WorldWideScience

Sample records for politicians spin attacks

  1. Harassment, stalking, threats and attacks targeting New Zealand politicians: A mental health issue.

    Science.gov (United States)

    Every-Palmer, Susanna; Barry-Walsh, Justin; Pathé, Michele

    2015-07-01

    Due to the nature of their work, politicians are at greater risk of stalking, harassment and attack than the general population. The small, but significantly elevated risk of violence to politicians is predominantly due not to organised terrorism or politically motivated extremists but to fixated individuals with untreated serious mental disorders, usually psychosis. Our objective was to ascertain the frequency, nature and effects of unwanted harassment of politicians in New Zealand and the possible role of mental illness in this harassment. New Zealand Members of Parliament were surveyed, with an 84% response rate (n = 102). Quantitative and qualitative data were collected on Parliamentarians' experiences of harassment and stalking. Eighty-seven percent of politicians reported unwanted harassment ranging from disturbing communications to physical violence, with most experiencing harassment in multiple modalities and on multiple occasions. Cyberstalking and other forms of online harassment were common, and politicians felt they (and their families) had become more exposed as a result of the Internet. Half of MPs had been personally approached by their harassers, 48% had been directly threatened and 15% had been attacked. Some of these incidents were serious, involving weapons such as guns, Molotov cocktails and blunt instruments. One in three politicians had been targeted at their homes. Respondents believed the majority of those responsible for the harassment exhibited signs of mental illness. The harassment of politicians in New Zealand is common and concerning. Many of those responsible were thought to be mentally ill by their victims. This harassment has significant psychosocial costs for both the victim and the perpetrator and represents an opportunity for mental health intervention. © The Royal Australian and New Zealand College of Psychiatrists 2015.

  2. Experimental Flight Characterization of Spin Stabilized Projectiles at High Angle of Attack

    Science.gov (United States)

    2017-08-07

    impact point prediction for applications such as high-arcing, spin-stabilized munitions. 15. SUBJECT TERMS aerodynamics, spark range, spin...angles of attack increase the delivery error due to poor fire-control solutions (i.e., understanding the relationship between the gun pointing angle and...of downrange travel ) is also evident in the horizontal data. Fig. 3 Center-of-gravity motion The rolling motion is captured in Fig. 4. These

  3. Politicians spin attacks against methadone, syringe replacement / Milda Seputyte

    Index Scriptorium Estoniae

    Seputyte, Milda

    2005-01-01

    Leedu parlamendiliikmed osalevad kampaanias, millega võideldakse narkomaanidele tasuta süstalde jagamise ja sõltuvuse vastase aine metadooni vastu, kuna nende arvates need meetmed pigem süvendavad narkomaaniat

  4. “GLOSSY” POLITICIANS: PORTRAYING WOMEN POLITICIANS IN ROMANIAN CONSUMER MAGAZINES

    Directory of Open Access Journals (Sweden)

    ROMINA SURUGIU

    2012-05-01

    Full Text Available Women consumer magazines (glossies represent the most important part of the specialized media all over the world. The main ingredients of their editorial “recipe” are the positive tone of the articles, and the optimistic, yet shallow approach to all the theme/subjects covered. Magazines are considered to be beautiful objects that inspire people to cherish them. Women magazines have been criticized in feminist media studies for portraying women in a stereotyped way and for encouraging a consumerist behavior among them. The role models offered by these media are mainly taken from the show business and fashion industry. Women politician are rarely present in the pages of these publications, especially in countries as Romania where the political participation of women is one of the lowest in Europe. The paper presents in the first part official figures regarding the political participation of Romanian women, and it discusses the results of the most important academic studies on women and media. A previous research showed, for example, that in a four years period, three important Romanian magazines published only 9 article presenting women politicians. The general assumption in magazines desks (and in the society is that politics is a dirty business that does not match the beautiful world of magazines. The second part will focus on a case study, considered to be relevant for explaining the general image of women politicians and politics in Romanian consumer magazines. A visual analysis (from the popular culture perspective will be done to Elena Udrea’s pictorial feature for Tabu (Taboo magazine (November 2011. The choice of the case study was motivated by the following reasons: Elena Udrea is a controversial, yet successful politician, she has impersonated popular culture icons (Madonna, Jackie, Cleopatra and the feature has generated many positive and negative comments in media.

