both cardiac and noncardiac malformations including an increased risk of bleeding, and recombinant factor VIIa is an important agent in the treatment of significant bleeding.

  19. Acquired hemophilia as the cause of life-threatening hemorrhage in a 94-year-old man: a case report

    Directory of Open Access Journals (Sweden)

    Blanchard Elizabeth

    2010-07-01

    Full Text Available Abstract Introduction Acquired factor VIII deficiency is a rare entity that can lead to severe and life-threatening bleeding. We describe a case of severe bleeding from the tongue secondary to acquired hemophilia and discuss treatment options, including aminocaproic acid and recombinant factor VIII, which have not been widely reported in the literature for the management of such patients. Case presentation A 94-year-old Caucasian man presented to our institution with diffuse bruising and extensive bleeding from the tongue secondary to mechanical trauma. He had no prior history of bleeding and his medical history was unremarkable except for dementia and hypertension. Coagulation studies revealed a prolonged activated partial thromboplastin time and a mixing study was consistent with the presence of an inhibitor. Quantitative assays revealed a reduced level of factor VIII activity (1% and the presence of a factor VIII inhibitor, measured at seven Bethesda units, in the serum. Oral prednisone therapy (60mg/day was given. He also received intravenous aminocaproic acid and human concentrate of factor VIII (Humate-P and topical anti-thrombolytic agents (100 units of topical thrombin cream. His hospital course was prolonged because of persistent bleeding and the development of profuse melena. He required eight units of packed red blood cells for transfusion. Hospitalization was also complicated by bradycardia of unclear etiology, which started after infusion of aminocaproic acid. His activated partial thromboplastin time gradually normalized. He was discharged to a rehabilitation facility three weeks later with improving symptoms, stable hematocrit and resolving bruises. Conclusions Clinicians should suspect a diagnosis of acquired hemophilia in older patients with unexplained persistent and profound bleeding from uncommon soft tissues, including the tongue. Use of factor VIII (Humate-P and aminocaproic acid can be useful in this coagulopathy but

  20. Threat Assessment of Potential Terrorist Attacks to the Transport Infrastructure

    Directory of Open Access Journals (Sweden)

    Gabriel Nowacki

    2014-06-01

    Full Text Available The paper presents threat assessment of potential terrorist attacks to the transport infrastructure. The range of transportation infrastructure has spread and includes railway, inland waterways, road, maritime, air, intermodal transport infrastructure and intelligent transport systems (ITS. ITS service is the provision of an ITS application through a well-defined organisational and operational framework with the aim of contributing to the user safety, efficiency, comfort and/or to facilitate or support transport and travel operations. Terrorism means acts of violence committed by groups that view themselves as victimized by some notable historical wrong. Although these groups have no formal connection with governments, they usually have the financial and moral backing of sympathetic governments. Typically, they stage unexpected attacks on civilian targets, including transport infrastructure, with the aim of sowing fear and confusion. Based on the analyses, transportation infrastructure is potentially threatened with terrorism attacks, especially road and rail infrastructure (about 23 %, and to a smaller degree the maritime and air transport infrastructure (about 2 %. There were 90,3% of incidents involve land transport (74,5% – vehicles, 9,5% – buses, 6,3% - rail covered the 41-year period 1967-2007 in the USA. Legal steps to fight terrorism have been taken on the international level, furthermore, some institutions have been established for this purpose.

  1. Bacteremia and Peritonitis in a Patient With Cirrhosis: A Life-Threatening Case From a Prick of a Cactus

    Directory of Open Access Journals (Sweden)

    Jodi-Anne Wallace MD

    2017-08-01

    Full Text Available A 58-year-old male with nonalcoholic steatohepatitis cirrhosis presents with right lower extremity cellulitis, abdominal tenderness, and severe sepsis after sustaining puncture injury from a cactus on a property with feral cats. Blood cultures and diagnostic paracentesis were consistent with spontaneous bacterial peritonitis due to Pasteurella multocida , a gram-negative coccobacillus found in the respiratory tract of domestic animals. The patient received timely antibiotic coverage with resolution of spontaneous bacterial peritonitis and sepsis after 14-day treatment. This case emphasizes the life-threatening nature of systemic Pasteurella multocida infection as well as an indirect way of acquiring a zoonotic infection in a patient with end-stage liver disease.

  2. Life-threatening emphysematous liver abscess associated with poorly controlled diabetes mellitus: a case report.

    Science.gov (United States)

    Takano, Yuichi; Hayashi, Masafumi; Niiya, Fumitaka; Nakanishi, Toru; Hanamura, Shotaro; Asonuma, Kunio; Yamamura, Eiichi; Gomi, Kuniyo; Kuroki, Yuichiro; Maruoka, Naotaka; Inoue, Kazuaki; Nagahama, Masatsugu

    2017-03-06

    Emphysematous liver abscesses are defined as liver abscesses accompanied by gas formation. The fatality rate is extremely high at 27%, necessitating prompt intensive care. The patient was a 69-year-old Japanese man with type 2 diabetes. He visited the emergency outpatient department for fever and general malaise that had been ongoing for 2 weeks. Abdominal computed tomography revealed an abscess 5 cm in diameter accompanied by gas formation in the right hepatic lobe. Markedly impaired glucose tolerance was observed with a blood sugar level of 571 mg/dL and a glycated hemoglobin level of 14.6%. The patient underwent emergency percutaneous abscess drainage, and intensive care was subsequently initiated. Klebsiella pneumoniae was detected in both the abscess cavity and blood cultures. The drain was removed 3 weeks later, and the patient was discharged. Emphysematous liver abscesses are often observed in patients with poorly controlled diabetes, and the fatality rate is extremely high. Fever and malaise occasionally mask life-threatening infections in diabetic patients, necessitating careful examination.

  3. An assessment of meaning in life-threatening illness: development of the Healing Experience in All Life Stressors (HEALS

    Directory of Open Access Journals (Sweden)

    Sloan DH

    2017-02-01

    Full Text Available Danetta Hendricks Sloan,1 Karlynn BrintzenhofeSzoc,2 Tiffany Kichline,1 Karen Baker,1 Jean-Paul Pinzon,1 Christina Tafe,1 Lingsheng Li,1 M Jennifer Cheng,1 Ann Berger1 1Pain and Palliative Care, National Institutes of Health, Clinical Center, Bethesda, MD, 2School of Social Work, College of Allied Health Sciences, University of Cincinnati, Cincinnati, OH, USA Context: Patients with life-threatening or chronic illness report an experience of increased positive psychological, social, and/or spiritual change during diagnosis and/or treatment of their illness, even in the face of unfavorable prognosis. This transformation begins through the ability to make their life meaningful by forming meaningful connections that emerge through self-introspection and relationships with a divine entity, nature, and other people. The Healing Experience in All Life Stressors (HEALS assessment provides a way to identify distress-causing changes that may interfere with the development of meaning and psycho–social–spiritual homeostasis.Objective: Preliminary examination of responses to items on the HEALS and examination of the factor structure.Method: The 48-item HEALS questionnaire was developed using a multistep process: literature review for concept development, item generation from qualitative data, and face and content validity by expert panel. In the current study, HEALS was completed by 100 patients diagnosed with life-limiting disease and seen by the palliative care team at a large research institution in the US. Exploratory factor analysis techniques were used to determine scale structure of the instrument.Results: Outcome testing of sample adequacy using Kaiser–Meyer–Olkin statistic was 0.75, which exceeds the recommended value of 0.60. The HEALS show very good internal consistency with a Cronbach’s a of 0.94. Overall results of the exploratory factor analysis established a four-factor questionnaire: 1 religion; 2 spirituality, demonstrated by a

  4. Interval forecasting of cyber-attacks on industrial control systems

    Science.gov (United States)

    Ivanyo, Y. M.; Krakovsky, Y. M.; Luzgin, A. N.

    2018-03-01

    At present, cyber-security issues of industrial control systems occupy one of the key niches in a state system of planning and management Functional disruption of these systems via cyber-attacks may lead to emergencies related to loss of life, environmental disasters, major financial and economic damage, or disrupted activities of cities and settlements. There is then an urgent need to develop protection methods against cyber-attacks. This paper studied the results of cyber-attack interval forecasting with a pre-set intensity level of cyber-attacks. Interval forecasting is the forecasting of one interval from two predetermined ones in which a future value of the indicator will be obtained. For this, probability estimates of these events were used. For interval forecasting, a probabilistic neural network with a dynamic updating value of the smoothing parameter was used. A dividing bound of these intervals was determined by a calculation method based on statistical characteristics of the indicator. The number of cyber-attacks per hour that were received through a honeypot from March to September 2013 for the group ‘zeppo-norcal’ was selected as the indicator.

  5. Psychiatric symptoms and disorders among Yazidi children and adolescents immediately after forced migration following ISIS attacks.

    Science.gov (United States)

    Ceri, Veysi; Özlü-Erkilic, Zeliha; Özer, Ürün; Yalcin, Murat; Popow, Christian; Akkaya-Kalayci, Türkan

    2016-09-01

    The aim of the present study was to evaluate psychiatric problems and disorders among Yazidi Kurd refugee children and adolescents, who were assessed immediately after their forced migration following life-threatening attacks by ISIS terrorists. We retrospectively analyzed the psychiatric assessments of 38 Yazidi children and adolescents (age 2-18, mean 12 years, m:f = 16:22), which were performed upon their arrival at the refugee camp. All children and adolescents exhibited psychiatric problems and disorders, 50 % had one, and 50 % had more than one. The most relevant problems were disturbed sleeping (71 % of children), followed by depression (36.8 %), conversion disorders (28.9 %), adjustment (21.8 %), acute (18.4 %) and posttraumatic stress (PTSD, 10.5 %) disorders, and non-organic enuresis (18.4 %). Our study confirms the results of previous studies, asserting that refugee children and adolescents do not just suffer from PTSD but from various other problems that are already present in the first days of resettlement. Children and adolescents living in refugee camps urgently need psychosocial support.

  6. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  7. Pulmonary hemorrhage complicating radiofrequency ablation, from mild hemoptysis to life-threatening pattern

    Energy Technology Data Exchange (ETDEWEB)

    Nour-Eldin, Nour-Eldin A.; Naguib, Nagy N.N.; Mack, Martin; Abskharon, John E.; Vogl, Thomas J. [Johann Wolfgang Goethe-University Hospital, Institute for Diagnostic and Interventional Radiology, Frankfurt am Main (Germany)

    2011-01-15

    To assess risk factors and the extent of pulmonary hemorrhage complicating radiofrequency ablation (RFA) of pulmonary neoplasms. This retrospective study involved 248 ablation sessions for lung tumors (20 primary lesions and 228 metastatic lesions) in 164 patients (mean age 59.7 years, SD: 10.2). Both unipolar and bipolar radiofrequency systems were used under CT fluoroscopic guidance. Extent and underlying factors associated with development of pulmonary hemorrhage were analyzed. Incidence of intra-parenchymal pulmonary hemorrhage, pleural effusion, and hemoptysis were 17.7% (44/248 sessions), 4% (8/248 sessions), and 16.1% (40/248 sessions), respectively. Death because of massive bleeding occurred in one session (0.4%). Significant risk factors associated with intra-parenchymal hemorrhage included: lesions of <1.5 cm diameter (P = 0.007); basal and middle lung zone lesions (P = 0.026); increased needle track distance traversing the lung parenchyma >2.5 cm (P = 0.0017); traversing pulmonary vessels in the track of ablation (P < 0.001); and the use of multi-tined electrodes (P = 0.004). Concomitant incidence of pulmonary hemorrhage and pneumothorax was 29.2% (14/48 sessions). While typically safe, RFA of pulmonary neoplasms can result in pulmonary hemorrhage ranging from mild to life-threatening. Management of this complication is mainly preventive through adequate patient selection for ablation therapy and exclusion of technically avoidable risk factors. (orig.)

  8. Life-threatening infectious diseases of childhood: single-gene inborn errors of immunity?

    Science.gov (United States)

    Alcaïs, Alexandre; Quintana-Murci, Lluis; Thaler, David S; Schurr, Erwin; Abel, Laurent; Casanova, Jean-Laurent

    2010-12-01

    The hypothesis that inborn errors of immunity underlie infectious diseases is gaining experimental support. However, the apparent modes of inheritance of predisposition or resistance differ considerably among diseases and among studies. A coherent genetic architecture of infectious diseases is lacking. We suggest here that life-threatening infectious diseases in childhood, occurring in the course of primary infection, result mostly from individually rare but collectively diverse single-gene variations of variable clinical penetrance, whereas the genetic component of predisposition to secondary or reactivation infections in adults is more complex. This model is consistent with (i) the high incidence of most infectious diseases in early childhood, followed by a steady decline; (ii) theoretical modeling of the impact of monogenic or polygenic predisposition on the incidence distribution of infectious diseases before reproductive age; (iii) available molecular evidence from both monogenic and complex genetics of infectious diseases in children and adults; (iv) current knowledge of immunity to primary and secondary or latent infections; (v) the state of the art in the clinical genetics of noninfectious pediatric and adult diseases; and (vi) evolutionary data for the genes underlying single-gene and complex disease risk. With the recent advent of new-generation deep resequencing, this model of single-gene variations underlying severe pediatric infectious diseases is experimentally testable. © 2010 New York Academy of Sciences.

  9. Bandit strategies evaluated in the context of clinical trials in rare life-threatening diseases.

    Science.gov (United States)

    Villar, Sofía S

    2018-04-01

    In a rare life-threatening disease setting the number of patients in the trial is a high proportion of all patients with the condition (if not all of them). Further, this number is usually not enough to guarantee the required statistical power to detect a treatment effect of a meaningful size. In such a context, the idea of prioritizing patient benefit over hypothesis testing as the goal of the trial can lead to a trial design that produces useful information to guide treatment, even if it does not do so with the standard levels of statistical confidence. The idealised model to consider such an optimal design of a clinical trial is known as a classic multi-armed bandit problem with a finite patient horizon and a patient benefit objective function. Such a design maximises patient benefit by balancing the learning and earning goals as data accumulates and given the patient horizon. On the other hand, optimally solving such a model has a very high computational cost (many times prohibitive) and more importantly, a cumbersome implementation, even for populations as small as a hundred patients. Several computationally feasible heuristic rules to address this problem have been proposed over the last 40 years in the literature. In this article we study a novel heuristic approach to solve it based on the reformulation of the problem as a Restless bandit problem and the derivation of its corresponding Whittle index rule. Such rule was recently proposed in the context of a clinical trial in Villar et al (2015). We perform extensive computational studies to compare through both exact value calculations and simulated values the performance of this rule, other index rules and simpler heuristics previously proposed in the literature. Our results suggest that for the two and three-armed case and a patient horizon less or equal than a hundred patients, all index rules are a priori practically identical in terms of the expected proportion of success attained when all arms start

  10. Acute poisoning following ingestion of medicines: initial management. How to treat life-threatening complications and to evaluate the risk of delayed effects and psychological distress.

    Science.gov (United States)

    2010-12-01

    Acute poisoning following ingestion of medications, both intentional and unintentional, is frequent and more or less severe. It is often unclear whether a toxic dose has been ingested. This review examines the initial management of patients with suspected acute poisoning, based on a review of the literature using the standard Prescrire methodology. We examined clinical practice guidelines, which are mostly based on observational, pharmacological and toxicological data, as well as empirical data. Few comparative trials are available. In life-threatening situations, the first priority is to call an emergency response mobile unit and to implement life-support techniques, i.e., resuscitation for cardiorespiratory arrest; respiratory support if necessary; and the left lateral head-down position and glucose injection if the patient is unconscious. Prompt, initial measures may also include: anticonvulsant injection for status epilepticus (diazepam, for example); a sedative for extreme agitation (diazepam or clorazepate if there is no risk of respiratory depression; otherwise haloperidol); atropine for severe bradycardia; elevating the legs for hypotension; and naloxone in case of respiratory depression due to opioids. Drug poisoning can be life-threatening.The extent of the risk should be assessed by questioning the patient and close contacts, examining the immediate environment, and carrying out a clinical examination to identify a major toxic condition. The severity of poisoning is assessed by gathering all information about the patient, the drug(s) ingested, the circumstances of ingestion, and any other substances ingested at the same time. A poison control centre may be called to assist with diagnosis, to predict the clinical consequences, and to guide patient management. Activated charcoal can reduce the gastrointestinal absorption of some drugs. It should be given as soon as possible, preferably within 2 hours after ingestion of a drug known to be adsorbed by

  11. Citation classics in suicide and life threatening behavior: a research note.

    Science.gov (United States)

    Stack, Steven

    2012-12-01

    The number of citations a scholarly work receives is a common measure of its impact on the scientific literature; "citation classics" are the most highly cited works. The content of Suicide and Life-Threatening Behavior (SLTB) citation classics is described here. The impact of SLTB citation classics is compared to their counterparts in journals having published the most suicide papers. All data are from the ISI electronic venue on the Web of Science and refer to the number of citations the top 1% of works received in each of ten journals from 1975 through August 10, 2011. Among all ten journals, SLTB ranked first in the number of works on suicide. The principle theme of half of SLTB suicide classics was literature review. The median number of citations for SLTB citation classics (top 1%) was 121.5, with a range between 96 and 279 citations, but classics from generalized psychiatric journals received more citations as anticipated. Journal impact factors explained 73% of the variance in classic's citation counts across journals. On average, suicide classics received 30% more citations than all classics. Among a second group of five specialized suicide journals, however, SLTB ranked first in average 5-year impact. Although SLTB produced the highest number of suicide articles of any journal, SLTB's citation classics received fewer citations than suicide classics in high-impact/prestige, general journals. Future work is needed to assess what predicts which SLTB articles ultimately become citation classics. © 2012 The American Association of Suicidology.

  12. Endogenous Nocardial Endophthalmitis in an Immunosuppressed Patient: A Serious Warning of an Underlying Life Threatening and Blinding Disorder.

    Science.gov (United States)

    Trehan, Hemant; Kaushik, Jaya; Jain, Vaibhav Kumar; Parihar, Jitendra Kumar Singh; Avasthi, Abhijit

    2017-01-01

    To report a case of bilateral endogenous nocardial endophthalmitis with central nervous system involvement in an immunocompromised individual with an extremely poor outcome. A 35-year-old man with a history of long-term, prescribed oral steroid use for membranoproliferative glomerulonephritis presented with profound bilateral vision loss. Patient's diagnosis of bilateral endogenous nocardial endophthalmitis was delayed. Nocardia was finally isolated from a brain biopsy after a repeat magnetic resonance imaging revealed a brain abscess. With anti-nocardia therapy, patient improved systemically, but the visual outcome was poor, with no light perception in both eyes. Ocular nocardiosis is a serious vision and life threatening disorder, particularly in patients on immunosuppressive therapy. A high index of suspicion is required for successful treatment.

  13. Self-reported recognition of undiagnosed life threatening conditions in chiropractic practice: a random survey

    Directory of Open Access Journals (Sweden)

    Daniel Dwain M

    2012-07-01

    Full Text Available Abstract Background The purpose of this study was to identify the type and frequency of previously undiagnosed life threatening conditions (LTC, based on self-reports of chiropractic physicians, which were first recognized by the chiropractic physician. Additionally this information may have a preliminary role in determining whether chiropractic education provides the knowledge necessary to recognize these events. Methods The study design was a postal, cross-sectional, epidemiological self-administered survey. Two thousand Doctors of Chiropractic in the US were randomly selected from a list of 57878. The survey asked respondents to state the number of cases from the list where they were the first physician to recognize the condition over the course of their practice careers. Space was provided for unlisted conditions. Results The response rate was 29.9%. Respondents represented 11442 years in practice and included 3861 patients with a reported undiagnosed LTC. The most commonly presenting conditions were in rank order: carcinoma, abdominal aneurysm, deep vein thrombosis, stroke, myocardial infarction, subdural hematoma and a large group of other diagnoses. The occurrence of a previously undiagnosed LTC can be expected to present to the chiropractic physician every 2.5 years based on the responding doctors reports. Conclusion Based on this survey chiropractic physicians report encountering undiagnosed LTC’s in the normal course of practice. The findings of this study are of importance to the chiropractic profession and chiropractic education. Increased awareness and emphasis on recognition of LTC is a critical part of the education process and practice life.

  14. Broncho-esophageal fistula leading to lung abscess: A life-threatening emergency detected on FDG PET/CT in a case of carcinoma of middle third esophagus.

    Science.gov (United States)

    Puranik, Ameya D; Purandare, Nilendu C; Agrawal, Archi; Shah, Sneha; Rangarajan, Venkatesh

    2013-07-01

    Sinister undesirable pathologies often accompany malignancies. Though the entire emphasis is on cancer management, these benign conditions are more life-threatening than the primary malignancy itself. We report an interesting imaging finding of broncho-esophageal fistula leading to lung abscess on (18)F- fluoro-deoxy-glucose positron emission tomography/computed tomography (FDG PET/CT) in large middle esophageal cancer, which due to early detection, was promptly managed.

  15. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  16. Life-Threatening Hypercalcemia During Prodrome of Pneumocystis jiroveci Pneumonia in an Immunocompetent Infant

    Directory of Open Access Journals (Sweden)

    Judith Sebestyen VanSickle MD

    2017-04-01

    Full Text Available Severe hypercalcemia in infants is usually attributed to genetic etiologies and less commonly to acquired ones. An 8-week-old girl presented with failure to thrive, mild respiratory distress, and life-threatening hypercalcemia (23.5 mg/dL. Serum 1,25(OH2-vitamin D (1,25(OH2-D level was elevated and parathyroid hormone undetectable. Evaluation for genetic mutations and malignant etiologies of hypercalcemia was negative. Treatment with intravenous hydration, loop diuretic, and calcitonin failed to correct the hypercalcemia, which was subsequently controlled with bisphosphonate therapy. Due to progressive respiratory deterioration, a bronchopulmonary lavage was done on day 17 of her hospitalization disclosing Pneumocystis jiroveci infection. The subsequent immunological investigation showed no abnormalities. She was treated with trimethoprim/sulfamethoxazole resulting in gradual clearing of her lungs and normalization of serum 1,25(OH2-D level. A year later, she remains healthy with normal biochemical parameters of mineral metabolism. We conclude that in a child with hypercalcemia with suppressed parathyroid hormone and elevated 1,25(OH2-D, once the genetic etiology for elevated 1,25(OH2-D and malignancy are ruled out, one should investigate closely for a chronic granulomatous disease. Among the latter Pneumocystis jiroveci pneumonia infection should be considered even in an immunocompetent child.

  17. Cisplatin chemotherapy (without erythropoietin) and risk of life-threatening thromboembolic events in carcinoma of the uterine cervix: the tip of the iceberg? A review of the literature

    International Nuclear Information System (INIS)

    Anders, Jon C; Grigsby, Perry W; Singh, Anurag K

    2006-01-01

    The risk of severe cardiovascular toxicity, specifically thromboembolic events (TE), in patients with cervical cancer receiving concurrent irradiation and cisplatin chemotherapy is reported to be less than 1% in several large prospective trials. However, the anecdotal risk appears to be far higher. A review of several prospective trials demonstrates no treatment related grade 4 cardiovascular toxicities and only two grade 5 toxicities in 1424 (0.1%) collective patients. A recent publication and our own unpublished experience finds 6 of 128 (4.7%) patients developed grade 4 to 5 cardiovascular (thrombosis/embolism) toxicity. The differenc in incidence of severe or life threatening cardiovascular toxicity of 0.1 versus 4.7% is highly statistically significant (p < 0.00001.) This dramatic difference in incidence of cardiovascular toxicity raises the possibility that cardiovascular toxicities were inadequately reported on the listed prospective trials. For those patients enrolled in prospective trials, we suggest that thromboses should be diligently documented and reported. Only after the true incidence of thromboses is established can we implement appropriate levels of early screening and intervention that may prevent life threatening complications

  18. Ceftriaxone-induced immune hemolytic anemia as a life-threatening complication of antibiotic treatment of 'chronic Lyme disease'.

    Science.gov (United States)

    De Wilde, Maarten; Speeckaert, Marijn; Callens, Rutger; Van Biesen, Wim

    2017-04-01

    'Chronic Lyme disease' is a controversial condition. As any hard evidence is lacking that unresolved systemic symptoms, following an appropriately diagnosed and treated Lyme disease, are related to a chronic infection with the tick-borne spirochaetes of the Borrelia genus, the term 'chronic Lyme disease' should be avoided and replaced by the term 'post-treatment Lyme disease syndrome.' The improper prescription of prolonged antibiotic treatments for these patients can have an impact on the community antimicrobial resistance and on the consumption of health care resources. Moreover, these treatments can be accompanied by severe complications. In this case report, we describe a life-threatening ceftriaxone-induced immune hemolytic anemia with an acute kidney injury (RIFLE-stadium F) due to a pigment-induced nephropathy in a 76-year-old woman, who was diagnosed with a so-called 'chronic Lyme disease.'

  19. Studies on sulfate attack: Mechanisms, test methods, and modeling

    Science.gov (United States)

    Santhanam, Manu

    concentration of the solution were seen to change the rate and mechanism of the attack in both sodium and magnesium sulfate solutions. The test results from these experiments were used to generate models for prediction of physical properties such as expansion and mass change, which could be used either for service life predictions, or for designing more reliable laboratory tests. Lastly, mechanisms for the attack by sodium and magnesium sulfate were proposed, based on the observations in the various studies. These mechanisms were able to simplify the understanding of the sulfate attack phenomenon.

  20. Sudden Onset of Life-Threatening Methaemoglobinaemia After Intake of Inappropriately Stored Vegetable (Collard Greens Meal in a 2.5-Year-Old Child

    Directory of Open Access Journals (Sweden)

    Ozlem Cakmak Yilmaz

    2015-06-01

    Full Text Available Acquired methaemoglobinaemia most commonly occurs due to intake of or contact to certain drugs, such as local anesthetics. However, intake of certain vegetables which are essential for a healthy diet may also cause methaemoglobinaemia due to their high nitrate or nitrite content, and prolonged and inappropriate storage after preparation of vegetable meals increases the risk. We present a 2.5-year-old girl with Down's syndrome who presented with central cyanosis due to severe methaemoglobinemiae with a methaemoglobin level of 62% after intake of collard greens (Brassica oleracea var. acephala soup. Although development of methaemoglobinaemia after food intake has been reported rarely before, recognition of this potentially life-threatening condition early in its course may be life-saving. [Cukurova Med J 2015; 40(2.000: 353-357

  1. A Case of Apparent Life-Threatening Event: Comorbid Gastric Volvulus Associated Gastroesophageal Reflux Disease and Epilepsy in a 4-Month-Old Boy

    Directory of Open Access Journals (Sweden)

    Yoshihiko Takano

    2016-01-01

    Full Text Available Most isolated episodes of apparent life-threatening events (ALTEs do not lead to the diagnosis of serious conditions, and their prognoses are generally benign. However, recurrent ALTEs are often associated with a risk of future serious adverse events and should be evaluated for appropriate management. Here we present ALTE case in which gastric volvulus associated gastroesophageal reflux disease was detected as an etiology initially, followed by the detection of epilepsy as another etiology. Clinicians should consider possibility of two or more etiologies in a single recurrent ALTE case.