  5. Politicians' Motivation, Role of Elections, and Policy Choices

    NARCIS (Netherlands)

    P.T. Wrasai (Phongthorn)

    2005-01-01

    textabstractWe develop a simple two period model to study the importance of motivational differences among politicians in describing the role of elections and explaining policy choices. In our model, politicians differ in their motives of running public office. Good politicians care about policies

  6. Danish Politicians' Views on Special Operations

    DEFF Research Database (Denmark)

    Jensen, Lars Henrik Ehrensvärd

    2017-01-01

    and willingness of Danish politicians regarding the use of special operations. This may indicate a difference between the potential opportunities for employing special operations and what the politicians believe these to be and are willing to promote or allow. Conclusion: Pending further analysis of the data...

  7. Politicians lie, so do I.

    Science.gov (United States)

    Celse, Jérémy; Chang, Kirk

    2017-11-30

    This research analyzed whether political leaders make people lie via priming experiments. Priming is a non-conscious and implicit memory effect in which exposure to one stimulus affects the response to another. Following priming theories, we proposed an innovative concept that people who perceive leaders to be dishonest (such as liars) are likely to lie themselves. We designed three experiments to analyze and critically discussed the potential influence of prime effect on lying behavior, through the prime effect of French political leaders (including general politicians, presidents and parties). Experiment 1 discovered that participants with non-politician-prime were less likely to lie (compared to politician-prime). Experiment 2A discovered that, compared to Hollande-prime, Sarkozy-prime led to lying behavior both in gravity (i.e., bigger lies) and frequency (i.e., lying more frequently). Experiment 2B discovered that Republicans-prime yielded an impact on more lying behavior, and Sarkozy-prime made such impact even stronger. Overall, the research findings suggest that lying can be triggered by external influencers such as leaders, presidents and politicians in the organizations. Our findings have provided valuable insights into organizational leaders and managers in their personnel management practice, especially in the intervention of lying behavior. Our findings also have offered new insights to explain non-conscious lying behavior.

  8. Who will attack the competitors? How political parties resolve strategic and collective action dilemmas in negative campaigning.

    Science.gov (United States)

    Dolezal, Martin; Ennser-Jedenastik, Laurenz; Müller, Wolfgang C

    2017-11-01

    Negative campaigning presents parties with a collective action problem. While parties would prefer to have their competitors attacked, potential backlash effects from negative messages mean that individual politicians typically lack the incentives to carry out such attacks. We theorize that parties solve this problem by implementing a division of labour that takes into account the incentives of individual office holders, their availability for campaign activity, and media relevance. Drawing on these arguments we expect that holders of high public office and party leaders are less likely to issue attacks, leaving the bulk of the 'dirty work' to be carried out by party floor leaders and general secretaries. Examining almost 8000 press releases issued by over 600 individual politicians during four election campaigns in Austria, we find strong support for our theoretical expectations.

  9. Knowledge and attitudes of Swedish politicians concerning induced abortion.

    Science.gov (United States)

    Sydsjö, Adam; Josefsson, Ann; Bladh, Marie; Muhrbeck, Måns; Sydsjö, Gunilla

    2012-12-01

    Induced abortion is more frequent in Sweden than in many other Western countries. We wanted to investigate attitudes and knowledge about induced abortion among politicians responsible for healthcare in three Swedish counties. A study-specific questionnaire was sent to all 375 elected politicians in three counties; 192 (51%) responded. The politicians stated that they were knowledgeable about the Swedish abortion law. More than half did not consider themselves, in their capacity as politicians, sufficiently informed about abortion-related matters. Most politicians (72%) considered induced abortion to be primarily a 'women's rights issue' rather than an ethical one, and 54% considered 12 weeks' gestational age an adequate upper limit for induced abortion. Only about a third of the respondents were correctly informed about the number of induced abortions annually carried out in Sweden. Information and knowledge on induced abortion among Swedish county politicians seem not to be optimal. Changes aimed at reducing the current high abortion rates will probably not be easy to achieve as politicians seem to be reluctant to commit themselves on ethical issues and consider induced abortion mainly a women's rights issue.

  10. Politics Backstage - Television Documentaries, Politics and Politicians

    Directory of Open Access Journals (Sweden)

    Ib Bondebjerg

    2006-09-01

    Full Text Available This article deals with "the transformation of visibility" in political discourse on and representation of politics and politicians in resent Dansih television documentaries. Drawing on the theories of Habermas, Meyrowitz and John B. Thompson, it is argued that the political persona on television is moved closer to the individual citizen, creating a sort "mediated quasi-inter- action" giving mediated communication a stronger element of face-to-face interaction. Together with the more pervasive "live" coverage of politics and politicians, this expands media coverage to both the backstage of political processes and the private and personal backstage of politicians, changing the form of democracy and public debate.