  2. Broncho-esophageal fistula leading to lung abscess: a life-threatening emergency detected on FDG PET/CT in a case of carcinoma of middle third esophagus

    International Nuclear Information System (INIS)

    Puranik, Ameya D.; Purandare, Nilendu C.; Agrawal, Archi; Shah, Sneha; Rangarajan, Venkatesh

    2013-01-01

    Sinister undesirable pathologies often accompany malignancies. Though the entire emphasis is on cancer management, these benign conditions are more life-threatening than the primary malignancy itself. We report an interesting imaging finding of broncho-esophageal fistula leading to lung abscess on 18 F-fluoro-deoxy-glucose positron emission tomography/computed tomography (FDG PET/CT) in large middle esophageal cancer, which due to early detection, was promptly managed. (author)

  3. Obstructive Sleep Apnea

    Medline Plus

    Full Text Available ... find out more. Wisdom Teeth Management Wisdom Teeth Management An impacted ... a serious and even life-threatening condition. The risks of undiagnosed OSA include heart attack, stroke, irregular ...

  4. Parental explicit heuristics in decision-making for children with life-threatening illnesses.

    Science.gov (United States)

    Renjilian, Chris B; Womer, James W; Carroll, Karen W; Kang, Tammy I; Feudtner, Chris

    2013-02-01

    To identify and illustrate common explicit heuristics (decision-making aids or shortcuts expressed verbally as terse rules of thumb, aphorisms, maxims, or mantras and intended to convey a compelling truth or guiding principle) used by parents of children with life-threatening illnesses when confronting and making medical decisions. Prospective cross-sectional observational study of 69 parents of 46 children who participated in the Decision-making in Pediatric Palliative Care Study between 2006 and 2008 at the Children's Hospital of Philadelphia. Parents were guided individually through a semistructured in-depth interview about their experiences and thoughts regarding making medical decisions on behalf of their ill children, and the transcribed interviews were qualitatively analyzed. All parents in our study employed explicit heuristics in interviews about decision-making for their children, with the number of identified explicit heuristics used by an individual parent ranging from tens to hundreds. The heuristics served 5 general functions: (1) to depict or facilitate understanding of a complex situation; (2) to clarify, organize, and focus pertinent information and values; (3) to serve as a decision-making compass; (4) to communicate with others about a complex topic; and (5) to justify a choice. Explicit heuristics played an important role in decision-making and communication about decision-making in our population of parents. Recognizing explicit heuristics in parent interactions and understanding their content and functions can aid clinicians in their efforts to partner with parents in the decision-making process.

  5. Lifetime traumatic events, health-related quality of life, and satisfaction with life in older adults.

    Science.gov (United States)

    Lamoureux-Lamarche, Catherine; Vasiliadis, Helen-Maria

    2017-10-01

    The aims were to assess the association between lifetime traumatic events and post-traumatic stress syndrome (PTSS) and health-related quality of life (HRQOL) and satisfaction with life stratified by gender among a community-dwelling sample of older adults. Data used came from the ESA-Services study (2011-2013) and included a large convenience sample of 1811 older adults. Traumatic events were measured using a list of 14 events. PTSS was measured using the Impact of Event Scale-Revised. HRQOL and life satisfaction were measured with the EQ-5D-3L and the Satisfaction With Life Scale. Multivariate regression analyses were used to assess the association between traumatic events, PTSS, and quality of life. Respondents had a mean age of 73.90 years (SD: 6.13, range 65-97). Our results showed that exposure to violence (OR 4.88, CI 2.72-8.77), an accident (OR 2.33, CI 1.29-4.22), and sexual abuse (OR 2.26 CI 1.17-4.37) was associated with PTSS only in women. No traumatic event was associated only in men. The interaction between gender and exposure to violence and life-threatening disease of a close one was significant. Experiencing violence (β = -0.04, p life-threatening disease (β = -0.04, p life-threatening disease of a close one, sexual abuse, and other type of traumatic events. A life-threatening disease (β = -0.90, p life satisfaction only in men and the exposure of violence (β = -1.18, p life satisfaction in women. Our study could help healthcare professionals to identify and monitor traumatic events that are at higher risk to be associated with PTSS and a lower quality of life for older men and women.

  6. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  7. Conveying hope in consultations with patients with life-threatening diseases: the balance between supporting and challenging the patient.

    Science.gov (United States)

    Werner, Anne; Steihaug, Sissel

    2017-06-01

    There is limited knowledge about the communication of hope and denial in consultations with patients with life-threatening diseases on a practical level. In this study, we explored a real-life medical consultation between a doctor and a patient with incurable cancer, focusing on conveying hope. We found one consultation especially suited for illustrating how a physician can convey and reinforce hope without attaching it to curative treatment. The consultation was analysed using a method for discourse analysis, where we took as a point of departure that discourse means language in use. The doctor communicated in a recognising manner, expressing respect for the patient as a subject and an authority of his own experiences. The doctor and patient succeeded in creating a good working alliance characterised by warmth and trust. Within this context, there was room for the doctor to challenge the patient's views and communicate disagreement. The doctor succeeds in conveying and maintaining hope. Within a good working alliance with the patient the doctor can convey hope by balancing between supporting and challenging him. Exploring and grasping the patient's real concerns is essential for being able to relieve and comfort him and convey hope.

  8. Treating a patient with lower limb injury from shark attack – a case report

    Directory of Open Access Journals (Sweden)

    Uroš Ahčan

    2014-02-01

    Full Text Available Background: Every year a number of people are attacked by sharks worldwide; however, death as a consequence is quite unusual. In recent years, the number of reported shark attacks worldwide has been around 67 per year with fatalities averaging 5 persons annually. Shark attacks in the Adriatic Sea are very rare.Case report: In 2008, a great white shark attack happened in the Adriatic Sea, in which a man suffered a severe injury to his lower extremity and profuse bleeding that led to haemorrhagic shock.Conclusion: The expeditious intervention at the site of attack and the exemplary cooperation of medical teams in two centres in the neighbouring countries of Croatia and Slovenia has saved the life of the unusually injured patient and resulted in a satisfactory functional outcome.

  9. Shark attacks in Dakar and the Cap Vert Peninsula, Senegal: low incidence despite high occurrence of potentially dangerous species.

    Directory of Open Access Journals (Sweden)

    Sébastien Trape

    Full Text Available BACKGROUND: The International Shark Attack File mentions only four unprovoked shark attacks on the coast of West Africa during the period 1828-2004, an area where high concentrations of sharks and 17 species potentially dangerous to man have been observed. To investigate if the frequency of shark attacks could be really low and not just under-reported and whether there are potentially sharks that might attack in the area, a study was carried out in Dakar and the Cap Vert peninsula, Senegal. METHODOLOGY/PRINCIPAL FINDINGS: Personnel of health facilities, administrative services, traditional authorities and groups of fishermen from the region of Dakar were interviewed about the occurrence of shark attacks, and visual censuses were conducted along the coastline to investigate shark communities associated with the coasts of Dakar and the Cap Vert peninsula. Six attacks were documented for the period 1947-2005, including two fatal ones attributed to the tiger shark Galeocerdo cuvieri. All attacks concerned fishermen and only one occurred after 1970. Sharks were observed year round along the coastline in waters 3-15 m depth. Two species potentially dangerous for man, the nurse shark Ginglymostoma cirratum and the blacktip shark Carcharhinus limbatus, represented together 94% of 1,071 sharks enumerated during 1,459 hours of observations. Threatening behaviour from sharks was noted in 12 encounters (1.1%, including 8 encounters with C. limbatus, one with Galeocerdo cuvieri and 3 with unidentified sharks. CONCLUSIONS/SIGNIFICANCE: These findings suggest that the frequency of shark attacks on the coast of West Africa is underestimated. However, they also indicate that the risk is very low despite the abundance of sharks. In Dakar area, most encounters along the coastline with potentially dangerous species do not result in an attack. Compared to other causes of water related deaths, the incidence of shark attack appears negligible, at least one thousand

  10. Shark attacks in Dakar and the Cap Vert Peninsula, Senegal: low incidence despite high occurrence of potentially dangerous species.

    Science.gov (United States)

    Trape, Sébastien

    2008-01-30

    The International Shark Attack File mentions only four unprovoked shark attacks on the coast of West Africa during the period 1828-2004, an area where high concentrations of sharks and 17 species potentially dangerous to man have been observed. To investigate if the frequency of shark attacks could be really low and not just under-reported and whether there are potentially sharks that might attack in the area, a study was carried out in Dakar and the Cap Vert peninsula, Senegal. Personnel of health facilities, administrative services, traditional authorities and groups of fishermen from the region of Dakar were interviewed about the occurrence of shark attacks, and visual censuses were conducted along the coastline to investigate shark communities associated with the coasts of Dakar and the Cap Vert peninsula. Six attacks were documented for the period 1947-2005, including two fatal ones attributed to the tiger shark Galeocerdo cuvieri. All attacks concerned fishermen and only one occurred after 1970. Sharks were observed year round along the coastline in waters 3-15 m depth. Two species potentially dangerous for man, the nurse shark Ginglymostoma cirratum and the blacktip shark Carcharhinus limbatus, represented together 94% of 1,071 sharks enumerated during 1,459 hours of observations. Threatening behaviour from sharks was noted in 12 encounters (1.1%), including 8 encounters with C. limbatus, one with Galeocerdo cuvieri and 3 with unidentified sharks. These findings suggest that the frequency of shark attacks on the coast of West Africa is underestimated. However, they also indicate that the risk is very low despite the abundance of sharks. In Dakar area, most encounters along the coastline with potentially dangerous species do not result in an attack. Compared to other causes of water related deaths, the incidence of shark attack appears negligible, at least one thousand fold lower.

  11. Minimal invasive treatment of life-threatening bleeding caused by cardiopulmonary resuscitation-associated liver injury: a case report.

    Science.gov (United States)

    Næss, Pål Aksel; Engeseth, Kristian; Grøtta, Ole; Andersen, Geir Øystein; Gaarder, Christine

    2016-05-29

    Life-threatening bleeding caused by liver injury due to chest compressions is a rare complication in otherwise successful cardiopulmonary resuscitation. Surgical intervention has been suggested to achieve bleeding control; however, reported mortality is high. In this report, we present a brief literature review and a case report in which use of a less invasive strategy was followed by an uneventful recovery. A 37-year-old white woman was admitted after out-of-hospital cardiac arrest. Bystander cardiopulmonary resuscitation was immediately performed, followed by advanced cardiopulmonary resuscitation that included tracheal intubation, mechanical chest compressions, and external defibrillation with return of spontaneous circulation. Upon hospital admission, the patient's blood pressure was 94/45 mmHg and her heart rate was 110 beats per minute. Her electrocardiogram showed no signs of ST-segment elevations or Q-wave development. Coronary angiography revealed a proximal thrombotic occlusion of the left anterior descending coronary artery. Successful recanalization, after thrombus aspiration and balloon dilation followed by stent implant, was verified with normalized anterograde flow. Immediately after the patient's arrival in the intensive cardiac care unit, a drop in her blood pressure to 60/30 mmHg and a hemoglobin concentration of 4.5 g/dl were noticed. Transfusion was started, and bedside abdominal ultrasound examination revealed free intraperitoneal fluid. Computed tomography of the abdomen revealed liver injury with active extravasation from the cranial surface of the right lobe and a massive hemoperitoneum. The patient was coagulopathic and acidotic with a body temperature of 33.5 °C. A minimally invasive treatment strategy, including angiography and selective trans-catheter arterial embolization, were performed in combination with percutaneous evacuation of 4.5 L of intraperitoneal blood. After completion of these procedures, the patient was

  12. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  13. Cloud-Based DDoS HTTP Attack Detection Using Covariance Matrix Approach

    Directory of Open Access Journals (Sweden)

    Abdulaziz Aborujilah

    2017-01-01

    Full Text Available In this era of technology, cloud computing technology has become essential part of the IT services used the daily life. In this regard, website hosting services are gradually moving to the cloud. This adds new valued feature to the cloud-based websites and at the same time introduces new threats for such services. DDoS attack is one such serious threat. Covariance matrix approach is used in this article to detect such attacks. The results were encouraging, according to confusion matrix and ROC descriptors.

  14. Crony Attack: Strategic Attack’s Silver Bullet

    Science.gov (United States)

    2006-11-01

    physical assets or financial assets. The form of crony attack that most closely resembles classic strategic attack is to deny, degrade, or destroy a money...February 1951. Reprinted in Airpower Studies Coursebook , Air Command and Staff College, Maxwell AFB, AL, 2002, 152–58. Hirsch, Michael. “NATO’s Game of

  15. Signature movements lead to efficient search for threatening actions.

    Directory of Open Access Journals (Sweden)

    Jeroen J A van Boxtel

    Full Text Available The ability to find and evade fighting persons in a crowd is potentially life-saving. To investigate how the visual system processes threatening actions, we employed a visual search paradigm with threatening boxer targets among emotionally-neutral walker distractors, and vice versa. We found that a boxer popped out for both intact and scrambled actions, whereas walkers did not. A reverse correlation analysis revealed that observers' responses clustered around the time of the "punch", a signature movement of boxing actions, but not around specific movements of the walker. These findings support the existence of a detector for signature movements in action perception. This detector helps in rapidly detecting aggressive behavior in a crowd, potentially through an expedited (subcortical threat-detection mechanism.

  16. Life-threatening bleeding from a vertebral artery pseudoaneurysm after anterior cervical spine approach: endovascular repair by a triple stent-in-stent method. Case report

    Energy Technology Data Exchange (ETDEWEB)

    Alzamora, M.G.; Klisch, J. [Section of Neuroradiology, Neurocenter, University of Freiburg (Germany); Rosahl, S.K.; Lehmberg, J. [Department of Neurosurgery, Neurocenter, University of Freiburg (Germany)

    2005-04-01

    The incidence of injury to the cervical vertebral artery during surgery for stenosis of the cervical neuroforamina is very low. We present a case in which bleeding during microforaminotomy at the level C6/7 occurred. The bleeding could be controlled intraoperatively. Two days later, a life-threatening cervical hematoma required urgent bedside evacuation. A false aneurysm of the left cervical vertebral artery was successfully occluded by a modified triple stent-in-stent technique, maintaining the flow in the vessel.

  17. Life-threatening bleeding from a vertebral artery pseudoaneurysm after anterior cervical spine approach: endovascular repair by a triple stent-in-stent method. Case report

    International Nuclear Information System (INIS)

    Alzamora, M.G.; Klisch, J.; Rosahl, S.K.; Lehmberg, J.

    2005-01-01

    The incidence of injury to the cervical vertebral artery during surgery for stenosis of the cervical neuroforamina is very low. We present a case in which bleeding during microforaminotomy at the level C6/7 occurred. The bleeding could be controlled intraoperatively. Two days later, a life-threatening cervical hematoma required urgent bedside evacuation. A false aneurysm of the left cervical vertebral artery was successfully occluded by a modified triple stent-in-stent technique, maintaining the flow in the vessel

  18. Treating Asthma in Children under 5

    Science.gov (United States)

    ... laughing Gastrointestinal reflux Changes or extremes in weather Asthma emergencies Severe asthma attacks can be life-threatening ... Changes in activity levels or sleep patterns Control asthma triggers Depending on the triggers for your child's ...

  19. Treating Asthma in Children Ages 5 to 11

    Science.gov (United States)

    ... triggers such as cigarette smoke or seasonal allergies. Asthma emergencies Severe asthma attacks can be life-threatening ... devices. Immunotherapy or injectable medication for allergy-induced asthma Allergy-desensitization shots (immunotherapy) may help if your ...

  20. CDC: Tips from Former Smokers – Jessica PSA (:30)

    Centers for Disease Control (CDC) Podcasts

    2012-04-04

    Exposure to secondhand smoke can trigger a life-threatening asthma attack. This 30 second PSA features Jessica, a mother with a young son who suffers from asthma attacks triggered by secondhand smoke exposure.  Created: 4/4/2012 by Office on Smoking and Health, National Center for Chronic Disease Prevention and Health Promotion.   Date Released: 4/4/2012.

  1. Reactions to threatening health messages.

    Science.gov (United States)

    Ten Hoor, Gill A; Peters, Gjalt-Jorn Y; Kalagi, Janice; de Groot, Lianne; Grootjans, Karlijne; Huschens, Alexander; Köhninger, Constanze; Kölgen, Lizan; Pelssers, Isabelle; Schütt, Toby; Thomas, Sophia; Ruiter, Robert A C; Kok, Gerjo

    2012-11-21

    Threatening health messages that focus on severity are popular, but frequently have no effect or even a counterproductive effect on behavior change. This paradox (i.e. wide application despite low effectiveness) may be partly explained by the intuitive appeal of threatening communication: it may be hard to predict the defensive reactions occurring in response to fear appeals. We examine this hypothesis by using two studies by Brown and colleagues, which provide evidence that threatening health messages in the form of distressing imagery in anti-smoking and anti-alcohol campaigns cause defensive reactions. We simulated both Brown et al. experiments, asking participants to estimate the reactions of the original study subjects to the threatening health information (n = 93). Afterwards, we presented the actual original study outcomes. One week later, we assessed whether this knowledge of the actual study outcomes helped participants to more successfully estimate the effectiveness of the threatening health information (n = 72). Results showed that participants were initially convinced of the effectiveness of threatening health messages and were unable to anticipate the defensive reactions that in fact occurred. Furthermore, these estimates did not improve after participants had been explained the dynamics of threatening communication as well as what the effects of the threatening communication had been in reality. These findings are consistent with the hypothesis that the effectiveness of threatening health messages is intuitively appealing. What is more, providing empirical evidence against the use of threatening health messages has very little effect on this intuitive appeal.

  2. Cyber Attacks and Terrorism: A Twenty-First Century Conundrum.

    Science.gov (United States)

    Albahar, Marwan

    2017-01-05

    In the recent years, an alarming rise in the incidence of cyber attacks has made cyber security a major concern for nations across the globe. Given the current volatile socio-political environment and the massive increase in the incidence of terrorism, it is imperative that government agencies rapidly realize the possibility of cyber space exploitation by terrorist organizations and state players to disrupt the normal way of life. The threat level of cyber terrorism has never been as high as it is today, and this has created a lot of insecurity and fear. This study has focused on different aspects of cyber attacks and explored the reasons behind their increasing popularity among the terrorist organizations and state players. This study proposes an empirical model that can be used to estimate the risk levels associated with different types of cyber attacks and thereby provide a road map to conceptualize and formulate highly effective counter measures and cyber security policies.

  3. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  4. Neonatal screening for life-threatening conditions persistent – pulmonary hypertension in newborns and critical congenital heart disease – by the method of pulse oximetry

    Directory of Open Access Journals (Sweden)

    D. I. Sadykova

    2017-01-01

    Full Text Available Research objective: to assess the diagnostic significance of the pulse oximetry performed by the newborn for the 3rd hour of life to identify critical conditions and to justify the expediency of further introduction of this technology in the work of obstetric institutions.Results. In 5 maternity hospitals of the Republic of Tatarstan, from April 2016 to February 2017, 8358 88.4% of newborns were pulsometrically screened. Positive results were obtained in 95 (1.14% patients. Because of screening, 13 newborns were diagnosed with congenital heart defects, not diagnosed in utero, in the first hours of life, five of them were critical. All newborns with critical congenital heart defects were successfully operated. Besides, 20 patients had persistent pulmonary hypertension, 30 had intrauterine pneumonia.Conclusions. The measurement of saturation at the 3rd hour of life of a newborn allows avoiding life-threatening complications in children with critical congenital heart defects and persistent pulmonary hypertension and in a stable state to transfer them to a further treatment stage.

  5. Impact, meaning and need for help and support: The experience of parents caring for children with disabilities, life-limiting/life-threatening illness or technology dependence.

    Science.gov (United States)

    Whiting, Mark

    2013-03-01

    Parenting a child with complex needs or disabilities is a challenging proposition. This study, which drew upon of the experiences of the parents of 34 children (in 33 families), set out to explore the themes of impact, need for help and support and meaning/sense-making as they were related by parents. Data were collected using semi-structured interviews, and an emerging theoretical framework was validated through the use of a series of mind-maps(®) which were presented to individual parents as the basis for a second round (verificational) interview. Parents were nominated into the study by health care professions who were asked to identify the subject children to one of three separate sub-groups: children with a disability; children with a life-limiting/life-threatening illness or children with a technology dependence. Comparisons were made between the three study sub-groups in order to identify areas of consistency and of inconsistency. A fourth study theme - 'battleground' emerged from entirely within the data set. Sense-making occupied a central position within the overall theoretical framework for the study and parental perception of 'battleground' presented as significant element of parental sense-making, particularly in the context of their relationships with professional staff. © The Author(s) 2012.

  6. Reactions to threatening health messages

    Directory of Open Access Journals (Sweden)

    ten Hoor Gill A

    2012-11-01

    Full Text Available Abstract Background Threatening health messages that focus on severity are popular, but frequently have no effect or even a counterproductive effect on behavior change. This paradox (i.e. wide application despite low effectiveness may be partly explained by the intuitive appeal of threatening communication: it may be hard to predict the defensive reactions occurring in response to fear appeals. We examine this hypothesis by using two studies by Brown and colleagues, which provide evidence that threatening health messages in the form of distressing imagery in anti-smoking and anti-alcohol campaigns cause defensive reactions. Methods We simulated both Brown et al. experiments, asking participants to estimate the reactions of the original study subjects to the threatening health information (n = 93. Afterwards, we presented the actual original study outcomes. One week later, we assessed whether this knowledge of the actual study outcomes helped participants to more successfully estimate the effectiveness of the threatening health information (n = 72. Results Results showed that participants were initially convinced of the effectiveness of threatening health messages and were unable to anticipate the defensive reactions that in fact occurred. Furthermore, these estimates did not improve after participants had been explained the dynamics of threatening communication as well as what the effects of the threatening communication had been in reality. Conclusions These findings are consistent with the hypothesis that the effectiveness of threatening health messages is intuitively appealing. What is more, providing empirical evidence against the use of threatening health messages has very little effect on this intuitive appeal.

  7. Supporting children when a parent has a life-threatening illness: the role of the community practitioner.

    Science.gov (United States)

    Fearnley, Rachel

    2012-12-01

    The last two decades have seen an academic and practice based shift in the acknowledgment that children require support following the death of a significant person. However, the needs of children who are living amidst parental life threatening illness are not, as yet, so clearly recognised or acknowledged. These children are often forgotten and their needs are frequently peripheral, if not absent, within the clinical setting. The current study adopted qualitative methodology to explore children's experiences when living with a parent who is dying. A total of 36 people were interviewed, including children, their parents and professionals. The findings highlighted the importance of age appropriate information sharing with the children and the significant role professionals have in facilitating conversations either directly or through supporting the parents to hold these 'difficult' discussions. This paper offers an overview of the vital role community practitioners have in supporting the children of patients. It argues that they often have a more in-depth knowledge of the family and its functioning and that consequently they can add a different dimension to the care provided.

  8. Validation of the "Quality of Life in Life-Threatening Illness--Family Carer Version" (QOLLTI-F) in German-speaking carers of advanced cancer patients.

    Science.gov (United States)

    Schur, Sophie; Ebert-Vogel, Alexandra; Amering, Michaela; Masel, Eva Katharina; Neubauer, Marie; Schrott, Andrea; Sibitz, Ingrid; Watzke, Herbert; Schrank, Beate

    2014-10-01

    Palliative care is a multidisciplinary approach that focuses on the improvement of quality of life (QOL) of patients as well as their families. QOL research in palliative care has so far primarily focused on patients, but interest in the QOL of their relatives is increasing. For instruments measuring QOL in relatives, data on psychometric properties are often limited, and so far, none has been available in German. This study translates and validates the "Quality of Life in Life-Threatening Illness-Family Carer Version" (QOLLTI-F) in German-speaking carers of advanced cancer patients. The QOLLTI-F was translated from English into German according to the World Health Organisation's recommendations and validated in informal caregivers of terminally ill cancer patients of three Viennese hospitals. Hope was measured to assess concurrent validity; traumatic stress, anxiety, depression and subjective burden were measured to assess discriminant validity. Internal consistency, test-retest reliability and discriminative power were established. The scale's factor structure was explored using a set of factor analyses. Of the 308 caregivers participating in the study, 42 completed the QOLLTI-F retest after a mean of 5 days. The internal consistency was α = 0.85 for the overall scale, Pearson correlation between test and retest lay at r = 0.92. As expected, a significant positive correlation was found with hope (r = 0.40) and significant negative correlations with traumatic stress (r = -0.41), depression (r = -0.51), anxiety (r = -0.52) and overall subjective burden (r = -0.55). The original seven-factor structure was not reproduced, but the scale showed a stable four-factor structure with factors capturing (1) feelings about carers' own life, (2) professional care, (3) interaction with the patient and others and (3) carers' outlook on life. This study provides a sound translation and validation of the first QOL assessment tool for caregivers of

  9. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  10. Psilocybin produces substantial and sustained decreases in depression and anxiety in patients with life-threatening cancer: A randomized double-blind trial.

    Science.gov (United States)

    Griffiths, Roland R; Johnson, Matthew W; Carducci, Michael A; Umbricht, Annie; Richards, William A; Richards, Brian D; Cosimano, Mary P; Klinedinst, Margaret A

    2016-12-01

    Cancer patients often develop chronic, clinically significant symptoms of depression and anxiety. Previous studies suggest that psilocybin may decrease depression and anxiety in cancer patients. The effects of psilocybin were studied in 51 cancer patients with life-threatening diagnoses and symptoms of depression and/or anxiety. This randomized, double-blind, cross-over trial investigated the effects of a very low (placebo-like) dose (1 or 3 mg/70 kg) vs. a high dose (22 or 30 mg/70 kg) of psilocybin administered in counterbalanced sequence with 5 weeks between sessions and a 6-month follow-up. Instructions to participants and staff minimized expectancy effects. Participants, staff, and community observers rated participant moods, attitudes, and behaviors throughout the study. High-dose psilocybin produced large decreases in clinician- and self-rated measures of depressed mood and anxiety, along with increases in quality of life, life meaning, and optimism, and decreases in death anxiety. At 6-month follow-up, these changes were sustained, with about 80% of participants continuing to show clinically significant decreases in depressed mood and anxiety. Participants attributed improvements in attitudes about life/self, mood, relationships, and spirituality to the high-dose experience, with >80% endorsing moderately or greater increased well-being/life satisfaction. Community observer ratings showed corresponding changes. Mystical-type psilocybin experience on session day mediated the effect of psilocybin dose on therapeutic outcomes. ClinicalTrials.gov identifier: NCT00465595. © The Author(s) 2016.

  11. 75 FR 2106 - Endangered and Threatened Species; Take of Anadromous Fish

    Science.gov (United States)

    2010-01-14

    ... and Threatened Species; Take of Anadromous Fish AGENCY: National Marine Fisheries Service (NMFS... NMFS regulations (50 CFR parts 222-226) governing listed fish and wildlife permits. Species Covered in... steelhead not to exceed 2 percent of the total number of fish captured for each life stage and species...

  12. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  13. Blocking of Brute Force Attack

    OpenAIRE

    M.Venkata Krishna Reddy

    2012-01-01

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it co...