  11. Politicians, Managers, and Street-Level Bureaucrats

    DEFF Research Database (Denmark)

    May, Peter J.; Winter, Søren

    2010-01-01

    This article addresses the influence of politicians, managers, and the dispositions of street-level bureaucrats in shaping actions at the frontlines of policy implementation. We investigate these for the implementation of employment policy reforms in Denmark. Our findings show a large percentage...... of caseworkers emphasizing actions that are consistent with the national employment reform goal of getting clients into jobs quickly. The influence of politicians and managers in bringing this about is relatively limited in comparison to the influences of caseworkers’ understanding of policy goals...

  12. Politicians, Managers, and Street-Level Bureaucrats

    DEFF Research Database (Denmark)

    J. May, Peter; Winter, Søren

    2009-01-01

    This article addresses the influence of politicians, managers, and the dispositions of street-level bureaucrats in shaping actions at the frontlines of policy implementation. We investigate these for the implementation of employment policy reforms in Denmark. Our findings show a large percentage...... of caseworkers emphasizing actions that are consistent with the national employment reform goal of getting clients into jobs quickly. The influence of politicians and managers in bringing this about is relatively limited in comparison to the influences of caseworkers’ understanding of policy goals...

  13. Campaign Spending with Office-Seeking Politicians, Rational Voters and Multiple Lobbies

    NARCIS (Netherlands)

    Prat, A.

    1998-01-01

    I introduce a microfounded model of campaign finance with office-seeking politicians, a continuum of voters, and a large number of heterogeneous lobbies. Lobbies make contributions to politicians according to a common agency framework. Politicians use contributions to finance their electoral

  14. Magnus effects on spinning transonic missiles

    Science.gov (United States)

    Seginer, A.; Rosenwasser, I.

    1983-01-01

    Magnus forces and moments were measured on a basic-finner model spinning in transonic flow. Spin was induced by canted fins or by full-span or semi-span, outboard and inboard roll controls. Magnus force and moment reversals were caused by Mach number, reduced spin rate, and angle of attack variations. Magnus center of pressure was found to be independent of the angle of attack but varied with the Mach number and model configuration or reduced spin rate.

  15. Politicians, Managers, and Street-Level Bureaucrats

    DEFF Research Database (Denmark)

    May, Peter J.; Winter, Søren

    2012-01-01

    This article addresses the influence of politicians, managers, and the dispositions of street level bureaucrats in shaping actions at the frontlines of policy implementation. We investigate these for the implementation of employment policy reforms in Denmark. Our findings show a large percentage...... of caseworkers emphasizing actions that are consistent with thenational employment reform goal of getting clients into jobs quickly. The influence of politicians and managers in bringing this about is relatively limited in comparison to the influences of caseworkers’ understanding of policy goals......, their professional knowledge, and their policy predispositions. Our main contribution is an unpacking of the political and managerial influences on caseworkers’ policy emphases. We find direct effects and, more notably, indirect effects that operate on the influence of caseworkers’ perceptions of policy goals...

  16. When Perception Becomes Reality and Truth is Relative: Spin Strategies and Political Influence over Media Reporting in Macedonian Media

    Directory of Open Access Journals (Sweden)

    Žaneta Trajkoska

    2018-03-01

    Full Text Available The power of politicians presenting itself in front of the public rests in the media, so politicians are likely to use the media to create the preferred media frames and to set the agenda (agenda setting. Worldwide, spin-doctors have their own influence in the modeling of the media reality, processes that are comparable in Macedonia as well. The paper strive to describe the presence of the spinning in Macedonia and its impact on the news content. Furthermore, it deals with the spinning tactics and their manifestation in the political communication, explaining the models in which political spinning is functioning in Macedonia. Main research questions are focused on: (1 how does the process of creating the news is carry out and what affects the news content production; (2 what specific strategic doctrines spin-doctors are using to influence the process of daily reporting and to participate in the creation of the media reality; (3 how the spin-doctors present information and communicate with the public and what methods and tools are characteristic for spinning cycles.

  17. Criticizing politicians in Ancient Comedy

    Directory of Open Access Journals (Sweden)

    María José García Soler

    2016-08-01

    Full Text Available Old Comedy brought into focus all aspects of life in Athens, with an infinitefreedom of speech. One of its main targets were the politicians who ruled thedestinies of the polis, criticized mercilessly for their public activities, but also fortheir physical and moral characteristics.

  18. [The cognitive-behavioral aspects of the personality of politicians].