  14. μShield : Configurable Code-Reuse Attacks Mitigation For Embedded Systems

    NARCIS (Netherlands)

    Abbasi, Ali; Wetzels, Jos; Bokslag, Wouter; Zambon, Emmanuele; Etalle, Sandro; Yan, Zheng; Molva, Refik; Mazurczyk, Wojciech; Kantola, Raimo

    2017-01-01

    Embedded devices are playing a major role in our way of life. Similar to other computer systems embedded devices are vulnerable to code-reuse attacks. Compromising these devices in a critical environment constitute a significant security and safety risk. In this paper, we present μShield, a memory

  15. Gender differences in the link between childhood socioeconomic conditions and heart attack risk in adulthood.

    Science.gov (United States)

    Hamil-Luker, Jenifer; O'Rand, Angela M

    2007-02-01

    A growing body of evidence shows that childhood socioeconomic status (SES) is predictive of disease risk in later life, with those from the most disadvantaged backgrounds more likely to experience poor adult-health outcomes. Most of these studies, however are based on middle-aged male populations and pay insufficient attention to the pathways between childhood risks and specific adult disorders. This article examines gender differences in the link between childhood SES and heart attack risk trajectories and the mechanisms by which early environments affect future disease risk. By using methods that model both latent and path-specific influences, we identify heterogeneity in early life conditions and human, social, and health capital in adulthood that contribute to diverse heart attack risk trajectories between and among men and women as they age into their 60s and 70s. We find that key risk factors for heart attack operate differently for men and women. For men, childhood SES does not differentiate those at low, increasing, and high risk for heart attack. In contrast, women who grew up without a father and/or under adverse economic conditions are the most likely to experience elevated risk for heart attack, even after we adjust for the unequal distribution of working and living conditions, social relationships, access to health care, and adult lifestyle behaviors that influence health outcomes.

  16. Solidarity under Attack

    DEFF Research Database (Denmark)

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  17. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  18. Shooting Alone: The Pre-Attack Experiences and Behaviors of U.S. Solo Mass Murderers.

    Science.gov (United States)

    Gill, Paul; Silver, James; Horgan, John; Corner, Emily

    2017-05-01

    This paper outlines the sociodemographic, developmental, antecedent attack, attack preparation, and commission properties of 115 mass murderers between 1990 and 2014. The results indicate that mass murderer attacks are usually the culmination of a complex mix of personal, political, and social drivers that crystalize at the same time to drive the individual down the path of violent action. We specifically focus upon areas related to prior criminal engagement, leakage, and attack location familiarity. Whether the violence comes to fruition is usually a combination of the availability and vulnerability of suitable targets that suit the heady mix of personal and political grievances and the individual's capability to engage in an attack from both a psychological and technical capability standpoint. Many individual cases share a mixture of unfortunate personal life circumstances coupled with an intensification of beliefs/grievances that later developed into the idea to engage in violence. © 2016 American Academy of Forensic Sciences.

  19. Novel Psychological Formulation and Treatment of "Tic Attacks" in Tourette Syndrome.

    Science.gov (United States)

    Robinson, Sally; Hedderly, Tammy

    2016-01-01

    One important, but underreported, phenomenon in Tourette syndrome (TS) is the occurrence of "tic attacks." These episodes have been described at conferences as sudden bouts of tics and/or functional tic-like movements, lasting from 15 min to several hours. They have also been described by patients in online TS communities. To date, there are no reports of tic attacks in the literature. The aim of this article is to stimulate discussion and inform clinical practices by describing the clinical presentation of 12 children (mean age 11 years and 3 months; SD = 2 years and 4 months) with TS and tic attacks, with a detailed case report for one case (13-year-old male). These children commonly present acutely to casualty departments and undergo unnecessary medical investigations. Interestingly, all children reported comorbid anxiety, with worries about the tics themselves and an increased internal focus of attention on tics once the attacks had started. In keeping with other children, the index case reported a strong internal focus of attention, with a relationship between physiological sensations/tic urges, worries about having tic attacks, and behavioral responses (e.g., body scanning, situational avoidance, and other responses). In our experience, the attacks reduce with psychological therapy, for example, the index case attended 13 sessions of therapy that included metacognitive and attention training techniques, as well as cognitive-behavioral strategies. Following treatment, an improvement was seen across a range of measures assessing tics, mood, anxiety, and quality of life. Thus, psychological techniques used to treat anxiety disorders are effective at supporting a reduction in tic attacks through modifying attention, worry processes, and negative beliefs. It is hypothesized that an attentional style of threat monitoring, difficulties tolerating internal sensory urges, cognitive misattributions, and maladaptive coping strategies contribute to the

  20. Wearable cardioverter defibrillator: A life vest till the life boat (ICD arrives

    Directory of Open Access Journals (Sweden)

    Johnson Francis

    2014-01-01

    Full Text Available It is well established that implantable cardioverter defibrillator (ICD is a life saving device ensuring protection against life threatening ventricular arrhythmias. But there are certain situations like a recent myocardial infarction where the standard guidelines do not recommend the implantation of an ICD while the patient can still be at a risk of demise due to a life threatening ventricular arrhythmia. There could also be a temporary indication for protection while explanting an infected ICD system. The wearable cardioverter defibrillator (WCD is a device which comes to the rescue in such situations. In this brief review, we discuss the historical aspects of the development of a WCD, technical aspects as well as the clinical trial data and real world scenario of its use.

  1. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  2. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  3. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks. In prac......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks....... In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  4. Life-threatening subdural hematoma after aortic valve replacement in a patient with Heyde syndrome: a case report.

    Science.gov (United States)

    Uchida, Tetsuro; Hamasaki, Azumi; Ohba, Eiichi; Yamashita, Atsushi; Hayashi, Jun; Sadahiro, Mitsuaki

    2017-08-08

    Heyde syndrome is known as a triad of calcific aortic stenosis, anemia due to gastrointestinal bleeding from angiodysplasia, and acquired type 2A von Willebrand disease. This acquired hemorrhagic disorder is characterized by the loss of the large von Willebrand factor multimers due to the shear stress across the diseased aortic valve. The most frequently observed type of bleeding in these patients is mucosal or skin bleeding, such as epistaxis, followed by gastrointestinal bleeding. On the other hand, intracranial hemorrhage complicating Heyde syndrome is extremely rare. A 77-year-old woman presented to our hospital with severe aortic stenosis and severe anemia due to gastrointestinal bleeding and was diagnosed with Heyde syndrome. Although aortic valve replacement was performed without recurrent gastrointestinal bleeding, postoperative life-threatening acute subdural hematoma occurred with a marked midline shift. Despite prompt surgical evacuation of the hematoma, she did not recover consciousness and she died 1 month after the operation. Postoperative subdural hematoma is rare, but it should be kept in mind as a devastating hemorrhagic complication, especially in patients with Heyde syndrome.

  5. Acid Gastroesophageal Reflux Disease and Apparent Life-Threatening Events: Simultaneous pH-metry and Cardiorespiratory Monitoring.

    Science.gov (United States)

    Macchini, Francesco; Morandi, Anna; Cognizzoli, Paola; Farris, Giorgio; Gentilino, Valerio; Zanini, Andrea; Leva, Ernesto

    2017-02-01

    To investigate the prevalence and the characteristics of gastroesophageal reflux disease (GERD) in infants with apparent life threatening events (ALTE). Infants with at least one episode of ALTE in absence of predisposing factors were included. All infants underwent a cardiorespiratory recording with simultaneous 24-hour pH-monitoring. Patients were divided into 3 groups according to the severity of GERD: A. Reflux Index (RI) 7%. Monthly evaluations were performed and the anti-reflux therapy was maintained till normalization of monitoring and clinic. 41 infants were enrolled. GERD was found in 80% of patients (moderate in 54%, severe in 27%). A normalization of the cardiorespiratory tracks was recorded on average after 1 month for group A, 7 months for the group B and 9.5 months for group C. A significant difference was registered between group A and both group B and C (P < 0.0001), as well as between the group B and C (P < 0.05). GERD influences significantly the time of normalization of the cardiorespiratory monitoring in infants with ALTE. GERD diagnosis and treatment are mandatory in these patients. Copyright © 2016. Published by Elsevier B.V.

  6. Diagnosis of Life-Threatening Alpha-Gal Food Allergy Appears to Be Patient Driven.

    Science.gov (United States)

    Flaherty, Mary Grace; Kaplan, Samantha Jan; Jerath, Maya R

    2017-10-01

    Patients exhibiting life-threatening symptoms associated with the alpha-gal food allergy (delayed urticaria or anaphylaxis due to mammalian meat) are frequently undiagnosed, causing unnecessary emergency department (ED) and health care visits, and extensive pain and suffering. This study aimed to determine the path to diagnosis experienced by alpha-gal patients. Semistructured interviews were conducted from March to June 2016 with a chronological systematic sample of approximately 10% of patients diagnosed with alpha-gal and treated by the University of North Carolina Allergy and Immunology Clinic (n = 28). Main outcome measures included average length of time between first symptoms' appearance and diagnosis, number and type of health care encounters en route to diagnosis, and typical symptom severity. Six interviewees (21%) were diagnosed within a year of experiencing symptoms, of the remaining 22, mean time to diagnosis was 7.1 years. In over 100 medical encounters (including 28 ED visits and 2 urgent care) the correct diagnosis or effective diagnosing referral occurred less than 10% of the time. Seventy-one percent (20/28) described their first symptoms as severe. More patients found the allergist specializing in this condition on their own (n = 12; 43%) than those who were formally diagnosed or received referrals (n = 10; 36%) through the health care system. The medical community is challenged to stay abreast of emerging and newly uncovered illnesses through traditional medical literature communication channels. Presently, patients more often discover a diagnosis of alpha-gal allergy by using information resources on their own than by presenting to the ED with anaphylaxis.

  7. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  8. Distributed denial of service (DDoS) attack in cloud- assisted wireless body area networks: a systematic literature review.

    Science.gov (United States)

    Latif, Rabia; Abbas, Haider; Assar, Saïd

    2014-11-01

    Wireless Body Area Networks (WBANs) have emerged as a promising technology that has shown enormous potential in improving the quality of healthcare, and has thus found a broad range of medical applications from ubiquitous health monitoring to emergency medical response systems. The huge amount of highly sensitive data collected and generated by WBAN nodes requires an ascendable and secure storage and processing infrastructure. Given the limited resources of WBAN nodes for storage and processing, the integration of WBANs and cloud computing may provide a powerful solution. However, despite the benefits of cloud-assisted WBAN, several security issues and challenges remain. Among these, data availability is the most nagging security issue. The most serious threat to data availability is a distributed denial of service (DDoS) attack that directly affects the all-time availability of a patient's data. The existing solutions for standalone WBANs and sensor networks are not applicable in the cloud. The purpose of this review paper is to identify the most threatening types of DDoS attacks affecting the availability of a cloud-assisted WBAN and review the state-of-the-art detection mechanisms for the identified DDoS attacks.

  9. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  10. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  11. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  12. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  13. Heart attack - discharge

    Science.gov (United States)

    ... and lifestyle Cholesterol - drug treatment Controlling your high blood pressure Deep vein thrombosis - discharge Dietary fats explained Fast food tips Heart attack - discharge Heart attack - what to ask your doctor Heart bypass ... pacemaker - discharge High blood pressure - what to ask your doctor How to read ...

  14. Enhancing pediatric safety: assessing and improving resident competency in life-threatening events with a computer-based interactive resuscitation tool

    International Nuclear Information System (INIS)

    Lerner, Catherine; Gaca, Ana M.; Frush, Donald P.; Ancarana, Anjanette; Hohenhaus, Sue; Seelinger, Terry A.; Frush, Karen

    2009-01-01

    Though rare, allergic reactions occur as a result of administration of low osmolality nonionic iodinated contrast material to pediatric patients. Currently available resuscitation aids are inadequate in guiding radiologists' initial management of such reactions. To compare radiology resident competency with and without a computer-based interactive resuscitation tool in the management of life-threatening events in pediatric patients. The study was approved by the IRB. Radiology residents (n=19; 14 male, 5 female; 19 certified in basic life support/advanced cardiac life support; 1 certified in pediatric advanced life support) were videotaped during two simulated 5-min anaphylaxis scenarios involving 18-month-old and 8-year-old mannequins (order randomized). No advance warning was given. In half of the scenarios, a computer-based interactive resuscitation tool with a response-driven decision tree was available to residents (order randomized). Competency measures included: calling a code, administering oxygen and epinephrine, and correctly dosing epinephrine. Residents performed significantly more essential interventions with the computer-based resuscitation tool than without (72/76 vs. 49/76, P<0.001). Significantly more residents appropriately dosed epinephrine with the tool than without (17/19 vs. 1/19; P<0.001). More residents called a code with the tool than without (17/19 vs. 14/19; P = 0.08). A learning effect was present: average times to call a code, request oxygen, and administer epinephrine were shorter in the second scenario (129 vs. 93 s, P=0.24; 52 vs. 30 s, P<0.001; 152 vs. 82 s, P=0.025, respectively). All the trainees found the resuscitation tool helpful and potentially useful in a true pediatric emergency. A computer-based interactive resuscitation tool significantly improved resident performance in managing pediatric emergencies in the radiology department. (orig.)

  15. Relevance of terrorism for Italian students not directly exposed to it: The affective impact of the 2015 Paris and the 2016 Brussels attacks.

    Science.gov (United States)

    Raccanello, Daniela; Burro, Roberto; Brondino, Margherita; Pasini, Margherita

    2018-04-01

    Notwithstanding the dramatically increasing frequency of acts of terrorism in Europe and the extent of their media coverage, there is lack of knowledge on people's affective reactions and associated emotion regulation strategies. We explored the affective impact on two cohorts of Italian students (n = 193) possibly exposed vicariously through the mass media to the 2015 Paris or the 2016 Brussels terrorist attacks, respectively. We accessed data from three online questionnaires: one on emotion regulation administered before each attack; one on daily affect administered just before and after each attack; and one on causes of weekly affect and life satisfaction administered at the end of the week in which each attack occurred. The attacks were perceived as relevant for influencing negative affect for 22% of the students. For them, suppression-less frequently used than reappraisal-was associated with an improvement of affect after each attack but negatively related to life satisfaction concerning the week in which the attacks occurred. Our data showed that the recent terrorist attacks occurring in Europe had an affective impact on people at some distance who were vicariously exposed and point to the protective role of emotion regulation as a key resource for individuals' well-being. Copyright © 2017 John Wiley & Sons, Ltd.

  16. A rare life-threatening disease: unilateral kidney compressed by huge chronic spontaneous retroperitoneal hemorrhage

    Directory of Open Access Journals (Sweden)

    Lu HY

    2018-03-01

    Full Text Available Hao-Yuan Lu,1,* Wei Wei,2,* Qi-Wei Chen,1,* Qing-Gui Meng,1 Gao-Hua Hu,1 Xian-Lin Yi,1,3 Xian-Zhong Bai1 1Department of Urology, Tumor Hospital of Guangxi Medical University and Guangxi Cancer Research Institute, Nanning 530021, China; 2Department of Radiology, Tumor Hospital of Guangxi Medical University and Guangxi Cancer Research Institute, Nanning 530021,China; 3Hubei Engineering Laboratory for Synthetic Microbiology, Wuhan Institute of Biotechnology, Wuhan 430075, China *These authors contributed equally to this work Objectives: To study an uncommon life-threatening disease, spontaneous retroperitoneal and perirenal hemorrhage. Case descriptions: A 69-year-old male presented with pain in the left waist and back of 1 month duration. The renal abscess was suspected by magnetic resonance imaging before operation. The perirenal hematoma was cleaned by operation. In another case, the patient had a functional solitary left kidney compressed by a huge retroperitoneal mass and uropenia appeared. Results: The first patient died of adult respiratory distress syndrome after surgery. The second patient died of cardiac insufficiency and pulmonary embolism on the second day after evacuation of retroperitoneal hematoma. Conclusion: Conservative surgery, such as selective arterial embolization, is a reasonable approach in patients with chronic spontaneous retroperitoneal and perirenal space hemorrhage and with poor general condition. We strongly recommend drainage or interventional therapy, but not a major surgery, in patients with poor condition. Keywords: kidney, spontaneous, retroperitoneal, hemorrhage, surgery

  17. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  18. Personality factors and posttraumatic stress: associations in civilians one year after air attacks.

    Science.gov (United States)

    Lecic-Tosevski, Dusica; Gavrilovic, Jelena; Knezevic, Goran; Priebe, Stefan

    2003-12-01

    There is an ongoing debate on which risk factors for developing posttraumatic stress symptoms are more important--personality traits reflecting vulnerability, previous stressful experiences or characteristics of the traumatic event. In this study, posttraumatic stress symptoms and their relationship with personality traits, previous stressful experiences and exposure to stressful events during air attacks in Yugoslavia were investigated. The Millon Clinical Multiaxial Inventory (MCMI; Millon, 1983), Impact of Events Scale (IES; Horowitz, Wilner, & Alvarez, 1979), Life Stressor Checklist Revised (LSCL-R; Wolfe & Kimerling, 1997), and List of Stressors were administered to a homogeneous group of medical students 1 year after the attacks. In multiple regression analyses, compulsive and passive-aggressive personality traits and a higher level of exposure to stressors during air attacks independently predicted the degree of intrusion symptoms. Avoidance symptoms were predicted by avoidant personality traits and a higher exposure to stressors both previously in life and during the attacks. In the next step, we tested in analyses of variance whether personality traits, previous stressful experiences, and stressful events during attacks as independent variables interact in predicting intrusion and avoidance symptoms. For this, students were clustered into three groups depending on their predominant personality traits. In addition to direct predictive effects, there were significant interaction effects in predicting both intrusion and avoidance. The findings suggest that each of the tested factors, i.e., personality traits, previous stressful experiences, and exposure to traumatic events may have an independent and direct influence on developing posttraumatic stress. However, the effect of these factors cannot just be added up. Rather, the factors interact in their impact on posttraumatic stress symptoms. Bigger samples and longitudinal designs will be required to

  19. The relationship between anxiety and quality of life in children with hereditary angioedema.

    Science.gov (United States)

    Kessel, Aharon; Farkas, Henriette; Kivity, Shmuel; Veszeli, Nóra; Kőhalmi, Kinga V; Engel-Yeger, Batya

    2017-11-01

    The severe life-threatening characteristics of hereditary angioedema (HAE) with C1-inhibitor deficiency (C1-INH-HAE) can affect anxiety levels among pediatric patients. This emotional burden together with the physical restrictions of C1-INH-HAE may decrease children's health-related quality of life (HRQoL). (i) To compare anxiety state and trait between children with C1-INH-HAE and healthy controls; (ii) to examine the relationship between the level of anxiety of children with C1-INH-HAE, their disease activity/affected sites and their HRQoL; and (iii) to predict the HRQoL of children with C1-INH-HAE based on their anxiety level and disease activity/affected sites METHODS: Thirty-three children with C1-INH-HAE (aged 5-18 years) and 52 healthy controls were recruited from Israel and Hungary. All children completed the State-Trait Anxiety Inventory for Children (STAIC), the Pediatric Quality of Life Inventory (Peds-QL) demographic questionnaire and a disease activity and site questionnaire . Disease activity was defined as the number of attacks in last year. Both anxiety state and trait were significantly higher among children with C1-INH-HAE as compared to the controls (44.74±10.56 vs 38.76±10.67, Panxiety state (F 56,2 =4.69, P=.001) and trait (F 56,2 =9.06, Panxiety trait was correlated with the number of angioedema-affected sites (r=.52, P=.003). The presence of HAE attacks and higher anxiety trait predicted a lower HRQoL in children with C1-INH-HAE. C1-INH-HAE children have higher anxiety trait and state, which correlate with reduced HRQoL domains. © 2017 EAACI and John Wiley and Sons A/S. Published by John Wiley and Sons Ltd.

  20. The work-averse cyber attacker model : theory and evidence from two million attack signatures

    NARCIS (Netherlands)

    Allodi, L.; Massacci, F.; Williams, J.

    The typical cyber attacker is assumed to be all powerful and to exploit all possible vulnerabilities. In this paper we present, and empirically validate, a novel and more realistic attacker model. The intuition of our model is that an attacker will optimally choose whether to act and weaponize a new

  1. Life-threatening and disabling injuries in car-to-car side impacts--implications for development of protective systems.

    Science.gov (United States)

    Håland, Y; Lövsund, P; Nygren, A

    1993-04-01

    Improvements to the passive safety of cars in lateral collisions are of great importance. This study of injuries in car side collisions in Sweden by the use of two evaluation methods has been performed to establish the basis for future development of protective systems for this type of accident. The Folksam car accident data file has been used. Injuries were found to be twice as common for near-side than for far-side* occupants in car to car impacts. Serious to fatal (AIS 3-6) injuries to belted front seat occupants in near side impacts (10% of all injuries) were compared with the estimated number of injuries to different parts of the body with risk of serious consequences (RSC)--either deaths or permanent disabilities (4.5% of all injuries). The two injury evaluation methods resulted in different ranking orders. AIS 3-6 injuries were received by the chest (37%), abdomen/pelvis (25%), and the head (15%). The RSC method gave a ranking order of head (25%), neck (21%), leg (15%), chest (14%), and abdomen/pelvis (11%). The method of evaluating AIS 3-6 injuries emphasizes only the threat to life. The RSC method also takes into account the risk of disabilities. Injuries to the neck and the leg were found to be most disabling, whilst the injuries to the head, chest, and abdomen/pelvis were the most life threatening. The study also shows that elderly people receive significantly more chest injuries (relative to the number of head injuries), on average four times more than young people.(ABSTRACT TRUNCATED AT 250 WORDS)

  2. Warmer weather linked to tick attack and emergence of severe rickettsioses.

    Directory of Open Access Journals (Sweden)

    Philippe Parola

    Full Text Available The impact of climate on the vector behaviour of the worldwide dog tick Rhipicephalus sanguineus is a cause of concern. This tick is a vector for life-threatening organisms including Rickettsia rickettsii, the agent of Rocky Mountain spotted fever, R. conorii, the agent of Mediterranean spotted fever, and the ubiquitous emerging pathogen R. massiliae. A focus of spotted fever was investigated in France in May 2007. Blood and tissue samples from two patients were tested. An entomological survey was organised with the study of climatic conditions. An experimental model was designed to test the affinity of Rh. sanguineus for biting humans in variable temperature conditions. Serological and/or molecular tools confirmed that one patient was infected by R. conorii, whereas the other was infected by R. massiliae. Dense populations of Rh. sanguineus were found. They were infected with new genotypes of clonal populations of either R. conorii (24/133; 18% or R. massiliae (13/133; 10%. April 2007 was the warmest since 1950, with summer-like temperatures. We show herein that the human affinity of Rh. sanguineus was increased in warmer temperatures. In addition to the originality of theses cases (ophthalmic involvements, the second reported case of R. massiliae infection, we provide evidence that this cluster of cases was related to a warming-mediated increase in the aggressiveness of Rh. sanguineus, leading to increased human attacks. From a global perspective, we predict that as a result of globalisation and warming, more pathogens transmitted by the brown dog tick may emerge in the future.

  3. Web server attack analyzer

    OpenAIRE

    Mižišin, Michal

    2013-01-01

    Web server attack analyzer - Abstract The goal of this work was to create prototype of analyzer of injection flaws attacks on web server. Proposed solution combines capabilities of web application firewall and web server log analyzer. Analysis is based on configurable signatures defined by regular expressions. This paper begins with summary of web attacks, followed by detection techniques analysis on web servers, description and justification of selected implementation. In the end are charact...

  4. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  5. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based......Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....

  6. Idealised modelling of storm surges in large-scale coastal basins

    NARCIS (Netherlands)

    Chen, Wenlong

    2015-01-01

    Coastal areas around the world are frequently attacked by various types of storms, threatening human life and property. This study aims to understand storm surge processes in large-scale coastal basins, particularly focusing on the influences of geometry, topography and storm characteristics on the

  7. Rays as weapons

    International Nuclear Information System (INIS)

    Vogel, H.

    2007-01-01

    Purpose: Ionizing radiation is being regarded as life threatening. Therefore, accidents in nuclear power plants are considered equal threatening as nuclear bomb explosions, and attacks with dirty bombs are thought as dangerous as nuclear weapon explosions. However, there are differences between a nuclear bomb explosion, the largest imaginable accident in a nuclear power plant, and an attack with a dirty bomb. It is intended to point them out. Method: The processes are described, which damage in a nuclear bomb explosion, in the largest imaginable accident in a nuclear power plant, and in an attack with a dirty bomb. Their effects are compared with each other, i.e. explosion, heat, shock wave (blast), ionizing radiation, and fallout. Results: In the center of the explosion of a nuclear bomb, the temperature rises to 100 Mio deg.C, this induces damaging heat radiation and shock wave. In the largest imaginable accident in a nuclear power plant and in the conventional explosion of a dirty bomb, the temperature may rise up to 3000 deg. C, heat radiation and blast are limited to a short distance. In nuclear power plants, explosions due to oxyhydrogen gas or steam may occur. In nuclear explosions the dispersed radioactive material (fall out) consists mainly of isotopes with short half-life, in nuclear power plants and in dirty bomb attacks with longer half-life. The amount of fall out is comparable in nuclear bomb explosions with that in the largest imaginable accident in a nuclear power plant, it is smaller in attacks with dirty bombs. An explosion in a nuclear power plant even in the largest imaginable accident is not a nuclear explosion. In Hiroshima and Nagasaki, there were 200,000 victims nearly all by heat and blast, some 300 died by ionizing radiation. In Chernobyl, there have been less than 100 victims due to ionizing radiation up till now. A dirty bomb kills possibly with the explosion of conventional explosive, the dispersed radioactive material may damage

  8. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  9. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  10. Thoracic hyperextension injury with complete “bony disruption” of the thoracic cage: Case report of a potentially life-threatening injury

    Directory of Open Access Journals (Sweden)

    Bailey James

    2012-05-01

    Full Text Available Abstract Background Severe chest wall injuries are potentially life-threatening injuries which require a standardized multidisciplinary management strategy for prevention of posttraumatic complications and adverse outcome. Case presentation We report the successful management of a 55-year old man who sustained a complete “bony disruption” of the thoracic cage secondary to an “all-terrain vehicle” roll-over accident. The injury pattern consisted of a bilateral “flail chest” with serial segmental rib fractures, bilateral hemo-pneumothoraces and pulmonary contusions, bilateral midshaft clavicle fractures, a displaced transverse sternum fracture with significant diastasis, and an unstable T9 hyperextension injury. After initial life-saving procedures, the chest wall injuries were sequentially stabilized by surgical fixation of bilateral clavicle fractures, locked plating of the displaced sternal fracture, and a two-level anterior spine fixation of the T9 hyperextension injury. The patient had an excellent radiological and physiological outcome at 6 months post injury. Conclusion Severe chest wall trauma with a complete “bony disruption” of the thoracic cage represents a rare, but detrimental injury pattern. Multidisciplinary management with a staged timing for addressing each of the critical injuries, represents the ideal approach for an excellent long-term outcome.

  11. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  12. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  13. Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics

    Directory of Open Access Journals (Sweden)

    Sárkány Zoltán

    2016-03-01

    Full Text Available Introduction: The objective of this study was to investigate with the help of a computerized simulation model whether the treatment of an acute asthma attack can be individualized based on the severity of the attack and the characteristics of the patient. Material and Method: A stochastic lung model was used to simulate the deposition of 1 nm - 10 μm particles during a mild and a moderate asthma attack. Breathing parameters were varied to maximize deposition, and simulation results were compared with those obtained in the case of a severe asthma attack. In order to investigate the effect of height on the deposition of inhaled particles, another series of simulations was carried out with identical breathing parameters, comparing patient heights of 155 cm, 175 cm and 195 cm. Results: The optimization process yielded an increase in the maximum deposition values of around 6-7% for each type of investigated asthma attack, and the difference between attacks of different degree of severity was around 5% for both the initial and the optimized values, a higher degree of obstruction increasing the amount of deposited particles. Conclusions: Our results suggest that the individualization of asthma attack treatment cannot be based on particles of different size, as the highest deposited fraction in all three types of attacks can be obtained using 0.01 μm particles. The use of a specific set of breathing parameters yields a difference between a mild and a moderate, as well as a moderate and a severe asthma attack of around 5%.