    Science.gov (United States)

    Resch, Mária; Bella, Tamás

    2010-01-17

    At the research of the personality of politicians, the task is not psychopathology and thereby the diagnose of a certain illness, but the identification of those features, characteristic marks and the examination of those cognitive functions, attitudes that might affect the ability to lead, might influence the managerial and negotiating style as well as the decisions made during an eventual crisis. Basically, there are two approaches considering the role of personality in politics. The first one regards political events as a projection of the personality of the leading politician; the other one denies entirely the significance of the personality. With reference to the first school, the aim of the present essay is, from among the examinations of the personality of the politician by indirect and direct methods, the determination of the cognitive and behavioral marks connected to the last method. Among the indirect examinations are the analysis of speeches and interviews (psycholinguistics), the reflection of the metacommunicative marks and the psychological elaboration of biographical data (psychobiography). The character of the leading politician is important with respect to image building, campaign work and party competition, "survival".

  19. Politicians, Managers, and Street-Level Bureaucrats

    DEFF Research Database (Denmark)

    J. May, Peter; Winter, Søren

    This article addresses the influence of politicians, managers, and the dispositions of street-level bureaucrats in shaping actions at the frontlines of policy implementation. We investigate these for the implementation of employment policy reforms in Denmark. Our findings show a large percentage ...

  20. The Working Conditions of Elite Politicians and Administrators at the National and Local Level

    DEFF Research Database (Denmark)

    Hjelmar, Ulf; Holm Pedersen, Lene; Bhatti, Yosef

    between family and work, exposure to the media, and harassment/threats against the politicians or their families. More than 70% of the ministers and mayors answered the survey. The surveys were supplemented by in-depth interviews with 3 ministers, 4 mayors and 5 top-administrators concerning the same...... exposed to harassment. Comparing the national and the local level politicians at the national level work longer hours, but surprisingly the politicians at the local level are equally much exposed to face-to-face harassment, though less to harassment on the social media. In comparison to the top...... politicians, the top administrators are less exposed to harassment. The implications of these results for the power balance between top politicians and administrators are discussed....

  1. Trusting Politicians and Institutions in a Multi-Level Setting

    DEFF Research Database (Denmark)

    Hansen, Sune Welling; Kjær, Ulrik

    Trust in government and in politicians is a very crucial prerequisite for democratic processes. This goes not only for the national level of government but also for the regional and local. We make use of a large scale survey among citizens in Denmark to evaluate trust in politicians at different...... formation processes can negatively influence trust in the mayor and the councilors. Reaching out for the local power by being disloyal to one’s own party or by breaking deals already made can sometimes secure the mayoralty but it comes with a prize: lower trust among the electorate....

  2. Magnus effects at high angles of attack and critical Reynolds numbers

    Science.gov (United States)

    Seginer, A.; Ringel, M.

    1983-01-01

    The Magnus force and moment experienced by a yawed, spinning cylinder were studied experimentally in low speed and subsonic flows at high angles of attack and critical Reynolds numbers. Flow-field visualization aided in describing a flow model that divides the Magnus phenomenon into a subcritical region, where reverse Magnus loads are experienced, and a supercritical region where these loads are not encountered. The roles of the spin rate, angle of attack, and crossflow Reynolds number in determining the boundaries of the subcritical region and the variations of the Magnus loads were studied.

  3. Divine marriage and the image of a politician

    Directory of Open Access Journals (Sweden)

    Šerman Elena M.

    2014-01-01

    Full Text Available It is a common place of the contemporary political science that the pattern of the image of a politician contains components based on the archaic cognitive structures. First of all, to such components the archetypes belong. The archetype is in turn intimately associated with the corresponding myth and ritual. Some of the rituals that accompany the realization of an archetype have roots stretching back into the cradle of human civilization, but remain relevant in the 21st century. The paper deals with the technologies of using the mythological motif of the divine (sacred marriage as a means of cultivation of the image of a politician. As a case studies the marriages of Corneliu Zelea Codreanu, the leader of the Rumanian extreme right-wing 'Legion of the Archangel Michael' (1926, and of the radical Yugoslav nationalist Željko Ražnatović Arkan, the commander of the 'Serb Volunteer Guard' (1995, are taken. The use of this subject has everything to do with the Jungian archetype which forms the basis of the image of the extreme right-wing politicians, namely, that of the Hero, for the motif of the 'bride acquisition' with the subsequent marriage is one of the culmination points of the corresponding mythological narrative. As the mass media render national importance to the actual marriage, not only does it activate through certain technologies the archaic layers of conscience of the target population, but it also reproduces an old behavioural pattern, i. e. participation in the mystery. In the author's opinion, the success of the activation of the divine marriage motif depends on a series of factors, such as the type of the society (agrarian or semi-agrarian, the charismatic type of the political leader, as well as certain ideology. The successful use of this motif makes it possible not only to sustain the positive image of a politician, but also to create a political myth. The author gives special consideration to the role of mass media in this

  4. How politicians and bureaucrats network

    DEFF Research Database (Denmark)

    Alexander, Damon; Lewis, Jenny; Considine, Mark

    2011-01-01

    Effective public administration relies on the passage of information through interpersonal communication networks. While we have a vast research literature concerning formal structures and roles in organizations, including public agencies and government institutions, we know far less about the flow...... of information through semiformal, voluntary interactions. In this paper we use a large survey to explore the networking patterns of politicians and bureaucrats and to compare these with the more formal structural attributes of hierarchy and functional specialization. Social network analysis and standard...