  14. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  15. Blood oozing: A cause of life-threatening bleeding without overt source after transcatheter aortic valve replacement.

    Science.gov (United States)

    Tarantini, Giuseppe; Mojoli, Marco; Barioli, Alberto; Battistel, Michele; Généreux, Philippe

    2016-12-01

    Post-procedure non-access site-related bleedings have a significant impact on mortality in patients treated by transcatheter aortic valve replacement (TAVR). Notwithstanding, the source of these bleedings is frequently indeterminate, with potentially serious clinical implications related to lack of diagnosis and treatment. Out of 513 TAVR performed between June 2007 and January 2016 in the Interventional Cardiology Laboratory of the Department of Cardiac, Thoracic and Vascular Sciences, University Hospital of Padua, we identified few proven cases of concealed bleeding after TAVR due to blood oozing. We report three cases of angiographically confirmed post-TAVR non-access bleedings related to spontaneous blood oozing, a life-threatening condition consisting of diffuse capillary hemorrhage developing from vessels not directly involved by the procedure. We hypothesize that spontaneous post-procedural blood oozing may account for a substantial proportion of non-overt, non-access site-related bleeding after TAVR. The possibility of post-TAVR blood oozing is largely neglected in the literature, and comprehensive categorization of non-access site bleedings in current standardized endpoints of TAVR studies is missing. Early assessment with arterial and venous contrast phase angio-MDCT scans in case of post-TAVR unexplained and persistent anemia may allow diagnosis and treatment of this subtle condition. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  16. A study of family carers of people with a life-threatening illness. 2: Implications of the needs assessment.

    Science.gov (United States)

    Scott, G

    2001-07-01

    This is the second of two articles that consider the findings of a Carers' Assessment of Difficulties Index (CADI) (Nolan et al, 1998) delivered in a palliative care context. It analyses the implications of these findings for practitioners concerned with the delivery of palliative care to such carers and their families. The development of support strategies and services addressing their needs are also presented against a backdrop of transactional stress theory. For people new to caring, recommendations for the local service include early intervention through informational support and validation of their emotional responses to caring; for longer-term carers they include assistance with cognitive reappraisal of the stressfulness of caring and regular 'respite' and socializing opportunities. These are taking place in a political climate that finally recognizes the contribution and value of carers (Department of Health, 1999). The research behind these carer identity and recognition initiatives aims to apply the spirit of public recognition and practical wisdom of palliative care expertise by responding sensitively to the specific needs of carers of people with a life-threatening illness.

  17. Efficacy of selective arterial embolisation for the treatment of life-threatening post-partum haemorrhage in a large population.

    Directory of Open Access Journals (Sweden)

    Cyril Touboul

    Full Text Available BACKGROUND: The objective of this study was to assess efficacy and determine the optimal indication of selective arterial embolisation (SAE in patients with life-threatening post-partum haemorrhage (PPH. METHODOLOGY/PRINCIPAL FINDINGS: One hundred and two patients with PPH underwent SAE and were included from January 1998 to January 2002 in our university care center. Embolisation was considered effective when no other surgical procedure was required. Univariate and multivariate statistical analysis were performed. SAE was effective for 73 patients (71.5%, while 29 required surgical procedures. SAE was effective in 88.6% of women with uterine atony that was associated with positive outcome (OR 4.13, 1.35-12.60, whereas caesarean deliveries (OR 0.16, 0.04-0.5 and haemodynamic shock (OR 0.21, 0.07-0.60 were associated with high failure rates, 47.6% and 39.1%, respectively. CONCLUSIONS/SIGNIFICANCE: Success rate for SAE observed in a large population is lower than previously reported. It is most likely to succeed for uterine atony but not recommended in case of haemodynamic shock or after caesarean section.

  18. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  19. Pericarditis - after heart attack

    Science.gov (United States)

    ... include: A previous heart attack Open heart surgery Chest trauma A heart attack that has affected the thickness of your heart muscle Symptoms Symptoms include: Anxiety Chest pain from the swollen pericardium rubbing on the ...

  20. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  1. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...... AES or similar algorithms in virtualized environments. This paper applies variants of this cache timing attack to Intel's latest generation of microprocessors. It enables a spy-process to recover cryptographic keys, interacting with the victim processes only over TCP. The threat model is a logically...... separated but CPU co-located attacker with root privileges. We report successful and practically verified applications of this attack against a wide range of microarchitectures, from a two-core Nehalem processor (i5-650) to two-core Haswell (i7-4600M) and four-core Skylake processors (i7-6700). The attack...

  2. Prevalence of epilepsy and seizure disorders as causes of apparent life- threatening event (ALTE) in children admitted to a tertiary hospital.

    Science.gov (United States)

    Anjos, Alessandra Marques dos; Nunes, Magda Lahorgue

    2009-09-01

    To determine the prevalence and describe clinical characteristics of seizure disorders and epilepsy as causes of apparent life- threatening event (ALTE) in children admitted at the emergency and followed in a tertiary hospital. Cross-sectional study with prospective data collection using specific guidelines to determine the etiology of ALTE. During the study, 30 (4.2%) children admitted to the hospital had a diagnosis of ALTE. There was a predominance of males (73%) and term infants (70%). Neonatal neurological disorders and neuropsychomotor development delay were found respectively in 13.4% and 10% of the cases. Etiological investigation revealed that 50% of the cases were idiopathic, and 13.4% were caused by epilepsy or seizure disorders. Although all patients had recurrent ALTE events, epilepsy had not been previously suspected. Epilepsy should be included in the differential diagnosis of ALTE, particularly when events are recurrent.

  3. MACHINE LEARNING IMPLEMENTATION FOR THE CLASSIFICATION OF ATTACKS ON WEB SYSTEMS. PART 2

    Directory of Open Access Journals (Sweden)

    K. Smirnova

    2017-11-01

    Full Text Available The possibility of applying machine learning for the classification of malicious requests to aWeb application is considered. This approach excludes the use of deterministic analysis systems (for example, expert systems,and is based on the application of a cascade of neural networks or perceptrons on an approximate model to the real humanbrain. The main idea of the work is to enable to describe complex attack vectors consisting of feature sets, abstract terms forcompiling a training sample, controlling the quality of recognition and classifying each of the layers (networks participatingin the work, with the ability to adjust not the entire network, but only a small part of it, in the training of which a mistake orinaccuracy crept in. The design of the developed network can be described as a cascaded, scalable neural network.When using neural networks to detect attacks on web systems, the issue of vectorization and normalization of features isacute. The most commonly used methods for solving these problems are not designed for the case of deliberate distortion ofthe signs of an attack.The proposed approach makes it possible to obtain a neural network that has been studied in more detail by small features,and also to eliminate the normalization issues in order to avoid deliberately bypassing the intrusion detection system. Byisolating one more group of neurons in the network and teaching it to samples containing various variants of circumvention ofthe attack classification, the developed intrusion detection system remains able to classify any types of attacks as well as theiraggregates, putting forward more stringent measures to counteract attacks. This allows you to follow the life cycle of theattack in more detail: from the starting trial attack to deliberate sophisticated attempts to bypass the system and introducemore decisive measures to actively counteract the attack, eliminating the chances of a false alarm system.

  4. Serious life threatening upper airway obstruction in congenital ...

    African Journals Online (AJOL)

    Reda A. Abolila

    2012-07-15

    Jul 15, 2012 ... hamartoma, multiple vascular leiomyoma of newborn, diffuse congenital fibromatosis ... in the literatures that about one third of such infants die in the first 4 months of life from .... Juvenile fibromatosis. Cancer 1954;7:953–78.

  5. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  6. Life-threatening hyperkalemia following zoledronic acid infusion for Paget's disease: a case report

    Directory of Open Access Journals (Sweden)

    Naysmith Morag

    2011-08-01

    Full Text Available Abstract Introduction Zoledronic acid is a highly effective treatment in Paget's disease for persistent bone pain and prevention of further progression of the disease. The commonest electrolyte abnormality is hypocalcemia. To the best of our knowledge this is the first case of hyperkalemia secondary to zoledronic acid to be published in the world literature. The commonest arrhythmia related to zoledronic acid is atrial fibrillation. Case presentation We describe the case of an 80-year-old Caucasian man, with a history of ischemic heart disease, who had an in-hospital cardiac arrest related to hyperkalemia. Increasing potassium levels were noted following his first zoledronic acid infusion for symptomatic control of bone pain secondary to Paget's disease. Our patient suffered a cardiac arrest 10 days following the zoledronic acid infusion. Our patient's biochemistry and electrocardiogram output were monitored until his death 26 days after his cardiac arrest. Our patient developed paroxysmal atrial fibrillation in the post-resuscitation period and there was persistent hyperkalemia that required prolonged treatment with calcium resonium. All other possible causes of hyperkalemia were excluded. Conclusion In our patient's case persistent hyperkalemia and life-threatening arrhythmias were associated with use of zoledronic acid. These side effects have not been reported before and the causative mechanism is far from clear as there are no obvious systemic effects of zoledronic acid. The combination of zoledronic acid with predisposing factors such as structural heart disease might account for the clinical picture we witnessed. As a result, electrolyte monitoring should be adopted early in zoledronic acid use. Further studies are required to elucidate the underlying mechanism of hyperkalemia and identify the target group of patients where zoledronic acid can be safely administered. Great caution is advised in patients with underlying heart conditions.

  7. How Does Air Pollution Threaten Basic Human Rights? The Case Study of Bulgaria

    Science.gov (United States)

    Ahmedova, Aylin Hasanova

    2016-01-01

    The main purpose of this article is to analyze the relationship between air pollution and human rights. It investigates whether air pollution threatens basic human rights such as the right to health, life, and the environment. Air pollution represents a major threat both to health and to the environment. Despite the adoption of numerous…

  8. Protecting ICS Systems Within the Energy Sector from Cyber Attacks

    Science.gov (United States)

    Barnes, Shaquille

    Advance persistent threat (APT) groups are continuing to attack the energy sector through cyberspace, which poses a risk to our society, national security, and economy. Industrial control systems (ICSs) are not designed to handle cyber-attacks, which is why asset owners need to implement the correct proactive and reactive measures to mitigate the risk to their ICS environments. The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) responded to 290 incidents for fiscal year 2016, where 59 of those incidents came from the Energy Sector. APT groups know how vulnerable energy sector ICS systems are and the destruction they can cause when they go offline such as loss of production, loss of life, and economic impact. Defending against APT groups requires more than just passive controls such as firewalls and antivirus solutions. Asset owners should implement a combination of best practices and active defense in their environment to defend against APT groups. Cyber-attacks against critical infrastructure will become more complex and harder to detect and respond to with traditional security controls. The purpose of this paper was to provide asset owners with the correct security controls and methodologies to help defend against APT groups.

  9. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  10. Predicting Factors of Zone 4 Attack in Volleyball.

    Science.gov (United States)

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  11. Point-of-care G6PD diagnostics for Plasmodium vivax malaria is a clinical and public health urgency.

    Science.gov (United States)

    Baird, J Kevin

    2015-12-14

    Malaria caused by Plasmodium vivax threatens over 2 billion people globally and sickens tens of millions annually. Recent clinical evidence discredits the long-held notion of this infection as intrinsically benign revealing an often threatening course associated with mortality. Most acute attacks by this species derive from latent forms in the human liver called hypnozoites. Radical cure for P. vivax malaria includes therapy aimed both at the acute attack (blood schizontocidal) and against future attacks (hypnozoitocidal). The only hypnozoitocide available is primaquine, a drug causing life-threatening acute hemolytic anemia in patients with the inherited blood disorder glucose-6-phosphate dehydrogenase (G6PD) deficiency. This disorder affects 400 million people worldwide, at an average prevalence of 8 % in malaria-endemic nations. In the absence of certain knowledge regarding the G6PD status of patients infected by P. vivax, providers must choose between the risk of harm caused by primaquine and that caused by the parasite by withholding therapy. Resolving this dilemma requires the availability of point-of-care G6PD diagnostics practical for use in the impoverished rural tropics where the vast majority of malaria patients seek care.

  12. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia.

    Science.gov (United States)

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources.

  13. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

    Directory of Open Access Journals (Sweden)

    Željko Gavrić

    2018-01-01

    Full Text Available Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.

  14. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  15. Plants under dual attack

    NARCIS (Netherlands)

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses

  16. 77 FR 20774 - Endangered and Threatened Species; Proposed Threatened Status for Distinct Population Segments of...

    Science.gov (United States)

    2012-04-06

    ... DEPARTMENT OF COMMERCE National Oceanic and Atmospheric Administration 50 CFR Part 223 RIN 0648-XZ58 Endangered and Threatened Species; Proposed Threatened Status for Distinct Population Segments of the Bearded Seal AGENCY: National Marine Fisheries Service (NMFS), National Oceanic and Atmospheric...

  17. New attacks on Wi-Fi Protected Setup

    OpenAIRE

    Hamed Mohtadi; Alireza Rahimi

    2015-01-01

    Wi-Fi Protected Setup (WPS) is a network security standard that is used to secure networks in home and office, introduced in 2006 by the Wi-Fi Alliance. It provides easier configuration setup and is used in almost all recent Wi-Fi devices. In this paper we propose two attacks on this standard. The first attack is an offline brute force attack that uses imbalance on registration protocol. This attack needs user action, but it is more efficient than previous attacks. The second attack uses weak...

  18. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  19. Invisible Trojan-horse attack

    DEFF Research Database (Denmark)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin

    2017-01-01

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance...

  20. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Sakuta, Hidenari

    2007-01-01

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  1. Comparative phenomenology of ataques de nervios, panic attacks, and panic disorder.

    Science.gov (United States)

    Lewis-Fernández, Roberto; Guarnaccia, Peter J; Martínez, Igda E; Salmán, Ester; Schmidt, Andrew; Liebowitz, Michael

    2002-06-01

    This article examines a clinical sample of 66 Dominican and Puerto Rican subjects who reported ataques de nervios and also psychiatric disorder, and disentangles the phenomenological experiences of ataque de nervios, panic attacks, and panic disorder. In-depth cultural interviews assessed the symptomatic phenomenology of ataque episodes from the local perspective as well as in terms of key panic features, such as recurrence, rapid peaking of symptoms, and lack of provocation. Independent diagnostic assessments of panic attacks and disorder were also used to establish the phenomenological overlap between ataque and panic. Our findings indicate that 36 percent of ataques de nervios fulfill criteria for panic attacks and between 17 percent and 33 percent for panic disorder, depending on the overlap method used. The main features distinguishing ataques that fulfill panic criteria from ataques that do not include whether the episodes were provoked by an upsetting event in the person's life and the rapidity of crescendo of the actual attack. A key finding is that ataques often share individual phenomenological features with panic episodes, but that these features usually do not "run together" during the ataque experience. This confirms previous findings that ataque is a more inclusive construct than panic disorder. The importance of these findings for the clinical diagnosis and treatment of persons with ataques is discussed.

  2. Script-viruses Attacks on UNIX OS

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-06-01

    Full Text Available In this article attacks on UNIX OS are considered. Currently antivirus developers are concentrated on protecting systems from viruses that are most common and attack popular operating systems. If the system or its components are not often attacked then the antivirus products are not protecting these components as it is not profitable. The same situation is with script-viruses for UNIX OS as most experts consider that it is impossible for such viruses to get enough rights to attack. Nevertheless the main conclusion of this article is the fact that such viruses can be very powerful and can attack systems and get enough rights.

  3. Are first rib fractures a marker for other life-threatening injuries in patients with major trauma? A cohort study of patients on the UK Trauma Audit and Research Network database

    OpenAIRE

    Sammy, Ian Ayenga; Chatha, Hridesh; Lecky, Fiona; Bouamra, Omar; Fragoso-I?iguez, Marisol; Sattout, Abdo; Hickey, Michael; Edwards, John E

    2017-01-01

    Background: First rib fractures are considered indicators of increased morbidity and mortality in major trauma. However, this has not been definitively proven. With an increased use of CT and the potential increase in detection of first rib fractures, re-evaluation of these injuries as a marker for life-threatening injuries is warranted.\\ud \\ud Methods: Patients sustaining rib fractures between January 2012 and December 2013 were investigated using data from the UK Trauma Audit and Research N...

  4. [Terrorist attack trauma - an individual entity of polytrauma : A 10-year update].

    Science.gov (United States)

    Güsgen, C; Franke, A; Hentsch, S; Kollig, E; Schwab, R

    2017-10-01

    The incidence of terrorist attacks is increasing worldwide, and they have also become a permanent threat in European cities. Due to its complexity, terrorist attack trauma places high demands on the strategy of surgical treatment. The combination of various mechanisms, explosions and gunshot injuries, with the characteristic pressure (blast) damage and a high proportion of penetrating trauma with simultaneous burns are characteristic features. Unlike in military conflicts, injuries to people of all ages and without ballistic body protection (body armor) are to be expected. The mechanism of the attack and its local conditions are of relevance for the assessment of the situation and the expected injury patterns. Thus, suicide attacks result in several times higher numbers of fatalities and casualties. Explosions on free ground lead to different types of injury than those in closed or semi-enclosed spaces. The treatment principles of the Advanced Trauma Life Support (ATLS®) are based on the intrahospital care of casualties as well as damage control strategies with trigger factors. In order to prepare and educate clinics and surgeons in Germany for such scenarios, various course formats of the professional societies, the German Society for General and Visceral Surgery (DGAV) and the German Society for Trauma Surgery (DGU) have now been established.

  5. Life threatening arrhythmias: Knowledge and skills among nurses ...

    African Journals Online (AJOL)

    User

    this study was to assess knowledge and skills of nurses in identifying life ... Much of the literature considers ventricular tachycardia, ventricular fibrillation, ... In critical care settings, bedside nurses play a critical role in arrhythmia identification and ..... Lambert, V.A. & Lambert, C.E. (2008) Nurses' workplace stressors and ...

  6. Miscarriage - threatened

    Science.gov (United States)

    ... might take place before the 20th week of pregnancy. Causes Some pregnant women have some vaginal bleeding , with ... injuries or stress during the first trimester of pregnancy can cause threatened miscarriage. It occurs in almost half of ...

  7. Hybrid attacks on model-based social recommender systems

    Science.gov (United States)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  8. 76 FR 14883 - Endangered and Threatened Species; Proposed Threatened Status for Distinct Population Segments of...

    Science.gov (United States)

    2011-03-18

    ...-XZ58 Endangered and Threatened Species; Proposed Threatened Status for Distinct Population Segments of..., published a proposed rule to list the Beringia and Okhotsk Distinct Population Segments (DPSs) of the... published a proposed rule to list the Beringia and Okhotsk Distinct Population Segments (DPSs) of the...

  9. Download this PDF file

    African Journals Online (AJOL)

    USER

    develop immunity after a single infection (Tzipori, 1985;. Radostits et al., 1994). Although animals with strong immune system are not so vulnerable to an attack of the disease, the life of immune-deficient hosts is seriously threatened (Current,. 1997). Incidentally, cryptosporidiosis is a zoonosis and capable of causing severe ...

  10. Seasonal and recurrent intensive care unit admissions for acute ...

    African Journals Online (AJOL)

    Life-threatening attacks of asthma requiring intensive care unit (ICU) management at Red Cross War Memorial Children's Hospital in Cape Town were noted to occur in some patients in the same or adjacent months of different years. A retrospective case-controlled study was performed of 21 such 'seasonal' patients who ...

  11. Mapping the anatomy of social engineering attacks to the systems engineering life cycle

    CSIR Research Space (South Africa)

    Van de Merwe, J

    2017-11-01

    Full Text Available in Information and Communication Technology), pp. 266–279. doi: 10.1007/978-3-662-44208-1_22. Mouton, F. et al. (2015) ‘Necessity for ethics in social engineering research’, Computers & Security, 55, pp. 114–127. doi: http://dx.doi.org/10.1016/j.cose.2015... space. These include a context diagram, functional modelling, holistic requirements modelling, matrix diagrams, stakeholder maps and a viewpoint analysis. Keywords Bidirectional Communication, Indirect Communication, Mitnick's Attack Cycle, Social...

  12. An Analysis of Attacks on Blockchain Consensus

    OpenAIRE

    Bissias, George; Levine, Brian Neil; Ozisik, A. Pinar; Andresen, Gavin

    2016-01-01

    We present and validate a novel mathematical model of the blockchain mining process and use it to conduct an economic evaluation of the double-spend attack, which is fundamental to all blockchain systems. Our analysis focuses on the value of transactions that can be secured under a conventional double-spend attack, both with and without a concurrent eclipse attack. Our model quantifies the importance of several factors that determine the attack's success, including confirmation depth, attacke...

  13. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank...

  14. Attacks on public telephone networks: technologies and challenges

    Science.gov (United States)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  15. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2010-01-01

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  16. Defense and attack of complex and dependent systems

    Energy Technology Data Exchange (ETDEWEB)

    Hausken, Kjell, E-mail: kjell.hausken@uis.n [Faculty of Social Sciences, University of Stavanger, N-4036 Stavanger (Norway)

    2010-01-15

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  17. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error......-prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...... are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  18. Pareto Efficient Solutions of Attack-Defence Trees

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2015-01-01

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as proba......Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes......, such as probability or cost of attacks and defences. In case of multiple parameters most analytical methods optimise one parameter at a time, e.g., minimise cost or maximise probability of an attack. Such methods may lead to sub-optimal solutions when optimising conflicting parameters, e.g., minimising cost while...... maximising probability. In order to tackle this challenge, we devise automated techniques that optimise all parameters at once. Moreover, in the case of conflicting parameters our techniques compute the set of all optimal solutions, defined in terms of Pareto efficiency. The developments are carried out...

  19. Prenatal Diagnosis of a Segmental Small Bowel Volvulus with Threatened Premature Labor

    Directory of Open Access Journals (Sweden)

    Barbara Monard

    2017-01-01

    Full Text Available Fetal primary small bowel volvulus is extremely rare but represents a serious life-threatening condition needing emergency neonatal surgical management to avoid severe digestive consequences. We report a case of primary small bowel volvulus with meconium peritonitis prenatally diagnosed at 27 weeks and 4 days of gestation during threatened premature labor with reduced fetal movements. Ultrasound showed a small bowel mildly dilated with thickened and hyperechogenic intestinal wall, with a typical whirlpool configuration. Normal fetal development allowed continuation of pregnancy with ultrasound follow-up. Induction of labor was decided at 37 weeks and 2 days of gestation because of a significant aggravation of intestinal dilatation appearing more extensive with peritoneal calcifications leading to the suspicion of meconium peritonitis, associated with reduced fetal movements and reduced fetal heart rate variability, for neonatal surgical management with a good outcome.

  20. Prenatal Diagnosis of a Segmental Small Bowel Volvulus with Threatened Premature Labor

    Science.gov (United States)

    Mottet, Nicolas; Ramanah, Rajeev; Riethmuller, Didier

    2017-01-01

    Fetal primary small bowel volvulus is extremely rare but represents a serious life-threatening condition needing emergency neonatal surgical management to avoid severe digestive consequences. We report a case of primary small bowel volvulus with meconium peritonitis prenatally diagnosed at 27 weeks and 4 days of gestation during threatened premature labor with reduced fetal movements. Ultrasound showed a small bowel mildly dilated with thickened and hyperechogenic intestinal wall, with a typical whirlpool configuration. Normal fetal development allowed continuation of pregnancy with ultrasound follow-up. Induction of labor was decided at 37 weeks and 2 days of gestation because of a significant aggravation of intestinal dilatation appearing more extensive with peritoneal calcifications leading to the suspicion of meconium peritonitis, associated with reduced fetal movements and reduced fetal heart rate variability, for neonatal surgical management with a good outcome. PMID:29230337

  1. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  2. Heart Attack Symptoms in Women

    Science.gov (United States)

    ... fat, cholesterol and other substances (plaque). Watch an animation of a heart attack . Many women think the ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  3. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing

  4. Exercise-Induced Anaphylaxis: A Case Report and Review of the Diagnosis and Treatment of a Rare but Potentially Life-Threatening Syndrome

    Directory of Open Access Journals (Sweden)

    Nathan T. Jaqua

    2013-01-01

    Full Text Available A 24-year-old male Marine with an uncomplicated medical history and a long history of strenuous, daily exercise presented to the emergency department after experiencing anaphylactic shock while running. Symptoms resolved following administration of intramuscular diphenhydramine, ranitidine, intravenous methylprednisolone, and intravenous fluids. On followup in the allergy clinic, a meticulous clinical history was obtained which elucidated a picture consistent with exercise-induced anaphylaxis. He had experienced diffuse pruritus and urticaria while exercising on multiple occasions over the last three years. His symptoms would usually increase as exercise continued. Prior to the first episode, he regularly exercised without symptoms. Exercise-induced anaphylaxis is a rare but potentially life-threatening syndrome that requires a careful clinical history and is a diagnosis of exclusion. Treatment is primarily exercise avoidance. Prophylactic mediations are inconsistently effective but are empirically used. Successful treatment with omalizumab was recently reported in a case of refractory exercise-induced anaphylaxis.

  5. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  6. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support....... However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  7. [Prenatal intestinal volvulus: A life-threatening event with good long-term outcome].

    Science.gov (United States)

    Raherison, R; Grosos, C; Lemale, J; Blondiaux, E; Sabourdin, N; Dahan, S; Rosenblatt, J; Guilbert, J; Jouannic, J-M; Mitanchez, D; Audry, G; Auber, F

    2012-04-01

    . Median duration of parenteral nutrition was 29 days (range, 6-667 days). None of the patients had cystic fibrosis. Unlike postnatal volvulus, most prenatal volvulus occurs without malrotation. Although prenatal volvulus is a life-threatening condition, our results suggest that good long-term outcome can be achieved in most cases. Copyright © 2012 Elsevier Masson SAS. All rights reserved.

  8. Early life adversity: Lasting consequences for emotional learning

    Directory of Open Access Journals (Sweden)

    Harm J. Krugers

    2017-02-01

    Full Text Available The early postnatal period is a highly sensitive time period for the developing brain, both in humans and rodents. During this time window, exposure to adverse experiences can lastingly impact cognitive and emotional development. In this review, we briefly discuss human and rodent studies investigating how exposure to adverse early life conditions – mainly related to quality of parental care - affects brain activity, brain structure, cognition and emotional responses later in life. We discuss the evidence that early life adversity hampers later hippocampal and prefrontal cortex functions, while increasing amygdala activity, and the sensitivity to stressors and emotional behavior later in life. Exposure to early life stress may thus on the one hand promote behavioral adaptation to potentially threatening conditions later in life –at the cost of contextual memory formation in less threatening situations- but may on the other hand also increase the sensitivity to develop stress-related and anxiety disorders in vulnerable individuals.

  9. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  10. Understanding How Components of Organisations Contribute to Attacks

    DEFF Research Database (Denmark)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors is diffi......Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors...... is difficult. Recently, system models have been used for automatically identifying possible attacks on the modelled organisation. The generated attacks consider all three layers, making the contribution of building infrastructure, computer infrastructure, and humans (insiders and outsiders) explicit. However......, this contribution is only visible in the attack trees as part of the performed steps; it cannot be mapped back to the model directly since the actions usually involve several elements (attacker and targeted actor or asset). Especially for large attack trees, understanding the relations between several model...

  11. Attack Graph Construction for Security Events Analysis

    Directory of Open Access Journals (Sweden)

    Andrey Alexeevich Chechulin

    2014-09-01

    Full Text Available The paper is devoted to investigation of the attack graphs construction and analysis task for a network security evaluation and real-time security event processing. Main object of this research is the attack modeling process. The paper contains the description of attack graphs building, modifying and analysis technique as well as overview of implemented prototype for network security analysis based on attack graph approach.

  12. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  13. Quantifying Improbability: An Analysis of the Lloyd’s of London Business Blackout Cyber Attack Scenario

    Science.gov (United States)

    Scenarios that describe cyber attacks on the electric grid consistently predict significant disruptions to the economy and citizens quality of life...phenomena that deserve further investigation, such as the importance of some individual power plants in influencing the adversarys probability of

  14. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2016-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations...... approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  15. When Sinuses Attack! (For Kids)

    Science.gov (United States)

    ... First Aid & Safety Doctors & Hospitals Videos Recipes for Kids Kids site Sitio para niños How the Body Works ... Search English Español When Sinuses Attack! KidsHealth / For Kids / When Sinuses Attack! What's in this article? What ...

  16. Heart Attack

    Science.gov (United States)

    ... properly causes your body's blood sugar levels to rise, increasing your risk of heart attack. Metabolic syndrome. This occurs when you have obesity, high blood pressure and high blood sugar. Having metabolic ...

  17. Aspirin Versus Aspirin Plus Clopidogrel as Antithrombotic Treatment Following Transcatheter Aortic Valve Replacement With a Balloon-Expandable Valve: The ARTE (Aspirin Versus Aspirin + Clopidogrel Following Transcatheter Aortic Valve Implantation) Randomized Clinical Trial.

    Science.gov (United States)

    Rodés-Cabau, Josep; Masson, Jean-Bernard; Welsh, Robert C; Garcia Del Blanco, Bruno; Pelletier, Marc; Webb, John G; Al-Qoofi, Faisal; Généreux, Philippe; Maluenda, Gabriel; Thoenes, Martin; Paradis, Jean-Michel; Chamandi, Chekrallah; Serra, Vicenç; Dumont, Eric; Côté, Mélanie

    2017-07-10

    The aim of this study was to compare aspirin plus clopidogrel with aspirin alone as antithrombotic treatment following transcatheter aortic valve replacement (TAVR) for the prevention of ischemic events, bleeding events, and death. Few data exist on the optimal antithrombotic therapy following TAVR. This was a randomized controlled trial comparing aspirin (80 to 100 mg/day) plus clopidogrel (75 mg/day) (dual antiplatelet therapy [DAPT]) versus aspirin alone (single-antiplatelet therapy [SAPT]) in patients undergoing TAVR with a balloon-expandable valve. The primary endpoint was the occurrence of death, myocardial infarction (MI), stroke or transient ischemic attack, or major or life-threatening bleeding (according to Valve Academic Research Consortium 2 definitions) within the 3 months following the procedure. The trial was prematurely stopped after the inclusion of 74% of the planned study population. A total of 222 patients were included, 111 allocated to DAPT and 111 to SAPT. The composite of death, MI, stroke or transient ischemic attack, or major or life-threatening bleeding tended to occur more frequently in the DAPT group (15.3% vs. 7.2%, p = 0.065). There were no differences between groups in the occurrence of death (DAPT, 6.3%; SAPT, 3.6%; p = 0.37), MI (DAPT, 3.6%; SAT, 0.9%; p = 0.18), or stroke or transient ischemic attack (DAPT, 2.7%; SAPT, 0.9%; p = 0.31) at 3 months. DAPT was associated with a higher rate of major or life-threatening bleeding events (10.8% vs. 3.6% in the SAPT group, p = 0.038). There were no differences between groups in valve hemodynamic status post-TAVR. This small trial showed that SAPT (vs. DAPT) tended to reduce the occurrence of major adverse events following TAVR. SAPT reduced the risk for major or life-threatening events while not increasing the risk for MI or stroke. Larger studies are needed to confirm these results. (Aspirin Versus Aspirin + Clopidogrel Following Transcatheter Aortic Valve Implantation: The ARTE

  18. Software-based Microarchitectural Attacks

    OpenAIRE

    Gruss, Daniel

    2017-01-01

    Modern processors are highly optimized systems where every single cycle of computation time matters. Many optimizations depend on the data that is being processed. Software-based microarchitectural attacks exploit effects of these optimizations. Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel. This leakage even persists across all common isolation boundaries, such as processes, containers, and virtual ...

  19. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    Nai Fovino, Igor; Masera, Marcelo; De Cian, Alessio

    2009-01-01

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  20. Integrating cyber attacks within fault trees

    Energy Technology Data Exchange (ETDEWEB)

    Nai Fovino, Igor [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy)], E-mail: igor.nai@jrc.it; Masera, Marcelo [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy); De Cian, Alessio [Department of Electrical Engineering, University di Genova, Genoa (Italy)

    2009-09-15

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  1. The efficacy and tolerability of frovatriptan and dexketoprofen for the treatment of acute migraine attacks.

    Science.gov (United States)

    Allais, Gianni; Rolando, Sara; De Lorenzo, Cristina; Benedetto, Chiara

    2014-08-01

    Frovatriptan is a triptan characterized by a high affinity for 5-HT1B/1D receptors and a long half-life contributing to a more sustained and prolonged action than other triptans. Dexketoprofen is a nonsteroidal anti-inflammatory drug with a relatively short half-life and rapid onset of action, blocking the action of cyclo-oxygenase, which is involved in prostaglandins' production, thus reducing inflammation and pain. Both drugs have been successfully employed as monotherapies for the treatment of acute migraine attacks. The combination of these two drugs (frovatriptan 2.5 mg plus dexketoprofen 25 or 37.5 mg) has been tested in migraine sufferers, showing a rapid and good initial efficacy, with 2-h pain free rates of 51%, and a high persistence in the 48-h following the onset of pain: recurrence occurred in only 29% of attacks and sustained pain free rates were 43% at 24- and 33% at 48-h.

  2. Attack and Vulnerability Penetration Testing: FreeBSD

    Directory of Open Access Journals (Sweden)

    Abdul Hanan Abdullah

    2013-07-01

    Full Text Available Computer system security has become a major concern over the past few years. Attacks, threasts or intrusions, against computer system and network have become commonplace events. However, there are some system devices and other tools that are available to overcome the threat of these attacks. Currently, cyber attack is a major research and inevitable. This paper presents some steps of penetration in FreeBSD operating system, some tools and new steps to attack used in this experiment, probes for reconnaissance, guessing password via brute force, gaining privilege access and flooding victim machine to decrease availability. All these attacks were executed and infiltrate within the environment of Intrusion Threat Detection Universiti Teknologi Malaysia (ITD UTM data set. This work is expected to be a reference for practitioners to prepare their systems from Internet attacks.

  3. Performance of diamond and point attack coal cutter picks

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Y. [CSIRO, Brisbane, Qld. (Australia). Division of Exploration and Mining

    1996-12-31

    This paper presents results of laboratory experiments and field trials of PDC (Polycrystalline Diamond Compact) and PA (Point Attack) coal cutter picks. Laboratory cutting tests included linear rock and coal cutting and turning rock cutting. The following parameters were measured to assess performance of PDC and PA cutter picks: cutting force, normal force, specific energy consumption, yield, dust generation and ignitional characteristics (temperature rise). Field trials were conducted on a longwall shearer. Performance of both types of pick interims of pick life and dust generation were assessed. 3 refs., 18 figs., 3 tabs.

  4. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  5. Rituximab administration within 6 months of T cell-depleted allogeneic SCT is associated with prolonged life-threatening cytopenias.

    Science.gov (United States)

    McIver, Zachariah; Stephens, Nicole; Grim, Andrew; Barrett, A John

    2010-11-01

    The monoclonal anti-CD20 antibody Rituximab (RTX) is increasingly used in allogeneic stem cell transplantation (SCT) to treat lymphoproliferative disorders and chronic graft-versus-host disease (GVHD). RTX administration can be complicated by delayed and prolonged neutropenia, but the mechanism is unclear. We report the occurrence of profound cytopenias following RTX given in the conditioning regimen or early after T cell-deplete SCT to treat B cell lymphoproliferative disorders or chronic GVHD (cGVHD). Between 2006 and 2009, 102 patients (median age: 43 years, range: 13-68 years), received a myeloablative matched-sibling T cell-deplete SCT for lymphoid or myeloid hematologic disorders. Neutropenia occurring within 4 weeks of treatment developed in 16 of 17 patients given RTX within the first 190 days after SCT. Fourteen patients developed severe neutropenia (count SCT compared to patients with cGVHD not treated with early RTX (P SCT experienced only moderate neutropenia 3 to 5 months after treatment lasting 10 to 20 days while maintaining absolute neutrophil count (ANC) >1.0 × 10⁹/L. Although RTX rapidly controlled cGVHD, we conclude that its administration early after T cell-deplete SCT is associated with prolonged profound and life-threatening cytopenias, and should be avoided. Published by Elsevier Inc.

  6. Cognitive Behavioral Therapy vs. Eye Movement Desensitization and Reprocessing for Treating Panic Disorder: A Randomized Controlled Trial

    OpenAIRE

    Horst, F.; Den Oudsten, B.; Zijlstra, W.; de Jongh, Ad; Lobbestael, J.; De Vries, J.

    2017-01-01

    Objective: Cognitive Behavioral Therapy (CBT) is an effective intervention for patients with panic disorder (PD). From a theoretical perspective, Eye Movement Desensitization and Reprocessing (EMDR) therapy could also be useful in the treatment of PD because: (1) panic attacks can be experienced as life threatening; (2) panic memories specific to PD resemble traumatic memories as seen in posttraumatic stress disorder (PTSD); and (3) PD often develops following a distressing life event. The pr...

  7. Recurrent spontaneous attacks of dizziness.

    Science.gov (United States)

    Lempert, Thomas

    2012-10-01

    This article describes the common causes of recurrent vertigo and dizziness that can be diagnosed largely on the basis of history. Ninety percent of spontaneous recurrent vertigo and dizziness can be explained by six disorders: (1) Ménière disease is characterized by vertigo attacks, lasting 20 minutes to several hours, with concomitant hearing loss, tinnitus, and aural fullness. Aural symptoms become permanent during the course of the disease. (2) Attacks of vestibular migraine may last anywhere from minutes to days. Most patients have a previous history of migraine headaches, and many experience migraine symptoms during the attack. (3) Vertebrobasilar TIAs affect older adults with vascular risk factors. Most attacks last less than 1 hour and are accompanied by other symptoms from the posterior circulation territory. (4) Vestibular paroxysmia is caused by vascular compression of the eighth cranial nerve. It manifests itself with brief attacks of vertigo that recur many times per day, sometimes with concomitant cochlear symptoms. (5) Orthostatic hypotension causes brief episodes of dizziness lasting seconds to a few minutes after standing up and is relieved by sitting or lying down. In older adults, it may be accompanied by supine hypertension. (6) Panic attacks usually last minutes, occur in specific situations, and are accompanied by choking, palpitations, tremor, heat, and anxiety. Less common causes of spontaneous recurrent vertigo and dizziness include perilymph fistula, superior canal dehiscence, autoimmune inner ear disease, otosclerosis, cardiac arrhythmia, and medication side effects. Neurologists need to venture into otolaryngology, internal medicine, and psychiatry to master the differential diagnosis of recurrent dizziness.

  8. Shark Attack Project - Marine Attack at Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Adrianus J

    2005-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  9. Novel Method For Low-Rate Ddos Attack Detection

    Science.gov (United States)

    Chistokhodova, A. A.; Sidorov, I. D.

    2018-05-01

    The relevance of the work is associated with an increasing number of advanced types of DDoS attacks, in particular, low-rate HTTP-flood. Last year, the power and complexity of such attacks increased significantly. The article is devoted to the analysis of DDoS attacks detecting methods and their modifications with the purpose of increasing the accuracy of DDoS attack detection. The article details low-rate attacks features in comparison with conventional DDoS attacks. During the analysis, significant shortcomings of the available method for detecting low-rate DDoS attacks were found. Thus, the result of the study is an informal description of a new method for detecting low-rate denial-of-service attacks. The architecture of the stand for approbation of the method is developed. At the current stage of the study, it is possible to improve the efficiency of an already existing method by using a classifier with memory, as well as additional information.

  10. Heart Attack

    Science.gov (United States)

    ... family history of heart attack race – African Americans, Mexican Americans, Native Americans, and native Hawaiians are at ... Your doctor will prescribe the medicines that are right for you. If you have had a heart ...

  11. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  12. Further attacks on Yeung-Mintzer fragile watermarking scheme

    Science.gov (United States)

    Fridrich, Jessica; Goljan, Miroslav; Memon, Nasir D.

    2000-05-01

    In this paper, we describe new and improved attacks on the authentication scheme previously proposed by Yeung and Mintzer. Previous attacks assumed that the binary watermark logo inserted in an image for the purposes of authentication was known. Here we remove that assumption and show how the scheme is still vulnerable, even if the binary logo is not known but the attacker has access to multiple images that have been watermarked with the same secret key and contain the same (but unknown) logo. We present two attacks. The first attack infers the secret watermark insertion function and the binary logo, given multiple images authenticated with the same key and containing the same logo. We show that a very good approximation to the logo and watermark insertion function can be constructed using as few as two images. With color images, one needs many more images, nevertheless the attack is still feasible. The second attack we present, which we call the 'collage-attack' is a variation of the Holliman-Memon counterfeiting attack. The proposed variation does not require knowledge of the watermark logo and produces counterfeits of superior quality by means of a suitable dithering process that we develop.

  13. Pareto Efficient Solution of Attack-Defence Trees

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as

  14. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  15. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-01-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  16. Genetic attack on neural cryptography

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  17. 78 FR 75306 - Endangered and Threatened Wildlife and Plants; Listing the Lesser Prairie-Chicken as a Threatened...

    Science.gov (United States)

    2013-12-11

    ...; 4500030113] RIN 1018-AY21 Endangered and Threatened Wildlife and Plants; Listing the Lesser Prairie-Chicken... the conservation of the lesser prairie-chicken (Tympanuchus pallidicinctus). In addition, we announce... prairie-chicken as a threatened species under the Act. We also announce the availability of the final...

  18. Attacks on the AJPS Mersenne-based cryptosystem

    NARCIS (Netherlands)

    K. de Boer (Koen); L. Ducas (Léo); S. Jeffery (Stacey); R. M. de Wolf (Ronald)

    2018-01-01

    textabstractAggarwal, Joux, Prakash and Santha recently introduced a new potentially quantum-safe public-key cryptosystem, and suggested that a brute-force attack is essentially optimal against it. They consider but then dismiss both Meet-in-the-Middle attacks and LLL-based attacks. Very soon after

  19. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  20. Robust Detection of Stepping-Stone Attacks

    National Research Council Canada - National Science Library

    He, Ting; Tong, Lang

    2006-01-01

    The detection of encrypted stepping-stone attack is considered. Besides encryption and padding, the attacker is capable of inserting chaff packets and perturbing packet timing and transmission order...

  1. A Framework for Attack-Resilient Industrial Control Systems : Attack Detection and Controller Reconfiguration

    OpenAIRE

    Paridari, Kaveh; O'Mahony, Niamh; Mady, Alie El-Din; Chabukswar, Rohan; Boubekeur, Menouer; Sandberg, Henrik

    2017-01-01

    Most existing industrial control systems (ICSs), such as building energy management systems (EMSs), were installed when potential security threats were only physical. With advances in connectivity, ICSs are now, typically, connected to communications networks and, as a result, can be accessed remotely. This extends the attack surface to include the potential for sophisticated cyber attacks, which can adversely impact ICS operation, resulting in service interruption, equipment damage, safety c...

  2. EEASA 2004 Keynote Address - Environment as Life:The Journey of ...

    African Journals Online (AJOL)

    EEASA 2004 Keynote Address - Environment as Life:The Journey of an ... as a biology teacher in times of political turmoil and change in South Africa. ... threaten not only the quality of human life, but also the capacity of the earth to sustain life.

  3. Reactions to threatening health messages

    OpenAIRE

    ten Hoor, Gill A; Peters, Gjalt-Jorn Y; Kalagi, Janice; de Groot, Lianne; Grootjans, Karlijne; Huschens, Alexander; K?hninger, Constanze; K?lgen, Lizan; Pelssers, Isabelle; Sch?tt, Toby; Thomas, Sophia; Ruiter, Robert AC; Kok, Gerjo

    2012-01-01

    Abstract Background Threatening health messages that focus on severity are popular, but frequently have no effect or even a counterproductive effect on behavior change. This paradox (i.e. wide application despite low effectiveness) may be partly explained by the intuitive appeal of threatening communication: it may be hard to predict the defensive reactions occurring in response to fear appeals. We examine this hypothesis by using two studies by Brown and colleagues, which provide evidence th...

  4. How to Tell Bad News

    Science.gov (United States)

    Long, Nicholas J.

    2012-01-01

    Therapists, physicians, police officers, and emergency staff often are the messengers of bad news. They have to tell a patient, a parent, or a loved one about a death, an accident, a school shooting, a life-threatening diagnosis, a terrorist attack, or a suicide. Usually the messenger bears a heavy responsibility but has little training and seeks…

  5. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  6. Countermeasures for unintentional and intentional video watermarking attacks

    Science.gov (United States)

    Deguillaume, Frederic; Csurka, Gabriela; Pun, Thierry

    2000-05-01

    These last years, the rapidly growing digital multimedia market has revealed an urgent need for effective copyright protection mechanisms. Therefore, digital audio, image and video watermarking has recently become a very active area of research, as a solution to this problem. Many important issues have been pointed out, one of them being the robustness to non-intentional and intentional attacks. This paper studies some attacks and proposes countermeasures applied to videos. General attacks are lossy copying/transcoding such as MPEG compression and digital/analog (D/A) conversion, changes of frame-rate, changes of display format, and geometrical distortions. More specific attacks are sequence edition, and statistical attacks such as averaging or collusion. Averaging attack consists of averaging locally consecutive frames to cancel the watermark. This attack works well for schemes which embed random independent marks into frames. In the collusion attack the watermark is estimated from single frames (based on image denoising), and averaged over different scenes for better accuracy. The estimated watermark is then subtracted from each frame. Collusion requires that the same mark is embedded into all frames. The proposed countermeasures first ensures robustness to general attacks by spread spectrum encoding in the frequency domain and by the use of an additional template. Secondly, a Bayesian criterion, evaluating the probability of a correctly decoded watermark, is used for rejection of outliers, and to implement an algorithm against statistical attacks. The idea is to embed randomly chosen marks among a finite set of marks, into subsequences of videos which are long enough to resist averaging attacks, but short enough to avoid collusion attacks. The Bayesian criterion is needed to select the correct mark at the decoding step. Finally, the paper presents experimental results showing the robustness of the proposed method.

  7. Link-layer Jamming Attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    2004-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  8. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  9. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example, after the launch of a DDOS (Distributed Denial of Service) attack, zombie computers may still connect to the target...-scrap- value-of-a-hacked-pc-revisited/ . Lancor, L., & Workman, R. (2007). Using Google Hacking to Enhance Defense Strategies. ACM SIGCSE Bulletin, 39 (1), 491-495. Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed Denial of Service...

  10. Unified communications forensics anatomy of common UC attacks

    CERN Document Server

    Grant, Nicholas Mr

    2013-01-01

    Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures

  11. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  12. Parenting under pressure: a grounded theory of parenting young children with life-threatening congenital heart disease.

    Science.gov (United States)

    Rempel, Gwen R; Ravindran, Vinitha; Rogers, Laura G; Magill-Evans, Joyce

    2013-03-01

    To report a grounded theory study to describe the process of parenting young children who have survived hypoplastic left heart syndrome to inform parent-focused interventions. Technological advances in paediatric cardiology worldwide have improved the survival rates for young children with hypoplastic left heart syndrome who undergo staged surgical palliation. These children, however, are at risk for life-threatening complications and parents are charged with the responsibility to monitor their children at home with minimal support and guidance from healthcare professionals once home. A constructivist grounded theory study. The study was conducted in 2006-2008. Participants were 25 parents (15 mothers, 10 fathers) and 28 grandparents (17 grandmothers, 11 grandfathers) of 15 young children (6 months-4·5 years) who had undergone the Sano surgical approach for hypoplastic left heart syndrome. The 53 interviews were digitally recorded, transcribed and analysed using open and focused coding, constant comparative analysis and memoing. A process of Parenting under Pressure emerged that was characterized by four overlapping and re-emerging phases: (1) realizing and adjusting to the inconceivable; (2) growing increasingly attached; (3) watching for and accommodating the unexpected; and (4) encountering new challenges. In-depth understanding of the phases of Parenting under Pressure provides direction for nurses to support parents of children who survive hypoplastic left heart syndrome. Interventions that help carers of children with complex health conditions move through the phases of our Parenting under Pressure process may help them safeguard the survival of their children, and their own survival as parents as they manage multiple demands. © 2012 Blackwell Publishing Ltd.

  13. Neonatal severe hyperparathyroidism caused by homozygous mutation in CASR: A rare cause of life-threatening hypercalcemia.

    Science.gov (United States)

    Murphy, Heidi; Patrick, Jessica; Báez-Irizarry, Eileen; Lacassie, Yves; Gómez, Ricardo; Vargas, Alfonso; Barkemeyer, Brian; Kanotra, Sohit; Zambrano, Regina M

    2016-04-01

    Neonatal severe hyperparathyroidism (NSHPT) is a rare, life-threatening condition that presents with severe hypercalcemia, hyperparathyroidism, and osteopenia in the newborn period. Treatment of NSHPT traditionally includes hydration and bisphosphonates; however newer calcimimetic agents, such as cinacalcet, are now being utilized to prevent or delay parathyroidectomy which is technically difficult in the newborn. Medical treatment success is related to calcium sensing receptor (CaSR) genotype. We report a 4-day-old infant who presented with hyperbilirubinemia, poor feeding, weight loss, severe hypotonia and was ultimately diagnosed with NSHPT. The patient's total serum calcium level of 36.8 mg/dL (reference range: 8.5-10.4 mg/dL) is, to our knowledge, the highest ever documented in this setting. Exome data previously obtained on the infant's parents was re-analyzed demonstrating bi-parental heterozygosity for a mutation of the CASR gene: c.206G > A, and Sanger sequencing data confirmed the patient was a homozygote for the same mutation. Though a patient with the same CaSR gene mutation described here has responded to cinacalcet, our patient did not respond and required parathyroidectomy. Though this case has previously been published as a surgical case report, a full report of the medical management and underlying genetic etiology is warranted; this case underscores the importance of disclosing bi-parental heterozygosity for a gene causing severe neonatal disease particularly when treatment is available and illustrates the need for further in vitro studies of this CaSR mutation. Copyright © 2016 Elsevier Masson SAS. All rights reserved.

  14. Classifying network attack scenarios using an ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-03-01

    Full Text Available ) or to the target?s reputation. The Residue sub-phase refers to damage or artefacts of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example after the launch of a DDOS..., A. (1995). Hacking theft of $10 million from citibank revealed. Retrieved 10/10, 2011, from http://articles.latimes.com/1995-08-19/business/fi-36656_1_citibank-system Hurley, E. (2004). SCO site succumbs to DDoS attack. Retrieved 10/10, 2011, from...

  15. Modelling Social-Technical Attacks with Timed Automata

    DEFF Research Database (Denmark)

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof

    2015-01-01

    . In this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible attacks...... in our model and perform analysis and simulation of both model and attack, revealing details about the specific interaction between attacker and victim. Using timed automata also allows for intuitive modelling of systems, in which quantities like time and cost can be easily added and analysed....

  16. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack...... which guarantee or optimise some quantitative property, such as the probability of a successful attack, the expected cost incurred, or some multi-objective trade-off between the two. We implement our approach, building upon the PRISM-games model checker, and apply it to a case study of an RFID goods...

  17. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  18. Threatening faces and social anxiety: A literature review

    DEFF Research Database (Denmark)

    Staugaard, Søren Risløv

    2010-01-01

    A threatening facial expression is a potent social sign of hostility or dominance. During the past 20 years, photographs of threatening faces have been increasingly included as stimuli in studies with socially anxious participants, based on the hypothesis that a threatening face is especially...... salient to people with fears of social interaction or negative evaluation. The purpose of this literature review is to systematically evaluate the accumulated research and suggest possible avenues for further research. The main conclusion is that photographs of threatening faces engage a broad range...... of perceptual processes in socially anxious participants, particularly when exposure times are very short...

  19. Anti-discrimination Analysis Using Privacy Attack Strategies

    KAUST Repository

    Ruggieri, Salvatore

    2014-09-15

    Social discrimination discovery from data is an important task to identify illegal and unethical discriminatory patterns towards protected-by-law groups, e.g., ethnic minorities. We deploy privacy attack strategies as tools for discrimination discovery under hard assumptions which have rarely tackled in the literature: indirect discrimination discovery, privacy-aware discrimination discovery, and discrimination data recovery. The intuition comes from the intriguing parallel between the role of the anti-discrimination authority in the three scenarios above and the role of an attacker in private data publishing. We design strategies and algorithms inspired/based on Frèchet bounds attacks, attribute inference attacks, and minimality attacks to the purpose of unveiling hidden discriminatory practices. Experimental results show that they can be effective tools in the hands of anti-discrimination authorities.

  20. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  1. Simulation of Attacks for Security in Wireless Sensor Network.

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-11-18

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  2. Simulation of Attacks for Security in Wireless Sensor Network

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-01-01

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node’s software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work. PMID:27869710

  3. Facial disfigurement stigma: a study of victims of domestic assaults with fire in India.

    Science.gov (United States)

    Furr, L Allen

    2014-07-01

    In India, the incidence of fire attacks on women has risen dramatically. Although studies and media accounts describe how and why these attacks occur, no research has investigated the lives of survivors. Qualitative analysis of the texts of two focus groups of women scarred by domestic attacks by fire reveals that these women are heavily stigmatized. Using Yang et al.'s theory that stigma is a response to perceived threats to values of everyday life and feminist theory as guides, the study identified two patterns of moral threat related to disfigurement: (a) Disfigurement challenges values and practices of women's family roles, and (b) disfigurement threatens normative religious sensibilities. © The Author(s) 2014.

  4. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  5. Life-threatening bleeding and radiologic intervention after aesthetic surgeries with minimal invasive approaches: report of two cases.

    Science.gov (United States)

    Kim, Youn-Hwan; Kim, Jong-Do; Visconti, Giuseppe; Kim, Jeong-Tae

    2010-10-01

    In this article, the authors report two cases of life-threatening bleeding after cosmetic surgeries that have been successfully treated with radiologic intervention. A 25-year-old female and a 35-year-old female presented at their institutions because of postoperative bleeding after intraoral mandibular angle ostectomy and endoscopic-guided trans-axillary breast augmentation, respectively. A ruptured traumatic pseudo-aneurysm of the right superficial temporal artery was diagnosed in the first case and a haematoma posterior to the right pectoralis major, due to active bleeding from a perforator of internal mammary artery, in the second case. Attempts were made to stop the haemorrhage using standard methods, but failed. Therefore, superselective microcatheter angioembolisation has been successfully performed in both the cases. At 22-month follow-up for the first case and at 12-month follow-up for the second case, the patients are asymptomatic and the cosmetic outcomes are being preserved. With radiologic intervention, the authors gained satisfactory results in the above-mentioned situations. Using this, with only local anaesthesia and the absence of incisions, a precise approach with immediate treatment to the haemorrhaging site is possible. This can be an excellent solution for arterial bleeding that is difficult to access anatomically after aesthetic surgeries, and in selected cases. Furthermore, this procedure is less disfiguring and preserves the aesthetic surgery outcomes. Copyright 2010 British Association of Plastic, Reconstructive and Aesthetic Surgeons. Published by Elsevier Ltd. All rights reserved.

  6. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... of this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter ... most common heart attack symptom in men and women is chest pain or discomfort. However, women also ...

  7. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Ahmed, Z.; Nazir, B.; Zafar, M.F.; Anwar, M.M.; Azam, K.; Asar, A.U.

    2007-01-01

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  8. Adaptive optimisation-offline cyber attack on remote state estimator

    Science.gov (United States)

    Huang, Xin; Dong, Jiuxiang

    2017-10-01

    Security issues of cyber-physical systems have received increasing attentions in recent years. In this paper, deception attacks on the remote state estimator equipped with the chi-squared failure detector are considered, and it is assumed that the attacker can monitor and modify all the sensor data. A novel adaptive optimisation-offline cyber attack strategy is proposed, where using the current and previous sensor data, the attack can yield the largest estimation error covariance while ensuring to be undetected by the chi-squared monitor. From the attacker's perspective, the attack is better than the existing linear deception attacks to degrade the system performance. Finally, some numerical examples are provided to demonstrate theoretical results.

  9. Cyber-physical attacks a growing invisible threat

    CERN Document Server

    Loukas, George

    2015-01-01

    Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road,  or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral

  10. Disrupted Refugee Family Life

    DEFF Research Database (Denmark)

    Shapiro, Ditte Krogh

    2017-01-01

    Fleeing civil war involves managing life threatening events and multiple disruptions of everyday life. The theoretical potentials of analysing the recreation of everyday family life among Syrian refugees in Denmark is explored based on conceptualizations that emphasize the collective agency...... of family members in social historical contexts. Studying the multiple perspectives of family members shows how social support conceptualized as care practises is conflictual in the changing everyday family practices that are transformed by policy. The purpose of studying how families manage to flee civil...... war and struggle to recreate an everyday life in exile is to contribute with contextualization and expansion of mainstream understandings of family life, suffering, and resilience in refugee family trajectories in multiple contexts....

  11. Life-threatening ventricular tachyarrhythmias in the cardiology department: Implications for appropriate prescription of telemetry monitoring.

    Science.gov (United States)

    Zorzi, Alessandro; Peruzza, Francesco; Stella, Federica; Del Monte, Alvise; Migliore, Federico; Gasparetto, Nicola; Badano, Luigi; Iliceto, Sabino; Corrado, Domenico

    2016-04-01

    in-hospital life-threatening ventricular arrhythmias (LT-VA) may complicate the course of cardiovascular patients. We aimed to assess the incidence, circumstances, determinants, and outcome of in-hospital LT-VA in order to help clinicians in prescribing appropriate levels of monitoring. the study population consisted of all 10,741 consecutive patients (65 ± 15 years, 67.7% males) admitted to a cardiology department in 2009-2014. Terminally ill patients and those with primary arrhythmia diagnosis were excluded. The composite end-point included sudden arrhythmic death, ventricular fibrillation, unstable ventricular tachycardia and appropriate ICD shock unrelated to invasive interventions. the incidence of LT-VA was 0.6%, with no differences regarding age, gender and primary diagnosis of coronary artery disease between patients with and without LT-VA. The incidence of LT-VA was significantly higher (1.2% versus 0.1%, p<0.001) among urgent compared with elective admissions and among patients with left ventricular ejection fraction (LV-EF) <45% (1.7% versus 0.2%, p<0.001). At multivariable analysis, urgent admission and LV-EF <45%, but not primary diagnosis of coronary artery disease, remained independent predictors of LT-VA. At the time of the event, 97.1% fulfilled either class I or class II indications for telemetry monitoring according to the American Heart Association guidelines. Survival to discharge with good neurological status was 70.6%. acutely ill patients with heart failure and LV systolic dysfunction showed the highest rate of LT-VAs, regardless of the underlying cardiac disease (ischemic or non-ischemic). Current guidelines demonstrated high sensitivity in identifying patients at risk. These findings may favor proper utilization of telemetry monitoring resources. Copyright © 2016. Published by Elsevier Ireland Ltd.

  12. Psychological adaptation to life-threatening injury in dyads: the role of dysfunctional disclosure of trauma

    Directory of Open Access Journals (Sweden)

    Laura Pielmaier

    2011-12-01

    Full Text Available Certain modes of trauma disclosure have been found to be associated with more severe symptoms of posttraumatic stress (PTS in different trauma populations: the reluctance to disclose trauma-related thoughts and feelings, a strong urge to talk about it, and physical as well as emotional reactions during disclosure. Although social-contextual influences gain more and more interest in trauma research, no study has yet investigated these “dysfunctional disclosure tendencies” and their association with PTS from an interpersonal perspective.(1 To replicate previous findings on dysfunctional disclosure tendencies in patients with life-threatening injury and their significant others and (2 to study interpersonal associations between dysfunctional disclosure style and PTS at a dyadic level.PTS symptom severity and self-reports on dysfunctional disclosure tendencies were assessed in N=70 dyads comprising one individual with severe traumatic brain injury and a significant other (“proxy” 3 months after injury.Regression analyses predicting PTS symptom severity revealed dysfunctional disclosure tendencies to have incremental validity above and beyond sex, age, and trauma severity within the individual (both patient and proxy, with moderate effect sizes. The interaction between patient's and proxy's disclosure style explained additional portions of the variance in patients’ PTS symptom severity.Findings suggest that dysfunctional disclosure tendencies are related to poorer psychological adaptation to severe traumatic brain injury. This intrapersonal association may be exacerbated by dysfunctional disclosure tendencies on the part of a significant other. Although the results require replication in other trauma samples without brain injury to further generalize the findings beyond the observed population, the study contributes to the expanding literature on the crucial role of interpersonal relationships in trauma recovery.For the abstract or full

  13. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  14. A fatal elephant attack.

    Science.gov (United States)

    Hejna, Petr; Zátopková, Lenka; Safr, Miroslav

    2012-01-01

    A rare case of an elephant attack is presented. A 44-year-old man working as an elephant keeper was attacked by a cow elephant when he tripped over a foot chain while the animal was being medically treated. The man fell down and was consequently repeatedly attacked with elephant tusks. The man sustained multiple stab injuries to both groin regions, a penetrating injury to the abdominal wall with traumatic prolapse of the loops of the small bowel, multiple defects of the mesentery, and incomplete laceration of the abdominal aorta with massive bleeding into the abdominal cavity. In addition to the penetrating injuries, the man sustained multiple rib fractures with contusion of both lungs and laceration of the right lobe of the liver, and comminuted fractures of the pelvic arch and left femoral body. The man died shortly after he had been received at the hospital. The cause of death was attributed to traumatic shock. © 2011 American Academy of Forensic Sciences.

  15. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  16. False Positive and False Negative Effects on Network Attacks

    Science.gov (United States)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  17. Machine Learning Methods for Attack Detection in the Smart Grid.

    Science.gov (United States)

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  18. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  19. Panhypopituitarism presenting as life-threatening heart failure caused by an inherited microdeletion in 1q25 including LHX4.

    Science.gov (United States)

    Filges, Isabel; Bischof-Renner, Andrea; Röthlisberger, Benno; Potthoff, Christian; Glanzmann, René; Günthard, Joëlle; Schneider, Jacques; Huber, Andreas R; Zumsteg, Urs; Miny, Peter; Szinnai, Gabor

    2012-02-01

    Clinical presentation of hypopituitarism in the neonate may be variable, ranging from absent to severe nonspecific symptoms and may be life-threatening in patients with adrenocorticotropic hormone deficiency. The LIM homeobox gene 4 (LHX4) transcription factor regulates early embryonic development of the anterior pituitary gland. Autosomal dominant mutations in LHX4 cause congenital hypopituitarism with variable combined pituitary hormone deficiency (CPHD). We report on a neonate with unexplained heart failure and minor physical anomalies, suggesting a midline defect. She was diagnosed with complete CPHD. Cardiac function was rescued by replacement with hydrocortisone and thyroxine; hypoglycaemia stopped under growth hormone therapy. Magnetic resonance imaging revealed a dysgenetic pituitary gland suggesting an early developmental defect. Array comparative genomic hybridization showed a maternally inherited 1.5-megabase microdeletion in 1q25.2q25.3, including the LHX4 gene. Haploinsufficiency of LHX4 likely explains the predominant pituitary phenotype in the proposita and we suggest variable intrafamilial penetrance of the inherited microdeletion. To the best of our knowledge, we are the first to report on heart failure as a rare nonspecific symptom of treatable CPHD in the newborn. Variably penetrant pituitary insufficiency, including this severe and atypical presentation, can be correlated with LHX4 insufficiency and highlights the role of LHX4 for pituitary development.

  20. How a modern business could respond to the phishing attack challenges

    OpenAIRE

    Đekić Milica D.

    2017-01-01

    The majority of public and private enterprises as well as the entire society are getting dependable on cyber technologies. As it's known - cyber would deal with computers, internet and mobile devices being used through our everyday life's and work's activities. Many experts would agree that this new technological tendency would bring us many advantages as well as the real nightmares in sense of our safety and security. One of the well-known hacking attacks being applied in a business environm...

  1. Application distribution model and related security attacks in VANET

    Science.gov (United States)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  2. Subclinical endophthalmitis following a rooster attack.

    Science.gov (United States)

    Lekse Kovach, Jaclyn; Maguluri, Srilakshmi; Recchia, Franco M

    2006-12-01

    Ocular injury resulting from rooster attacks is rarely reported in the literature. Sadly, the target of these attacks is most often children younger than 3 years old, whose naiveté of the aggressive, territorial behavior of birds can place them at risk. Acute sequelae of these attacks can result in a lifetime of visual impairment. The possibility of a subacute or occult infection is an unusual occurrence that must always be considered. In an effort to prevent future attacks and ocular casualties, we present a case of a 12-month-old boy who suffered an open globe following a rooster attack. The open globe was emergently repaired. One week later, a white cataract was noticed on examination in the absence of systemic or ocular signs of inflammation. Traumatic endophthalmitis and lenticular abscess were suspected during examination under anesthesia. Vitrectomy, lensectomy, and injection of intravitreal antibiotics were performed. Culture of lenticular and vitreous aspirates grew alpha-streptococcus. Alpha-streptococcal endophthalmitis can result from ocular injuries caused by rooster pecking. The infection may present insidiously and without typical ocular or systemic symptoms or signs. Management is challenging and may require surgery.

  3. Robustness analysis of interdependent networks under multiple-attacking strategies

    Science.gov (United States)

    Gao, Yan-Li; Chen, Shi-Ming; Nie, Sen; Ma, Fei; Guan, Jun-Jie

    2018-04-01

    The robustness of complex networks under attacks largely depends on the structure of a network and the nature of the attacks. Previous research on interdependent networks has focused on two types of initial attack: random attack and degree-based targeted attack. In this paper, a deliberate attack function is proposed, where six kinds of deliberate attacking strategies can be derived by adjusting the tunable parameters. Moreover, the robustness of four types of interdependent networks (BA-BA, ER-ER, BA-ER and ER-BA) with different coupling modes (random, positive and negative correlation) is evaluated under different attacking strategies. Interesting conclusions could be obtained. It can be found that the positive coupling mode can make the vulnerability of the interdependent network to be absolutely dependent on the most vulnerable sub-network under deliberate attacks, whereas random and negative coupling modes make the vulnerability of interdependent network to be mainly dependent on the being attacked sub-network. The robustness of interdependent network will be enhanced with the degree-degree correlation coefficient varying from positive to negative. Therefore, The negative coupling mode is relatively more optimal than others, which can substantially improve the robustness of the ER-ER network and ER-BA network. In terms of the attacking strategies on interdependent networks, the degree information of node is more valuable than the betweenness. In addition, we found a more efficient attacking strategy for each coupled interdependent network and proposed the corresponding protection strategy for suppressing cascading failure. Our results can be very useful for safety design and protection of interdependent networks.

  4. Optimizing power system investments and resilience against attacks

    International Nuclear Information System (INIS)

    Fang, Yiping; Sansavini, Giovanni

    2017-01-01

    This paper studies the combination of capacity expansion and switch installation in electric systems that ensures optimum performance under nominal operations and attacks. The planner–attacker–defender model is adopted to develop decisions that minimize investment and operating costs, and functionality loss after attacks. The model bridges long-term system planning for transmission expansion and short-term switching operations in reaction to attacks. The mixed-integer optimization is solved by decomposition via two-layer cutting plane algorithm. Numerical results on an IEEE system shows that small investments in transmission line switching enhance resilience by responding to disruptions via system reconfiguration. Sensitivity analyses show that transmission planning under the assumption of small-scale attacks provides the most robust strategy, i.e. the minimum-regret planning, if many constraints and limited investment budget affect the planning. On the other hand, the assumption of large-scale attacks provides the most robust strategy if the planning process involves large flexibility and budget. - Highlights: • Investment optimization in power systems under attacks is presented. • Capacity expansion and switch installation for system reconfiguration are combined. • The problem is solved by decomposition via two-layer cutting plane algorithm. • Small investments in switch installation enhance resilience by response to attacks. • Sensitivity analyses identify robust planning against different attack scenarios.

  5. Peacetime Use of Computer Network Attack

    National Research Council Canada - National Science Library

    Busby, Daniel

    2000-01-01

    .... PDD-63 alerts the nation to prepare for impending cyber attacks. This paper examines the nature, scale, and likelihood of cyber attacks posited in PDD-63 and finds that the country does not face an imminent "electronic Pearl Harbor...

  6. Teachers Communicating about Life-Limiting Conditions, Death and Bereavement

    Science.gov (United States)

    Robinson, Sally; Ekins, Alison; Durrant, Ian; Summers, Kathryn

    2018-01-01

    The number of children with life-limiting or life-threatening conditions in England is double what it was at the millennium. These conditions include cystic fibrosis, cancer, organ failure and severe neurological injuries. The Teaching for Life project aimed to explore the needs of teachers working in English schools in relation to working with…

  7. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  8. Attacks on IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Dejan Milan Tepšić

    2013-06-01

    Full Text Available Security of wireless computer networks was initially secured with the WEP security protocol, which relies on the RC4 encryption algorithm and the CRC algorithm to check the integrity. The basic problems of the WEP are a short initialization vector, unsafe data integrity checking, using a common key, the lack of mechanisms for management and exchange of keys, the lack of protection from the endless insertion of the same package into the network, the lack of authentication of access points and the like. The consequences of these failures are easy attacks against the WEP network, namely their complete insecurity. Therefore, the work began on the IEEE 802.11i protocol, which should radically improve the security of wireless networks. Since the development of a protocol lasted, the WPA standard was released to offset the security gap caused by the WEP. The WPA also relies on RC4 and CRC algorithms, but brings temporary keys and the MIC algorithm for data integrity. The 802.1X authentication was introduced and common keys are no longer needed, since it is possible to use an authentication server. The length of the initialization vector was increased and the vector is obtained based on the packet serial number, in order to prevent the insertion of the same packet into the network. The weakness of the WPA security mechanism is the use of a common key. WPA2 (802.11i later appeared. Unlike the WPA mechanism that worked on old devices with the replacement of software, WPA2 requires new network devices that can perform AES encryption. AES replaces the RC4 algorithm and delivers much greater security. Data integrity is protected by encryption. Despite progress, there are still weaknesses in wireless networks. Attacks for denial of service are possible as well as spoofing package headers attacks. For now, it is not advisable to use wireless networks in environments where unreliability and unavailability are not tolerated. Introduction In the entire history of

  9. Temporal Cyber Attack Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  10. Biology and Life History of Balcha indica, an Ectoparasitoid Attacking the Emerald Ash Borer, Agrilus planipennis, in North America

    Science.gov (United States)

    Duan, Jian J.; Taylor, Philip B.; Fuester, Roger W.

    2011-01-01

    Balcha indica Mani and Kaul (Hymenoptera: Eupelmidae) is a solitary ectoparasitoid attacking larvae, prepupae, and pupae of the emerald ash borer, Agrilus planipennis Fairmaire (Hymenoptera: Eupelmidae). Its fecundity, oviposition rate, longevity, and development time were determined in the laboratory under standard rearing conditions (25 ± 2° C, 65 ± 10% relative humidity, and 14:10 L:D). Adults lived a mean of 59 days with a maximum of 117 days. Lifetime adult fecundity averaged 36 eggs with a maximum 94 eggs per female. The egg stage lasted for a maximum of four days with ∼ 50% eggs hatched within two days. The development time of the first instars lasted for a maximum of nine days; 50% of the first instars completed their development (i.e., molted to the next instar) within five days. Instars of the intermediate and final stage larvae (after molting of the first instars occurred) could not be distinguished until they reached the pupal stage, and 50% of those larvae pupated ∼ 62 days after adult oviposition. Under the standard rearing conditions, 50% of B. indica took ∼ 83 days to complete the life cycle (from egg to adult emergence) ranging from 47 to 129 days. These results suggest that B. indica may not have more than two generations in the mid-Atlantic and Midwest regions of United States, where normal growing seasons—with average temperature above 25° C—are normally less than six months (May–October). Because of the long life span and oviposition period of adults, however, B. indica is likely to have overlapping generations. PMID:22233385

  11. 12 CFR 263.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  12. 12 CFR 509.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding....17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  13. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  14. Vulnerability Assessment by Learning Attack Specifications in Graphs

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Lopes, Raul H.C.

    This paper presents an evolutionary approach for learning attack specifications that describe attack scenarios. The objective is to find vulnerabilities in computer networks which minimise the cost of an attack with maximum impact. Although we focus on Insider Threat, the proposed approach applies

  15. Radiation therapy for life-threatening huge laryngeal hemangioma involving pharynx and parapharyngeal space.

    Science.gov (United States)

    Huang, Chun-Ming; Lee, Ka-Wo; Huang, Chih-Jen

    2013-04-01

    Adult hemangiomas are rare, slowly progressing vascular tumors. Potential complications include laryngeal involvement or massive tumor burden. A case of recurrent, bulky laryngeal hemangioma involving the parapharyngeal space is presented herein. The clinical course and treatment are described, and a series of MRI studies are compared to demonstrate the treatment response. A 35-year-old woman presented with progressive hoarseness, neck fullness, and intermittent dyspnea caused by a bulky laryngeal hemangioma. Steroid therapy had a limited response. Radiation therapy with a total dose of 40 Gray (Gy) in 20 fractions successfully relieved her symptoms. Image studies after therapy revealed moderate tumor regression. The patient showed no serious complications during the next 2 years of follow-up. Radiation therapy may be effective in intractable and function-threatening laryngeal hemangiomas. Copyright © 2012 Wiley Periodicals, Inc.

  16. Attack Tree Generation by Policy Invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identi﬿cation. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identi﬿ed

  17. Neural network classifier of attacks in IP telephony

    Science.gov (United States)

    Safarik, Jakub; Voznak, Miroslav; Mehic, Miralem; Partila, Pavol; Mikulec, Martin

    2014-05-01

    Various types of monitoring mechanism allow us to detect and monitor behavior of attackers in VoIP networks. Analysis of detected malicious traffic is crucial for further investigation and hardening the network. This analysis is typically based on statistical methods and the article brings a solution based on neural network. The proposed algorithm is used as a classifier of attacks in a distributed monitoring network of independent honeypot probes. Information about attacks on these honeypots is collected on a centralized server and then classified. This classification is based on different mechanisms. One of them is based on the multilayer perceptron neural network. The article describes inner structure of used neural network and also information about implementation of this network. The learning set for this neural network is based on real attack data collected from IP telephony honeypot called Dionaea. We prepare the learning set from real attack data after collecting, cleaning and aggregation of this information. After proper learning is the neural network capable to classify 6 types of most commonly used VoIP attacks. Using neural network classifier brings more accurate attack classification in a distributed system of honeypots. With this approach is possible to detect malicious behavior in a different part of networks, which are logically or geographically divided and use the information from one network to harden security in other networks. Centralized server for distributed set of nodes serves not only as a collector and classifier of attack data, but also as a mechanism for generating a precaution steps against attacks.

  18. PROTECTION WORKS AGAINST WAVE ATTACKS IN THE HAOR AREAS OF BANGLADESH: ANALYSIS OF SUSTAINABILITY

    Directory of Open Access Journals (Sweden)

    M.K. Alam

    2010-12-01

    Full Text Available Haor is the local name of the saucer-shaped, naturally depressed areas of Bangladesh. There are 414 haors in the northeast region that comprise approximately 17% of the country. These areas are submerged under deep water from July to November due to the overflow of rivers and heavy rainfall, causing them to appear like seas with erosive waves. Recently, the wave attack has drastically increased because of de-plantation and changing cropping patterns to allow for more agricultural production. The local people, government and Non-Government Organisations (NGOs have tried many techniques to protect life and property against wave attacks. A cost comparison shows that Cement Concrete (CC blocks over geotextile on the slope embankment is a cost-effective, environment friendly and socially acceptable method to prevent loss of life and property. However, the design rules employed by the engineers are faulty because there is knowledge gap in the application of wave hydraulics among these professionals. As a result, damage frequently occurs and maintenance costs are increasing. This study explores the sustainability of the CC blocks used in the Haor areas by evaluating two case studies with the verification of available design rules.

  19. SCADA system vulnerabilities to cyber attack

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, W. T. [Cyber Security Consulting (Canada)

    2004-10-01

    The susceptibility to terrorist attacks of computer-based supervisory control (SCADA) systems that are used to monitor and control water distribution systems, oil and gas pipelines and the electrical grid, is discussed. The discussion includes ways in which SCADA systems may be attacked and remedial actions that may be taken to reduce or eliminate the possibility of such attacks. Attacks may take the form of causing the system to generate false data to divert attention from impending system disasters, or commandeer the system to seriously disable it, or cause damage to the process or equipment being controlled by sending improper control commands. SCADA systems are also vulnerable to internal threats, either from an accidental action that results in damage, or an intentional action, as for example by a disgruntled employee, or ex-employee, usually by way of reprogramming an RTU or PLC by accessing the polling/communications circuit. Recent SCADA systems are much more susceptible to concerted cyber attacks because of the adoption of IT technologies and standards into the design of such systems. (Older systems are more likely to be unique designs, hence less susceptible to attack). As far as protection of SCADA systems is concerned, there are no technologies that would prevent a technologically sophisticated terrorist or disgruntled employee from doing major damage to the system, however, the IT world has developed a range of technologies for the protection of IT assets, and many of these same technologies can also be used to safeguard modern SCADA systems.

  20. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  1. Transarterial endovascular treatment in the management of life-threatening carotid blowout syndrome in head and neck cancer patients: review of the literature.

    Science.gov (United States)

    Dequanter, D; Shahla, M; Paulus, P; Aubert, C; Lothaire, P

    2013-12-01

    Carotid blowout syndrome is a rare but devastating complication in patients with head and neck malignancy, and is associated with high morbidity and mortality. Bleeding from the carotid artery or its branches is a well-recognized complication following treatment or recurrence of head and neck cancer. It is an emergency situation, and the classical approach to save the patient's life is to ligate the carotid artery. But the surgical treatment is often technically difficult. Endovascular therapies were recently reported as good alternatives to surgical ligation. Retrospective review of three cases of acute or threatened carotid hemorrhage managed by endovascular therapies. Two patients presented with acute carotid blowout, and one patient with a sentinel bleed. Two patients had previously been treated with surgery and chemo radiation. One patient was treated by chemo radiation. Two had developed pharyngocutaneous fistulas, and one had an open necrosis filled wound that surrounded the carotid artery. In two patients, stent placement resolved the acute hemorrhage. In one patient, superselective embolization was done. Mean duration follow-up was 10.2 months. No patient had residual sequelae of stenting or embolization. Management of carotid blow syndrome is very critical and difficult. A multidisciplinary approach is very important in the management of carotid blow syndrome. Correct and suitable management can be life saving. An endovascular technique is a good and effective alternative with much lower morbidity rates than surgical repair or ligation. Copyright © 2013 Elsevier Masson SAS. All rights reserved.

  2. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    Energy Technology Data Exchange (ETDEWEB)

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills, and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between

  3. Limit Asthma Attacks Caused by Colds or Flu

    Science.gov (United States)

    Asthma: Limit asthma attacks caused by colds or flu A cold or the flu can trigger an asthma attack. Here's why — and how to keep your sneeze ... plan. If you notice warning signs of an asthma attack — such as coughing, wheezing, chest tightness or shortness ...

  4. Quantitative Attack Tree Analysis via Priced Timed Automata

    NARCIS (Netherlands)

    Kumar, Rajesh; Ruijters, Enno Jozef Johannes; Stoelinga, Mariëlle Ida Antoinette; Sankaranarayanan, Sriram; Vicario, Enrico

    The success of a security attack crucially depends on the resources available to an attacker: time, budget, skill level, and risk appetite. Insight in these dependencies and the most vulnerable system parts is key to providing effective counter measures. This paper considers attack trees, one of the

  5. Finite Energy and Bounded Actuator Attacks on Cyber-Physical Systems

    Energy Technology Data Exchange (ETDEWEB)

    Djouadi, Seddik M [ORNL; Melin, Alexander M [ORNL; Ferragut, Erik M [ORNL; Laska, Jason A [ORNL; Dong, Jin [ORNL; Drira, Anis [ORNL

    2015-01-01

    As control system networks are being connected to enterprise level networks for remote monitoring, operation, and system-wide performance optimization, these same connections are providing vulnerabilities that can be exploited by malicious actors for attack, financial gain, and theft of intellectual property. Much effort in cyber-physical system (CPS) protection has focused on protecting the borders of the system through traditional information security techniques. Less effort has been applied to the protection of cyber-physical systems from intelligent attacks launched after an attacker has defeated the information security protections to gain access to the control system. In this paper, attacks on actuator signals are analyzed from a system theoretic context. The threat surface is classified into finite energy and bounded attacks. These two broad classes encompass a large range of potential attacks. The effect of theses attacks on a linear quadratic (LQ) control are analyzed, and the optimal actuator attacks for both finite and infinite horizon LQ control are derived, therefore the worst case attack signals are obtained. The closed-loop system under the optimal attack signals is given and a numerical example illustrating the effect of an optimal bounded attack is provided.

  6. Modeling attacker-defender interactions in information networks.

    Energy Technology Data Exchange (ETDEWEB)

    Collins, Michael Joseph

    2010-09-01

    The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in isolation from one another: an attacker seeks to penetrate or disrupt a system that has been protected to a given level, while a defender attempts to thwart particular attacks. Such a model also views all non-malicious parties as having the same goal of preventing all attacks. But in fact, attackers and defenders are interacting parts of the same system, and different defenders have their own individual interests: defenders may be willing to accept some risk of successful attack if the cost of defense is too high. We have used game theory to develop models of how non-cooperative but non-malicious players in a network interact when there is a substantial cost associated with effective defensive measures. Although game theory has been applied in this area before, we have introduced some novel aspects of player behavior in our work, including: (1) A model of how players attempt to avoid the costs of defense and force others to assume these costs; (2) A model of how players interact when the cost of defending one node can be shared by other nodes; and (3) A model of the incentives for a defender to choose less expensive, but less effective, defensive actions.

  7. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered...... the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure...

  8. Home and Clinical Cardiovascular Care Center (H4C): a Framework for Integrating Body Sensor Networks and QTRU Cryptography System.

    Science.gov (United States)

    Zakerolhosseini, Ali; Sokouti, Massoud; Pezeshkian, Massoud

    2013-01-01

    Quick responds to heart attack patients before arriving to hospital is a very important factor. In this paper, a combined model of Body Sensor Network and Personal Digital Access using QTRU cipher algorithm in Wifi networks is presented to efficiently overcome these life threatening attacks. The algorithm for optimizing the routing paths between sensor nodes and an algorithm for reducing the power consumption are also applied for achieving the best performance by this model. This system is consumes low power and has encrypting and decrypting processes. It also has an efficient routing path in a fast manner.

  9. Home and Clinical Cardiovascular Care Center (H4C: a Framework for Integrating Body Sensor Networks and QTRU Cryptography System

    Directory of Open Access Journals (Sweden)

    Ali Zakerolhosseini

    2013-09-01

    Full Text Available Quick responds to heart attack patients before arriving to hospital is a very important factor. In this paper, a combined model of Body Sensor Network and Personal Digital Access using QTRU cipher algorithm in Wifi networks is presented to efficiently overcome these life threatening attacks. The algorithm for optimizing the routing paths between sensor nodes and an algorithm for reducing the power consumption are also applied for achieving the best performance by this model. This system is consumes low power and has encrypting and decrypting processes. It also has an efficient routing path in a fast manner

  10. Protecting people against radiation exposure in the event of a radiological attack

    International Nuclear Information System (INIS)

    Valentin, J.

    2005-01-01

    This report responds to a widely perceived need for professional advice on radiological protection measures to be undertaken in the event of a radiological attack. The report, which is mainly concerned with possible attacks involving 'radioactive dispersion devices', re-affirms the applicability of existing ICRP recommendations to such situations, should they ever occur. Many aspects of the emergency scenarios expected to arise in the event of a radiological attack may be similar to those that experience has shown can arise from radiological accidents, but there may also be important differences. For instance, a radiological attack would probably be targeted at a public area, possibly in an urban environment, where the presence of radiation is not anticipated and the dispersion conditions commonly assumed for a nuclear or radiological emergency, such as at a nuclear installation, may not be applicable. First responders to a radiological attack and other rescuers need to be adequately trained and to have the proper equipment for identifying radiation and radioactive contamination, and specialists in radiological protection must be available to provide advice. It may be prudent to assume that radiological, chemical, and/or biological agents are involved in an attack until it is proven otherwise. This calls for an 'all-hazard' approach to the response. In the aftermath of an attack, the main aim of radiological protection must be to prevent the occurrence of acute health effects attributable to radiation exposure (termed 'deterministic' effects) and to restrict the likelihood of late health effects (termed 'stochastic' effects) such as cancers and some hereditable diseases. A supplementary aim is to minimise environmental contamination from radioactive residues and the subsequent general disruption of daily life. The report notes that action taken to avert exposures is a much more effective protective measure than protective measure the provision of medical treatment

  11. Algebraic Side-Channel Attack on Twofish

    Directory of Open Access Journals (Sweden)

    Chujiao Ma

    2017-05-01

    Full Text Available While algebraic side-channel attack (ASCA has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish. Compared to other algorithms that ASCA has been used on, Twofish is more difficult to attack due to the key-dependent S-boxes as well as the complex key scheduling. In this paper, we propose the first algebraic side-channel attack on Twofish, and examine the importance of side-channel information in getting past the key-dependent S-boxes and the complex key scheduling. The cryptographic algorithm and side-channel information are both expressed as boolean equations and a SAT solver is used to recover the key. While algebraic attack by itself is not sufficient to break the algorithm, with the help of side-channel information such as Hamming weights, we are able to correctly solve for 96 bits of the 128 bits key in under 2 hours with known plaintext/ciphertext.

  12. On localization attacks against cloud infrastructure

    Science.gov (United States)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  13. Network attacks and defenses a hands-on approach

    CERN Document Server

    Trabelsi, Zouheir; Al Braiki, Arwa; Mathew, Sujith Samuel

    2012-01-01

    The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both offensive and defensive techniques. Using step-by-step processes to build and generate attacks using offensive techniques, Network Attacks and Defenses: A Hands-on Approach enables students to implement appropriate network security solutions within a laborat

  14. SDN-Based Double Hopping Communication against Sniffer Attack

    Directory of Open Access Journals (Sweden)

    Zheng Zhao

    2016-01-01

    Full Text Available Sniffer attack has been a severe threat to network communication security. Traditional network usually uses static network configuration, which provides convenience to sniffer attack. In this paper, an SDN-based double hopping communication (DHC approach is proposed to solve this problem. In DHC, ends in communication packets as well as the routing paths are changed dynamically. Therefore, the traffic will be distributed to multiple flows and transmitted along different paths. Moreover, the data from multiple users will be mixed, bringing difficulty for attackers in obtaining and recovering the communication data, so that sniffer attack will be prevented effectively. It is concluded that DHC is able to increase the overhead of sniffer attack, as well as the difficulty of communication data recovery.

  15. Attacks on Bluetooth Security Architecture and Its Countermeasures

    Science.gov (United States)

    Iqbal, Mian Muhammad Waseem; Kausar, Firdous; Wahla, Muhammad Arif

    WPANs compliment the traditional IEEE 802.11 wireless networks by facilitating the clients with flexibility in network topologies, higher mobility and relaxed configuration/hardware requirements. Bluetooth, a WPAN technology, is an open standard for short-range radio frequency (RF) communication. However, it is also susceptible to typical security threats found in wireless LANs. This paper discuses some of the attack scenarios against the bluetooth network such as hostile intrusion, active Man-in-the-Middle (MITM) attack using unit key and various forms of denial of service (DoS) attacks. These threats and attacks compromise the confidentiality and availability of bluetooth data and services. This paper proposes an improved security architecture for bluetooth device which provides protection against the above mentioned attacks.

  16. Coendangered hard-ticks: threatened or threatening?

    Directory of Open Access Journals (Sweden)

    Cozma Vasile

    2011-05-01

    Full Text Available Abstract The overwhelming majority of animal conservation projects are focused on vertebrates, despite most of the species on Earth being invertebrates. Estimates state that about half of all named species of invertebrates are parasitic in at least one stage of their development. The dilemma of viewing parasites as biodiversity or pest has been discussed by several authors. However, ticks were omitted. The latest taxonomic synopses of non-fossil Ixodidae consider valid 700 species. Though, how many of them are still extant is almost impossible to tell, as many of them are known only from type specimens in museums and were never collected since their original description. Moreover, many hosts are endangered and as part of conservation efforts of threatened vertebrates, a common practice is the removal of, and treatment for external parasites, with devastating impact on tick populations. There are several known cases when the host became extinct with subsequent coextinction of their ectoparasites. For our synoptic approach we have used the IUCN status of the host in order to evaluate the status of specifically associated hard-ticks. As a result, we propose a number of 63 coendangered and one extinct hard-tick species. On the other side of the coin, the most important issue regarding tick-host associations is vectorial transmission of microbial pathogens (i.e. viruses, bacteria, protozoans. Tick-borne diseases of threatened vertebrates are sometimes fatal to their hosts. Mortality associated with pathogens acquired from ticks has been documented in several cases, mostly after translocations. Are ticks a real threat to their coendangered host and should they be eliminated? Up to date, there are no reliable proofs that ticks listed by us as coendangered are competent vectors for pathogens of endangered animals.

  17. An SDN-Based Fingerprint Hopping Method to Prevent Fingerprinting Attacks

    Directory of Open Access Journals (Sweden)

    Zheng Zhao

    2017-01-01

    Full Text Available Fingerprinting attacks are one of the most severe threats to the security of networks. Fingerprinting attack aims to obtain the operating system information of target hosts to make preparations for future attacks. In this paper, a fingerprint hopping method (FPH is proposed based on software-defined networks to defend against fingerprinting attacks. FPH introduces the idea of moving target defense to show a hopping fingerprint toward the fingerprinting attackers. The interaction of the fingerprinting attack and its defense is modeled as a signal game, and the equilibriums of the game are analyzed to develop an optimal defense strategy. Experiments show that FPH can resist fingerprinting attacks effectively.

  18. Health-related quality of life among Danish patients 3 and 12 months after TIA or mild stroke

    DEFF Research Database (Denmark)

    Muus, Ingrid; Petzold, Max; Ringsberg, Karin C

    2010-01-01

    This paper aimed to describe health related quality of life three and 12 months after mild stroke or transient ischemic attack, TIA, to describe the perceived changes from pre to post stroke status and to examine sociodemographic determinants for health related quality of life.......This paper aimed to describe health related quality of life three and 12 months after mild stroke or transient ischemic attack, TIA, to describe the perceived changes from pre to post stroke status and to examine sociodemographic determinants for health related quality of life....

  19. Chronic probable PTSD in police responders in the world trade center health registry ten to eleven years after 9/11.

    Science.gov (United States)

    Cone, James E; Li, Jiehui; Kornblith, Erica; Gocheva, Vihra; Stellman, Steven D; Shaikh, Annum; Schwarzer, Ralf; Bowler, Rosemarie M

    2015-05-01

    Police enrolled in the World Trade Center Health Registry (WTCHR) demonstrated increased probable posttraumatic stress disorder (PTSD) after the terrorist attack of 9/11/2001. Police enrollees without pre-9/11 PTSD were studied. Probable PTSD was assessed by Posttraumatic Stress Check List (PCL). Risk factors for chronic, new onset or resolved PTSD were assessed using multinomial logistic regression. Half of police with probable PTSD in 2003-2007 continued to have probable PTSD in 2011-2012. Women had higher prevalence of PTSD than men (15.5% vs. 10.3%, P = 0.008). Risk factors for chronic PTSD included decreased social support, unemployment, 2+ life stressors in last 12 months, 2+ life-threatening events since 9/11, 2+ injuries during the 9/11 attacks, and unmet mental health needs. Police responders to the WTC attacks continue to bear a high mental health burden. Improved early access to mental health treatment for police exposed to disasters may be needed. © 2015 Wiley Periodicals, Inc.

  20. Data-plane Defenses against Routing Attacks on Tor

    Directory of Open Access Journals (Sweden)

    Tan Henry

    2016-10-01

    Full Text Available Tor is susceptible to traffic correlation attacks in which an adversary who observes flows entering and leaving the anonymity network can apply statistical techniques to correlate flows and de-anonymize their endpoints. While an adversary may not be naturally positioned to conduct such attacks, a recent study shows that the Internet’s control-plane can be manipulated to increase an adversary’s view of the network, and consequently, improve its ability to perform traffic correlation. This paper explores, in-depth, the effects of control-plane attacks on the security of the Tor network. Using accurate models of the live Tor network, we quantify Tor’s susceptibility to these attacks by measuring the fraction of the Tor network that is vulnerable and the advantage to the adversary of performing the attacks. We further propose defense mechanisms that protect Tor users from manipulations at the control-plane. Perhaps surprisingly, we show that by leveraging existing trust anchors in Tor, defenses deployed only in the data-plane are sufficient to detect most control-plane attacks. Our defenses do not assume the active participation of Internet Service Providers, and require only very small changes to Tor. We show that our defenses result in a more than tenfold decrease in the effectiveness of certain control-plane attacks.

  1. Life History Approach

    DEFF Research Database (Denmark)

    Olesen, Henning Salling

    2015-01-01

    as in everyday life. Life histories represent lived lives past, present and anticipated future. As such they are interpretations of individuals’ experiences of the way in which societal dynamics take place in the individual body and mind, either by the individual him/herself or by another biographer. The Life...... History approach was developing from interpreting autobiographical and later certain other forms of language interactive material as moments of life history, i.e. it is basically a hermeneutic approach. Talking about a psycho-societal approach indicates the ambition of attacking the dichotomy...... of the social and the psychic, both in the interpretation procedure and in some main theoretical understandings of language, body and mind. My article will present the reflections on the use of life history based methodology in learning and education research as a kind of learning story of research work....

  2. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...

  3. Step to improve neural cryptography against flipping attacks.

    Science.gov (United States)

    Zhou, Jiantao; Xu, Qinzhen; Pei, Wenjiang; He, Zhenya; Szu, Harold

    2004-12-01

    Synchronization of neural networks by mutual learning has been demonstrated to be possible for constructing key exchange protocol over public channel. However, the neural cryptography schemes presented so far are not the securest under regular flipping attack (RFA) and are completely insecure under majority flipping attack (MFA). We propose a scheme by splitting the mutual information and the training process to improve the security of neural cryptosystem against flipping attacks. Both analytical and simulation results show that the success probability of RFA on the proposed scheme can be decreased to the level of brute force attack (BFA) and the success probability of MFA still decays exponentially with the weights' level L. The synchronization time of the parties also remains polynomial with L. Moreover, we analyze the security under an advanced flipping attack.

  4. Improved Impossible Differential Attacks on Large-Block Rijndael

    DEFF Research Database (Denmark)

    Wang, Qingju; Gu, Dawu; Rijmen, Vincent

    2012-01-01

    . The improvement can lead to 10-round attack on Rijndael-256 as well. With 2198.1 chosen plaintexts, an attack is demonstrated on 9-round Rijndael-224 with 2 195.2 encryptions and 2140.4 bytes memory. Increasing the data complexity to 2216 plaintexts, the time complexity can be reduced to 2130 encryptions...... and the memory requirements to 2 93.6 bytes. For 9-round Rijndael-256, we provide an attack requiring 2229.3 chosen plaintexts, 2194 encryptions, and 2 139.6 bytes memory. Alternatively, with 2245.3 plaintexts, an attack with a reduced time of 2127.1 encryptions and a memory complexity of 290.9 bytes can...... be mounted. With 2244.2 chosen plaintexts, we can attack 10-round Rijndael-256 with 2253.9 encryptions and 2186.8 bytes of memory....

  5. RAPTOR: Ransomware Attack PredicTOR

    OpenAIRE

    Quinkert, Florian; Holz, Thorsten; Hossain, KSM Tozammel; Ferrara, Emilio; Lerman, Kristina

    2018-01-01

    Ransomware, a type of malicious software that encrypts a victim's files and only releases the cryptographic key once a ransom is paid, has emerged as a potentially devastating class of cybercrimes in the past few years. In this paper, we present RAPTOR, a promising line of defense against ransomware attacks. RAPTOR fingerprints attackers' operations to forecast ransomware activity. More specifically, our method learns features of malicious domains by looking at examples of domains involved in...

  6. Shark attack-related injuries: Epidemiology and implications for plastic surgeons.

    Science.gov (United States)

    Ricci, Joseph A; Vargas, Christina R; Singhal, Dhruv; Lee, Bernard T

    2016-01-01

    The increased media attention to shark attacks has led to a heightened fear and public awareness. Although few sharks are considered dangerous, attacks on humans can result in large soft tissue defects necessitating the intervention of reconstructive surgeons. This study aims to evaluate and describe the characteristics of shark-related injuries in order to improve treatment. The Global Shark Accident File, maintained by the Shark Research Institute (Princeton, NJ, USA), is a compilation of all known worldwide shark attacks. Database records since the 1900s were reviewed to identify differences between fatal and nonfatal attacks, including: geography, injury pattern, shark species, and victim activity. Since the 1900s, there have been 5034 reported shark attacks, of which 1205 (22.7%) were fatal. Although the incidence of attacks per decade has increased, the percentage of fatalities has decreased. Characteristics of fatal attacks included swimming (p = 0.001), boating (p = 0.001), three or more bite sites (p = 0.03), limb loss (p = 0.001), or tiger shark attack (p = 0.002). The most common attacks were bites to the legs (41.8%) or arms (18.4%), with limb loss occurring in 7% of attacks. Geographically, the majority of attacks occurred in North America (36.7%) and Australia (26.5%). Most attacks in the USA occurred in Florida (49.1%) and California (13.6%). Although rare, shark attacks result in devastating injuries to patients. As these injuries often involve multiple sites and limb loss, this creates a significant challenge for reconstructive surgeons. Proper identification of the characteristics of the attack can aid in providing optimal care for those affected. Copyright © 2015 British Association of Plastic, Reconstructive and Aesthetic Surgeons. Published by Elsevier Ltd. All rights reserved.

  7. A Collaborative Approach for Monitoring Nodes Behavior during Spectrum Sensing to Mitigate Multiple Attacks in Cognitive Radio Networks

    Directory of Open Access Journals (Sweden)

    Mahmoud Khasawneh

    2017-01-01

    Full Text Available Spectrum sensing is the first step to overcome the spectrum scarcity problem in Cognitive Radio Networks (CRNs wherein all unutilized subbands in the radio environment are explored for better spectrum utilization. Adversary nodes can threaten these spectrum sensing results by launching passive and active attacks that prevent legitimate nodes from using the spectrum efficiently. Securing the spectrum sensing process has become an important issue in CRNs in order to ensure reliable and secure spectrum sensing and fair management of resources. In this paper, a novel collaborative approach during spectrum sensing process is proposed. It monitors the behavior of sensing nodes and identifies the malicious and misbehaving sensing nodes. The proposed approach measures the node’s sensing reliability using a value called belief level. All the sensing nodes are grouped into a specific number of clusters. In each cluster, a sensing node is selected as a cluster head that is responsible for collecting sensing-reputation reports from different cognitive nodes about each node in the same cluster. The cluster head analyzes information to monitor and judge the nodes’ behavior. By simulating the proposed approach, we showed its importance and its efficiency for achieving better spectrum security by mitigating multiple passive and active attacks.

  8. Privacy Leaks through Data Hijacking Attack on Mobile Systems

    Directory of Open Access Journals (Sweden)

    Zhang Daojuan

    2017-01-01

    Full Text Available To persistently eavesdrop on the mobile devices, attackers may obtain the elevated privilege and inject malicious modules into the user devices. Unfortunately, the attackers may not be able to obtain the privilege for a long period of time since the exploitable vulnerabilities may be fixed or the malware may be removed. In this paper, we propose a new data hijacking attack for the mobile apps. By employing the proposed method, the attackers are only required to obtain the root privilege of the user devices once, and they can persistently eavesdrop without any change to the original device. Specifically, we design a new approach to construct a shadow system by hijacking user data files. In the shadow system, attackers possess the identical abilities to the victims. For instance, if a victim has logged into the email app, the attacker can also access the email server in the shadow system without authentication in a long period of time. Without reauthentication of the app, it is difficult for victims to notice the intrusion since the whole eavesdropping is performed on other devices (rather than the user devices. In our experiments, we evaluate the effectiveness of the proposed attack and the result demonstrates that even the Android apps released by the top developers cannot resist this attack. Finally, we discuss some approaches to defend the proposed attack.

  9. What Can We Learn?--The Algonquin Bear Attack.

    Science.gov (United States)

    Strickland, Dan

    1992-01-01

    Describes a bear attack in Algonquin Park in Lake Opeongo (Canada) in which a man and woman were killed. Hypothesizes that the bear deliberately preyed on its victims and concludes that the bear was physically normal. Despite this isolated attack, the chance of being attacked by a black bear when camping is virtually nonexistent. (KS)

  10. Combined Heuristic Attack Strategy on Complex Networks

    Directory of Open Access Journals (Sweden)

    Marek Šimon

    2017-01-01

    Full Text Available Usually, the existence of a complex network is considered an advantage feature and efforts are made to increase its robustness against an attack. However, there exist also harmful and/or malicious networks, from social ones like spreading hoax, corruption, phishing, extremist ideology, and terrorist support up to computer networks spreading computer viruses or DDoS attack software or even biological networks of carriers or transport centers spreading disease among the population. New attack strategy can be therefore used against malicious networks, as well as in a worst-case scenario test for robustness of a useful network. A common measure of robustness of networks is their disintegration level after removal of a fraction of nodes. This robustness can be calculated as a ratio of the number of nodes of the greatest remaining network component against the number of nodes in the original network. Our paper presents a combination of heuristics optimized for an attack on a complex network to achieve its greatest disintegration. Nodes are deleted sequentially based on a heuristic criterion. Efficiency of classical attack approaches is compared to the proposed approach on Barabási-Albert, scale-free with tunable power-law exponent, and Erdős-Rényi models of complex networks and on real-world networks. Our attack strategy results in a faster disintegration, which is counterbalanced by its slightly increased computational demands.

  11. Outcome of pregnancy complicated by threatened abortion.

    Science.gov (United States)

    Dongol, A; Mool, S; Tiwari, P

    2011-01-01

    Threatened abortion is the most common complication in the first half of pregnancy. Most of these pregnancies continue to term with or without treatment. Spontaneous abortion occurs in less than 30% of these women. Threatened abortion had been shown to be associated with increased incidence of antepartum haemorrhage, preterm labour and intra uterine growth retardation. This study was to asses the outcome of threatened abortion following treatment. This prospective study was carried out in Dhulikhel Hospital - Kathmandu University Hospital from January 2009 till May 2010. Total 70 cases of threatened abortion were selected, managed with complete bed rest till 48 hrs of cessation of bleeding, folic acid supplementation, uterine sedative, and hormonal treatment till 28 weeks of gestation. Ultrasonogram was performed for diagnosis and to detect the presence of subchorionic hematoma. Patients were followed up until spontaneous abortion or up to delivery of the fetus. The measures used for the analysis were maternal age, parity, gestational age at the time of presentation, previous abortions, presence of subchorionic hematoma, complete abortion, continuation of pregnancy, antepartum hemorrhage, intrauterine growth retardation and intrauterine death of fetus. Out of 70 cases subchorionic haematoma was found in 30 (42.9%) cases. There were 12 (17.1%) patients who spontaneously aborted after diagnosis of threatened abortion during hospital stay, 5 (7.1%) aborted on subsequent visits while 53 (75.8%) continued pregnancy till term. Among those who continued pregnancy intrauterine growth retardation was seen in 7 (13.2%), antepartum hemorrhage in 4 (7.5%), preterm premature rupture of membrane in 3 (5.66%) and IUD in 3 (5.66%). Spontaneous abortion was found more in cases with subchorionic hematoma of size more than 20 cm2. In cases of threatened abortion with or without the presence of subchorionic hematoma, prognostic outcome is better following treatment with bed rest

  12. Quality of life and its association with psychiatric morbidity in chronic ...

    African Journals Online (AJOL)

    Background: Chronic kidney disease is a progressive life threatening illness which may be complicated by psychological disorders and may invariably reduce the quality of life and survival of those affected. However, this negative effect on the quality of life of this patient population may be reduced if such psychological ...

  13. Impact of Cyber Attacks on High Voltage DC Transmission Damping Control

    Directory of Open Access Journals (Sweden)

    Rui Fan

    2018-04-01

    Full Text Available Hybrid AC/HVDC (AC-HVDC grids have evolved to become huge cyber-physical systems that are vulnerable to cyber attacks because of the wide attack surface and increasing dependence on intelligent electronic devices, computing resources and communication networks. This paper, for the first time, studies the impact of cyber attacks on HVDC transmission oscillation damping control.Three kinds of cyber attack models are considered: timing attack, replay attack and false data injection attack. Followed by a brief introduction of the HVDC model and conventional oscillation damping control method, the design of three attack models is described in the paper. These attacks are tested on a modified IEEE New England 39-Bus AC-HVDC system. Simulation results have shown that all three kinds of attacks are capable of driving the AC-HVDC system into large oscillations or even unstable conditions.

  14. OPERATION COBRA. Deliberate Attack, Exploitation

    Science.gov (United States)

    1984-05-25

    to attack Sens, then continue to Troyes , on the Seine River. CCA was in the north, crossing the Loing River at Souppes against light resistance and...advanced from Troyes and prepared positions close to Sens. Under strong artillery support, a task force from CCA (TF Oden) attacked the enemy frontally...movement towards the Seine River on 24 August with an advance toward Troyes . Facing the combat command were what remained of the 51st SS Brigade, light

  15. Research on the Fatigue Flexural Performance of RC Beams Attacked by Salt Spray

    Science.gov (United States)

    Mao, Jiang-hong; Xu, Fang-yuan; Jin, Wei-liang; Zhang, Jun; Wu, Xi-xi; Chen, Cai-sheng

    2018-04-01

    The fatigue flexural performance of RC beams attacked by salt spray was studied. A testing method involving electro osmosis, electrical accelerated corrosion and salt spray was proposed. This corrosion process method effectively simulates real-world salt spray and fatigue loading exerted by RC components on sea bridges. Four RC beams that have different stress amplitudes were tested. It is found that deterioration by corrosion and fatigue loading reduces the fatigue life of the RC and decreases the ability of deformation. The fatigue life and deflection ability could be reduced by increasing the stress amplitude and the corrosion duration time. The test result demonstrates that this experimental method can couple corrosion deterioration and fatigue loading reasonably. This procedure may be applied to evaluate the fatigue life and concrete durability of RC components located in a natural salt spray environment.

  16. Command Disaggregation Attack and Mitigation in Industrial Internet of Things

    Directory of Open Access Journals (Sweden)

    Peng Xun

    2017-10-01

    Full Text Available A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1 the command sequence is disordered and (2 disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  17. Command Disaggregation Attack and Mitigation in Industrial Internet of Things.

    Science.gov (United States)

    Xun, Peng; Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-10-21

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  18. Counteracting Power Analysis Attacks by Masking

    Science.gov (United States)

    Oswald, Elisabeth; Mangard, Stefan

    The publication of power analysis attacks [12] has triggered a lot of research activities. On the one hand these activities have been dedicated toward the development of secure and efficient countermeasures. On the other hand also new and improved attacks have been developed. In fact, there has been a continuous arms race between designers of countermeasures and attackers. This chapter provides a brief overview of the state-of-the art in the arms race in the context of a countermeasure called masking. Masking is a popular countermeasure that has been extensively discussed in the scientific community. Numerous articles have been published that explain different types of masking and that analyze weaknesses of this countermeasure.

  19. Surviving life-threatening illness: keys to optimal nursing care.

    Science.gov (United States)

    Moorman, Sandra

    2010-01-01

    Necrotizing fasciitis (NF) is a rare yet life-altering infection. Disfigurement and death ensue without accurate diagnosis and treatment. Educational awareness can assist nurses to advocate for differential diagnosis, immediate treatment, and plan of care. This article examines the experience of a mother with NF, application of Neuman's Systems Model (NSM) to address her healing needs, and nursing practice guided by one's personal worldview. NSM was chosen because it is holistic and concise and can be utilized from a Christian perspective.

  20. Metrics for Assessment of Smart Grid Data Integrity Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  1. A taxonomy of distributed denial of service attacks

    DEFF Research Database (Denmark)

    De Donno, Michele; Giaretta, Alberto; Dragoni, Nicola

    2017-01-01

    Distributed Denial of Service (DDoS) attacks which are now even more powerful and easier to achieve than the past. Understanding how these attacks work, in all their different forms, represents a first crucial step to tackle this urgent issue. To this end, in this paper we propose a new up-to-date taxonomy...... and a comprehensive classification of current DDoS attacks....

  2. An Explanation of Nakamoto's Analysis of Double-spend Attacks

    OpenAIRE

    Ozisik, A. Pinar; Levine, Brian Neil

    2017-01-01

    The fundamental attack against blockchain systems is the double-spend attack. In this tutorial, we provide a very detailed explanation of just one section of Satoshi Nakamoto's original paper where the attack's probability of success is stated. We show the derivation of the mathematics relied upon by Nakamoto to create a model of the attack. We also validate the model with a Monte Carlo simulation, and we determine which model component is not perfect.

  3. Modeling and Analysis of Information Attack in Computer Networks

    National Research Council Canada - National Science Library

    Pepyne, David

    2003-01-01

    ... (as opposed to physical and other forms of attack) . Information based attacks are attacks that can be carried out from anywhere in the world, while sipping cappuccino at an Internet cafe' or while enjoying the comfort of a living room armchair...

  4. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within...

  5. Protecting infrastructure networks from cost-based attacks

    International Nuclear Information System (INIS)

    Wang Xingang; Guan Shuguang; Lai, Choy Heng

    2009-01-01

    It is well known that heterogeneous networks are vulnerable to the intentional removal of a small fraction of highly connected or loaded nodes, implying that to protect the network effectively, the important nodes should be allocated more defense resource than the others. However, if too much resource is allocated to the few important nodes, the numerous less-important nodes will be less protected, which if attacked together can still lead to devastating damage. A natural question is therefore how to efficiently distribute the limited defense resource among the network nodes such that the network damage is minimized against any attack strategy. In this paper, taking into account the factor of attack cost, the problem of network security is reconsidered in terms of efficient network defense against cost-based attacks. The results show that, for a general complex network, there exists an optimal distribution of the defense resource with which the network is best protected from cost-based attacks. Furthermore, it is found that the configuration of the optimal defense is dependent on the network parameters. Specifically, networks of larger size, sparser connection and more heterogeneous structure will more likely benefit from the defense optimization.

  6. List identifies threatened ecosystems

    Science.gov (United States)

    Showstack, Randy

    2012-09-01

    The International Union for Conservation of Nature (IUCN) announced on 9 September that it will develop a new Red List of Ecosystems that will identify which ecosystems are vulnerable or endangered. The list, which is modeled on the group's Red List of Threatened Species™, could help to guide conservation activities and influence policy processes such as the Convention on Biological Diversity, according to the group. “We will assess the status of marine, terrestrial, freshwater, and subterranean ecosystems at local, regional, and global levels,” stated Jon Paul Rodriguez, leader of IUCN's Ecosystems Red List Thematic Group. “The assessment can then form the basis for concerted implementation action so that we can manage them sustainably if their risk of collapse is low or restore them if they are threatened and then monitor their recovery.”

  7. Constructing APT Attack Scenarios Based on Intrusion Kill Chain and Fuzzy Clustering

    Directory of Open Access Journals (Sweden)

    Ru Zhang

    2017-01-01

    Full Text Available The APT attack on the Internet is becoming more serious, and most of intrusion detection systems can only generate alarms to some steps of APT attack and cannot identify the pattern of the APT attack. To detect APT attack, many researchers established attack models and then correlated IDS logs with the attack models. However, the accuracy of detection deeply relied on the integrity of models. In this paper, we propose a new method to construct APT attack scenarios by mining IDS security logs. These APT attack scenarios can be further used for the APT detection. First, we classify all the attack events by purpose of phase of the intrusion kill chain. Then we add the attack event dimension to fuzzy clustering, correlate IDS alarm logs with fuzzy clustering, and generate the attack sequence set. Next, we delete the bug attack sequences to clean the set. Finally, we use the nonaftereffect property of probability transfer matrix to construct attack scenarios by mining the attack sequence set. Experiments show that the proposed method can construct the APT attack scenarios by mining IDS alarm logs, and the constructed scenarios match the actual situation so that they can be used for APT attack detection.

  8. Bio-psychosocial determinants of time lost from work following non life threatening acute orthopaedic trauma.

    Science.gov (United States)

    Clay, Fiona J; Newstead, Stuart V; Watson, Wendy L; Ozanne-Smith, Joan; McClure, Roderick J

    2010-01-05

    To determine factors predicting the duration of time away from work following acute orthopaedic non life threatening trauma Prospective cohort study conducted at four hospitals in Victoria, Australia. The cohort comprised 168 patients aged 18-64 years who were working prior to the injury and sustained a range of acute unintentional orthopaedic injuries resulting in hospitalization. Baseline data was obtained by survey and medical record review. Multivariate Cox proportional hazards regression analysis was used to examine the association between potential predictors and the duration of time away from work during the six month study. The study achieved 89% follow-up. Of the 168 participants recruited to the study, 68% returned to work during the six month study. Multivariate Cox proportional hazards regression analysis identified that blue collar work, negative pain attitudes with respect to work, high initial pain intensity, injury severity, older age, initial need for surgery, the presence of co-morbid health conditions at study entry and an orthopaedic injury to more than one region were associated with extended duration away from work following the injury. Participants in receipt of compensation who reported high social functioning at two weeks were 2.58 times more likely to have returned to work than similar participants reporting low social functioning. When only those who had returned to work were considered, the participant reported reason for return to work " to fill the day" was a significant predictor of earlier RTW [RR 2.41 (95% C.I 1.35-4.30)] whereas "financial security" and "because they felt able to" did not achieve significance. Many injury-related and psycho social factors affect the duration of time away from work following orthopaedic injury. Some of these are potentially modifiable and may be amenable to intervention. Further consideration of the reasons provided by participants for returning to work may provide important opportunities for social

  9. On node replication attack in wireless sensor networks

    International Nuclear Information System (INIS)

    Qabulio, M.; Malkani, Y.A.

    2015-01-01

    WSNs (Wireless Sensor Networks) comprise a large number of small, inexpensive, low power and memory constrained sensing devices (called sensor nodes) that are densely deployed to measure a given physical phenomenon. Since WSNs are commonly deployed in a hostile and unattended environment, it is easy for an adversary to physically capture one or more legitimate sensor nodes, re-program and redeploy them in the network. As a result, the adversary becomes able to deploy several identical copies of physically captured nodes in the network in order to perform illegitimate activities. This type of attack is referred to as Node Replication Attack or Clone Node Attack. By launching node replication attack, an adversary can easily get control on the network which consequently is the biggest threat to confidentiality, integrity and availability of data and services. Thus, detection and prevention of node replication attack in WSNs has become an active area of research and to date more than two dozen schemes have been proposed, which address this issue. In this paper, we present a comprehensive review, classification and comparative analysis of twenty five of these schemes which help to detect and/or prevent node replication attack in WSNs. (author)

  10. On Node Replication Attack in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mumtaz Qabulio

    2016-04-01

    Full Text Available WSNs (Wireless Sensor Networks comprise a large number of small, inexpensive, low power and memory constrained sensing devices (called sensor nodes that are densely deployed to measure a given physical phenomenon. Since WSNs are commonly deployed in a hostile and unattended environment, it is easy for an adversary to physically capture one or more legitimate sensor nodes, re-program and redeploy them in the network. As a result, the adversary becomes able to deploy several identical copies of physically captured nodes in the network in order to perform illegitimate activities. This type of attack is referred to as Node Replication Attack or Clone Node Attack. By launching node replication attack, an adversary can easily get control on the network which consequently is the biggest threat to confidentiality, integrity and availability of data and services. Thus, detection and prevention of node replication attack in WSNs has become an active area of research and to date more than two dozen schemes have been proposed, which address this issue. In this paper, we present a comprehensive review, classification and comparative analysis of twenty five of these schemes which help to detect and/or prevent node replication attack in WSNs

  11. Attacker-defender game from a network science perspective

    Science.gov (United States)

    Li, Ya-Peng; Tan, Suo-Yi; Deng, Ye; Wu, Jun

    2018-05-01

    Dealing with the protection of critical infrastructures, many game-theoretic methods have been developed to study the strategic interactions between defenders and attackers. However, most game models ignore the interrelationship between different components within a certain system. In this paper, we propose a simultaneous-move attacker-defender game model, which is a two-player zero-sum static game with complete information. The strategies and payoffs of this game are defined on the basis of the topology structure of the infrastructure system, which is represented by a complex network. Due to the complexity of strategies, the attack and defense strategies are confined by two typical strategies, namely, targeted strategy and random strategy. The simulation results indicate that in a scale-free network, the attacker virtually always attacks randomly in the Nash equilibrium. With a small cost-sensitive parameter, representing the degree to which costs increase with the importance of a target, the defender protects the hub targets with large degrees preferentially. When the cost-sensitive parameter exceeds a threshold, the defender switches to protecting nodes randomly. Our work provides a new theoretical framework to analyze the confrontations between the attacker and the defender on critical infrastructures and deserves further study.

  12. Are the rules for the right to self-defense outdated to address current conflicts like attacks from non-state actors and cyber-attacks?

    Directory of Open Access Journals (Sweden)

    Gonzalo J. Arias

    2017-06-01

    Full Text Available The latest US-led coalition’s attacks against ISIS in Syria raised the question whether states can use defensive force against non-state actors. Two critical incidents had previously triggered the discussion on the importance and consequences of cyber-attacks as a new form armed attacks. The first one occurred in Estonia in 2007, when the country experienced extensive computer hacking attacks that lasted several weeks. The second incident happened in 2008, during the Georgia–Russia conflict over South Ossetia, when Georgia experienced cyber-attacks similar to those suffered by Estonia in the previous year. Furthermore, on June 21, 2016, the central banks of Indonesia and South Korea were hit by cyber-attacks on their public websites since activist hacking group Anonymous pledged last month to target banks across the world. The previous incidents have created, once again, public questioning if the rules on the use of force and the right of self-defense established in the United Nations Charter are sufficient and efficient to address these new forms of attacks.

  13. After-gate attack on a quantum cryptosystem

    International Nuclear Information System (INIS)

    Wiechers, C; Wittmann, C; Elser, D; Marquardt, Ch; Leuchs, G; Lydersen, L; Skaar, J; Makarov, V

    2011-01-01

    We present a method to control the detection events in quantum key distribution systems that use gated single-photon detectors. We employ bright pulses as faked states, timed to arrive at the avalanche photodiodes outside the activation time. The attack can remain unnoticed, since the faked states do not increase the error rate per se. This allows for an intercept-resend attack, where an eavesdropper transfers her detection events to the legitimate receiver without causing any errors. As a side effect, afterpulses, originating from accumulated charge carriers in the detectors, increase the error rate. We have experimentally tested detectors of the system id3110 (Clavis2) from ID Quantique. We identify the parameter regime in which the attack is feasible despite the side effect. Furthermore, we outline how simple modifications in the implementation can make the device immune to this attack.

  14. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  15. An Analysis of Cyber-Attack on NPP Considering Physical Impact

    Energy Technology Data Exchange (ETDEWEB)

    Lee, In Hyo; Kang, Hyun Gook [KAIST, Daejeon (Korea, Republic of); Son, Han Seong [Joonbu University, Geumsan (Korea, Republic of)

    2016-05-15

    Some research teams performed related works on cyber-physical system which is a system that cyber-attack can lead to serious consequences including product loss, damage, injury and death when it is attacked. They investigated the physical impact on cyber-physical system due to the cyber-attack. But it is hard to find the research about NPP cyber security considering the physical impact or safety. In this paper, to investigate the relationship between physical impact and cyber-attack, level 1 PSA results are utilized in chapter 2 and cyber-attack analysis is performed in chapter 3. The cyber security issue on NPP is inevitable issue. Unlike general cyber security, cyber-physical system like NPP can induce serious consequences such as core damage by cyber-attack. So in this paper, to find how hacker can attack the NPP, (1) PSA results were utilized to find the relationship between physical system and cyber-attack and (2) vulnerabilities on digital control systems were investigated to find how hacker can implement the possible attack. It is expected that these steps are utilized when establishing penetration test plans or cyber security drill plans.

  16. An Analysis of Cyber-Attack on NPP Considering Physical Impact

    International Nuclear Information System (INIS)

    Lee, In Hyo; Kang, Hyun Gook; Son, Han Seong

    2016-01-01

    Some research teams performed related works on cyber-physical system which is a system that cyber-attack can lead to serious consequences including product loss, damage, injury and death when it is attacked. They investigated the physical impact on cyber-physical system due to the cyber-attack. But it is hard to find the research about NPP cyber security considering the physical impact or safety. In this paper, to investigate the relationship between physical impact and cyber-attack, level 1 PSA results are utilized in chapter 2 and cyber-attack analysis is performed in chapter 3. The cyber security issue on NPP is inevitable issue. Unlike general cyber security, cyber-physical system like NPP can induce serious consequences such as core damage by cyber-attack. So in this paper, to find how hacker can attack the NPP, (1) PSA results were utilized to find the relationship between physical system and cyber-attack and (2) vulnerabilities on digital control systems were investigated to find how hacker can implement the possible attack. It is expected that these steps are utilized when establishing penetration test plans or cyber security drill plans

  17. Classification of cyber attacks in South Africa

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-05-01

    Full Text Available various ATM's throughout South Africa. Two criminals, Motsoane and Masoleng, were arrested in February 2012 and both sentenced to 15 years in jail [36, 37]. 3.10 2013: IOL DDoS Anonymous Africa claimed responsibility for launching a Distributed Denial... of Service (DDoS) attack on the Independent Newspaper web site iol.co.za. The attack was in response to claims that the IOL group supports Zimbabwean president Robert Mugabe. The following taunt was sent to boast about the attack: “IOL bad boys bad boys...

  18. A Review Of Recent Cyber-Attacks In Fiji

    Directory of Open Access Journals (Sweden)

    Neeraj A. Sharma

    2015-08-01

    Full Text Available Computing technology has evolved in such dramatic ways that a child can use such technology and their features. Internet is one such technology which allows peripheral devices to be connected to each other creating a network to share information. In the same way information can be attacked. In this paper we will be discussing the different types of cyber-attack that recently took place in Fiji. Common attacks discussed in this review paper are phishing email scams website defacement and skimming. Apart from common preventative methods some novel recommendations have been made. We believe the Fiji experiences and recommendations will assist technology users prepare better against such attacks.

  19. Research on high power intra-channel crosstalk attack in optical networks

    Science.gov (United States)

    Ren, Shuai; Zhang, Yinfa; Wang, Jingyu; Zhang, Jumei; Rao, Xuejun; Fang, Yuanyuan

    2017-02-01

    The mechanism of high power intra-channel crosstalk attack is analyzed theoretically and the conclusion that power of attack signal and crosstalk coefficient of optical switch are the main factors for which high power intra-channel have destructive effect on quality of legitimate signals is drawn. Effects of high power intra-channel crosstalk attack on quality of legitimate signals and its capability of attack propagation are investigated quantitatively by building the simulation system in VPI software. The results show that legitimate signals through the first and the second stage optical switch are affected by attack and legitimate signal through the third stage optical switch is almost unaffected by attack when power of original attack signal (OAS) is above 20dB more than that of legitimate signals and crosstalk coefficient of optical switch is -20dB at optical cross connect 1 (OXC1). High power intra-channel crosstalk attack has a certain capability of attack propagation. Attack capability of OAS can be propagated to OXC3 when power of OAS is 27dB more than that of legitimate signals and crosstalk coefficient of optical switch is -20dB. We also find that the secondary attack signal (SAS) does not have capability of attack propagation.

  20. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  1. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    We analyze a simple dynamic model of the interaction between terrorists and authorities. Our primary aim is to study optimal counterterrorism and its consequences when large terrorist attacks lead to a temporary increase in terrorist recruitment. First, we show that an increase in counterterrorism...... makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore......, in periods following large attacks a new attack is more likely to be small compared to other periods. Finally, we analyze the long-run consequences of the recruitment effect. We show that it leads to more counterterrorism, more small attacks, and a higher sum of terrorism damage and counterterrorism costs...

  2. Quantitative Verification and Synthesis of Attack-Defence Scenarios Conference

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They represent in an intuitive, graphical way the interaction between an attacker and a defender who compete in order to achieve conflicting objectives. We propose a novel framework for the formal

  3. Anti-TNF-alpha therapy for sight threatening uveitis.

    NARCIS (Netherlands)

    E.W. Lindstedt (Eric); G.S. Baarsma (Seerp); R.W.A.M. Kuijpers (Robert); P.M. van Hagen (Martin)

    2005-01-01

    textabstractAIM: To describe the effect of additional treatment with anti-TNF-alpha therapy in a case series of 13 patients with serious sight threatening uveitis. METHODS: 13 patients with serious sight threatening uveitis were included, of whom six had Behcet's disease, five had idiopathic

  4. Globally threatened vertebrates on islands with invasive species.

    Science.gov (United States)

    Spatz, Dena R; Zilliacus, Kelly M; Holmes, Nick D; Butchart, Stuart H M; Genovesi, Piero; Ceballos, Gerardo; Tershy, Bernie R; Croll, Donald A

    2017-10-01

    Global biodiversity loss is disproportionately rapid on islands, where invasive species are a major driver of extinctions. To inform conservation planning aimed at preventing extinctions, we identify the distribution and biogeographic patterns of highly threatened terrestrial vertebrates (classified by the International Union for Conservation of Nature) and invasive vertebrates on ~465,000 islands worldwide by conducting a comprehensive literature review and interviews with more than 500 experts. We found that 1189 highly threatened vertebrate species (319 amphibians, 282 reptiles, 296 birds, and 292 mammals) breed on 1288 islands. These taxa represent only 5% of Earth's terrestrial vertebrates and 41% of all highly threatened terrestrial vertebrates, which occur in vertebrates was available for 1030 islands (80% of islands with highly threatened vertebrates). Invasive vertebrates were absent from 24% of these islands, where biosecurity to prevent invasions is a critical management tool. On the 76% of islands where invasive vertebrates were present, management could benefit 39% of Earth's highly threatened vertebrates. Invasive mammals occurred in 97% of these islands, with Rattus sp. as the most common invasive vertebrate (78%; 609 islands). Our results provide an important baseline for identifying islands for invasive species eradication and other island conservation actions that reduce biodiversity loss.

  5. 'Cryptogenic Drop Attacks' revisited: evidence of overlap with functional neurological disorder.

    Science.gov (United States)

    Hoeritzauer, Ingrid; Carson, Alan J; Stone, Jon

    2018-02-07

    In their 1973 BMJ paper 'Cryptogenic Drop Attacks', Stevens and Matthews described 40, mostly middle-aged, female patients with drop attacks of unknown cause. Although clinically common, there has been little on this topic since. We aimed to determine clinical features, comorbidity and outcome of patients with drop attacks. We carried out a retrospective review of patients with cryptogenic drop attacks seen consecutively by one clinician (JS) between 2006 and 2016. Demographics, phenomenology, duration and frequency of attacks, attack description and comorbid diagnoses were recorded. Patients were followed up with a notes review. 83 patients with cryptogenic drop attacks were predominantly female (89%, n=79), mean age 44  years. The majority (93%, n=77) could not remember the fall itself and almost half (43%, n=36) experienced prodromal dissociative symptoms. Mechanical trips or syncope preceded drop attacks, historically, in 24% (n=20) of cases. Persistent fatigue (73%, n=61), chronic pain (40%, n=33), functional limb weakness (31%,n=26) and dissociative (non-epileptic) attacks 28% (n=23) were common, with the latter usually preceding or emerging from drop attacks. At follow-up (88%, mean 38 months), 28% (n=23) had resolution of their drop attacks. Predisposing (but non-causative) disease comorbidity was found at baseline (n=12) and follow-up (n=5). Cryptogenic drop attacks are associated with high frequency of comorbid functional somatic and functional neurological disorders. Patients commonly have prodromal dissociative symptoms and in some there was a clear relationship with prior or subsequent dissociative (non-epileptic) attacks. Some cryptogenic drop attacks may be best understood as phenomena on the spectrum of dissociative attacks. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  6. Optimal Patrol to Detect Attacks at Dispersed Heterogeneous Locations

    Science.gov (United States)

    2013-12-01

    solution RALP Random-attacker linear program SALP Strategic-attacker linear program SMDP Semi-Markov decision process SP Shortest path SPR1 Shortest...average cost per attack among all vertices, which we refer to as the strategic-attacker linear program ( SALP ): min x zOPT (3.1a) subject to ∑ (k,l)∈A c...the SALP is indicated by zOPT. The lower bound that is obtained from using the LBLP is indicated by zLB. Solutions obtained from using a heuristic

  7. Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment

    Science.gov (United States)

    Kebert, Alan; Barnejee, Bikramjit; Solano, Juan; Solano, Wanda

    2013-01-01

    The cloud computing environment offers malicious users the ability to spawn multiple instances of cloud nodes that are similar to virtual machines, except that they can have separate external IP addresses. In this paper we demonstrate how this ability can be exploited by an attacker to distribute his/her attack, in particular SQL injection attacks, in such a way that an intrusion detection system (IDS) could fail to identify this attack. To demonstrate this, we set up a small private cloud, established a vulnerable website in one instance, and placed an IDS within the cloud to monitor the network traffic. We found that an attacker could quite easily defeat the IDS by periodically altering its IP address. To detect such an attacker, we propose to use multi-agent plan recognition, where the multiple source IPs are considered as different agents who are mounting a collaborative attack. We show that such a formulation of this problem yields a more sophisticated approach to detecting SQL injection attacks within a cloud computing environment.

  8. Can a Copycat Effect be Observed in Terrorist Suicide Attacks?

    Directory of Open Access Journals (Sweden)

    Nicholas Farnham

    2017-03-01

    Full Text Available The purpose of this paper is to explore how a copycat effect – established within the field of suicide studies – may manifest itself in terrorist suicide attacks, and takes an exploratory approach in evaluating the prospect of incorporating open-data resources in future counter-terrorism research. This paper explores a possible ‘copycat effect’ in cases of suicide terrorism, which entails a perpetrator being inspired by a preceding attack to carry out a similar attack not long after the original. In the wake of mounting risks of lone wolf terrorist attacks today and due to the general difficulties faced in preventing such attacks, in this paper we explore a potential area of future prevention in media reporting, security and anti-terrorism policies today. Using the START Global Terrorism Database (GTD, this paper investigates terrorist suicide-attack clusters and analyses the relationship between attacks found within the same cluster. Using a mixed-method approach, our analyses did not uncover clear evidence supporting a copycat effect among the studied attacks. These and other findings have numerous policy and future research implications.

  9. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... major stroke. It's important to call 9-1-1 immediately for any stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. The content in this ...

  10. THE REPRISAL ATTACKS BY AL-SHABAAB AGAINST KENYA

    Directory of Open Access Journals (Sweden)

    E.O.S.ODHIAMBO

    2013-10-01

    Full Text Available The incursion of Kenya Defence Forces (KDF into Somalia was met by a series of threats from the Al-Shabaab that it would increase the attacks against Kenya if the troops were not withdrawn. The capture of Kismayu by KDF has weakened the nerve of Al-Shabaab but has not eliminated the imminent danger of a substantive terror attack. Since the incursion by KDF, Kenya has succumbed to a sequence of grenade and Improvised Explosive Devices attacks, roadside bombs, landmines and raids by fighters using small arms and light weapons and Rocket Propelled Grenades against Kenyans mostly in North Eastern, Coastal and Nairobi counties, marking the resurgence of terrorism in the country. We argue that Kenya is more vulnerable to Al-Shabaab terrorists attack than before the KDF incursion by citing the frequencies of reprisal attacks from October 2011 to January 2013. Hence, our troops should be withdrawn and deployed within our boundary.

  11. Thwarting Nonintrusive Occupancy Detection Attacks from Smart Meters

    Directory of Open Access Journals (Sweden)

    Dapeng Man

    2017-01-01

    Full Text Available Occupancy information is one of the most important privacy issues of a home. Unfortunately, an attacker is able to detect occupancy from smart meter data. The current battery-based load hiding (BLH methods cannot solve this problem. To thwart occupancy detection attacks, we propose a framework of battery-based schemes to prevent occupancy detection (BPOD. BPOD monitors the power consumption of a home and detects the occupancy in real time. According to the detection result, BPOD modifies those statistical metrics of power consumption, which highly correlate with the occupancy by charging or discharging a battery, creating a delusion that the home is always occupied. We evaluate BPOD in a simulation using several real-world smart meter datasets. Our experiment results show that BPOD effectively prevents the threshold-based and classifier-based occupancy detection attacks. Furthermore, BPOD is also able to prevent nonintrusive appliance load monitoring attacks (NILM as a side-effect of thwarting detection attacks.

  12. Detecting peripheral-based attacks on the host memory

    CERN Document Server

    Stewin, Patrick

    2015-01-01

    This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals generally communicate with the host via the host’s main memory, storing cryptographic keys, passwords, opened files and other sensitive data in the process – an aspect attackers are quick to exploit.  Here, stealthy malicious software based on isolated micro-controllers is implemented to conduct an attack analysis, the results of which provide the basis for developing a novel runtime detector. The detector reveals stealthy peripheral-based attacks on the host’s main memory by exploiting certain hardware properties, while a permanent and resource-efficient measurement strategy ensures that the detector is also capable of detecting transient attacks, which can otherwise succeed when the applied strategy only me...

  13. Why cryptography should not rely on physical attack complexity

    CERN Document Server

    Krämer, Juliane

    2015-01-01

    This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two indepe...

  14. Multi-Layer Approach for the Detection of Selective Forwarding Attacks.

    Science.gov (United States)

    Alajmi, Naser; Elleithy, Khaled

    2015-11-19

    Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable.

  15. Multi-Layer Approach for the Detection of Selective Forwarding Attacks

    Directory of Open Access Journals (Sweden)

    Naser Alajmi

    2015-11-01

    Full Text Available Security breaches are a major threat in wireless sensor networks (WSNs. WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD. The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable.

  16. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  17. Trojan-horse attacks on quantum-key-distribution systems

    International Nuclear Information System (INIS)

    Gisin, N.; Fasel, S.; Kraus, B.; Zbinden, H.; Ribordy, G.

    2006-01-01

    General Trojan-horse attacks on quantum-key-distribution systems, i.e., attacks on Alice or Bob's system via the quantum channel, are analyzed. We illustrate the power of such attacks with today's technology and conclude that all systems must implement active counter measures. In particular, all systems must include an auxiliary detector that monitors any incoming light. We show that such counter measures can be efficient, provided that enough additional privacy amplification is applied to the data. We present a practical way to reduce the maximal information gain that an adversary can gain using Trojan-horse attacks. This does reduce the security analysis of the two-way plug-and-play implementation to those of the standard one-way systems

  18. Computer Network Attacks and Modern International Law

    Directory of Open Access Journals (Sweden)

    Andrey L. Kozik

    2014-01-01

    Full Text Available Computer network attacks (CNA is a no doubt actual theoretical and practical topic today. Espionage, public and private computer-systems disruptions committed by states have been a real life. States execute CNA's involving its agents or hiring private hacker groups. However, the application of lex lata remains unclear in practice and still undeveloped in doctrine. Nevertheless the international obligations, which states have accepted under the UN Charter and other treaties as well as customs - with any related exemptions and reservations - are still in force and create a legal framework, which one cannot ignore. Taking into account the intensity level or the consequences of a CNA the later could be considered as an unfriendly, but legal doing, or, as a use of force (prohibited under the article 2(4 of the UN Charter, or - in the case the proper threshold is taken - as an armed attack (which gives the victim-state the right to use force in self-defence under the customs and the article 51 of the UN Charter. Researches in the field of lex lata applicability to the CNAs could highlight gaps and week points of the nowadays legal regime. The subject is on agenda in western doctrine, and it is a pity - not in Russian one - the number of publication here is still unsatisfied. The article formulates issues related to CNAs and the modern international legal regime. The author explores the definition, legal volume of the term CNA, highlights main issues, which have to be analyzed from the point of the contemporary law.

  19. 12 CFR 308.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... PRACTICE RULES OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 308.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any...

  20. 12 CFR 19.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 19.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all...