  5. Actors in Corruption: Business Politicians in Italy.

    Science.gov (United States)

    della Porta, Donatella

    1996-01-01

    Argues that the development of political corruption brings about important changes in the political system and in the characteristics of the political class. Describes the emergence and activities of a group of "business politicians" in Italy who have transformed political parties into socializing agencies for illicit activities. (MJP)

  6. Effect of holding office on the behavior of politicians.

    Science.gov (United States)

    Enemark, Daniel; Gibson, Clark C; McCubbins, Mathew D; Seim, Brigitte

    2016-11-29

    Reciprocity is central to our understanding of politics. Most political exchanges-whether they involve legislative vote trading, interbranch bargaining, constituent service, or even the corrupt exchange of public resources for private wealth-require reciprocity. But how does reciprocity arise? Do government officials learn reciprocity while holding office, or do recruitment and selection practices favor those who already adhere to a norm of reciprocity? We recruit Zambian politicians who narrowly won or lost a previous election to play behavioral games that provide a measure of reciprocity. This combination of regression discontinuity and experimental designs allows us to estimate the effect of holding office on behavior. We find that holding office increases adherence to the norm of reciprocity. This study identifies causal effects of holding office on politicians' behavior.

  7. The Tradition of Marketing Nigeria Politicians through Visual Media ...

    African Journals Online (AJOL)

    The Tradition of Marketing Nigeria Politicians through Visual Media. ... Before Nigerian independence in 1960, all political campaigns and debates were limited by the colonial masters to ... EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT

  8. Walking the tightrope-perspectives on local politicians' role in implementing a national social care policy on evidence-based practice.

    Science.gov (United States)

    Bäck, A; Ståhl, C; von Thiele Schwarz, U; Richter, A; Hasson, H

    2016-01-01

    Despite national policy recommending evidence-based practice (EBP), its application in social care has been limited. While local politicians can affect the process, little is known about their knowledge, attitudes and roles regarding EBP. The aim here is twofold: to explore the role of local politicians in the implementation of EBP in social care from both their own and a management perspective; and to examine factors politicians perceive as affecting their decisions and actions concerning the implementation of EBP policy. Local politicians (N = 13) and managers (N = 22) in social care were interviewed. Qualitative thematic analysis with both inductive and deductive codes was used. Politicians were rather uninformed regarding EBP and national policy. The factors limiting their actions were, beside the lack of awareness, lack of ability to question existing working methods, and a need for support in the steering of EBP. Thus, personal interest played a significant part in what role the politicians assumed. This resulted in some politicians taking a more active role in steering EBP while others were not involved. From the managers' perspective, a more active steering by politicians was desired. Setting budget and objectives, as well as active follow-up of work processes and outcomes, were identified as means to affect the implementation of EBP. However, the politicians seemed unaware of the facilitating effects of these actions. Local politicians had a possibility to facilitate the implementation of EBP, but their role was unclear. Personal interest played a big part in determining what role was taken. The results imply that social care politicians might need support in the development of their steering of EBP. Moving the responsibility for EBP facilitation upwards in the political structure could be an important step in developing EBP in social care.

  9. The Digital Political Communication of South Korean Politicians

    Directory of Open Access Journals (Sweden)

    Heike Hermanns

    2017-12-01

    Full Text Available The internet and social media have been credited with the potential to reinvigorate democracy by offering new avenues of political participation and communication between citi-zens and politicians. The results of empirical studies, however, call for caution, as many politi-cians refrain from fully exploring the interactive potential of new media. This case study focus-es on the web presence of Korean parliamentarians, using basic statistical analyses to explore the use of ICT as a means of political communication. It finds that Korean parliamentarians are less active online, treating ICT mainly as another channel for information distribution. It is thus concluded that ICT is not revolutionizing politics but reinforcing existing patterns of communi-cation that leave a gap between citizens and representatives. This paper was previously submit-ted to CeDem Asia 2016. The literature review and the methodology section have been expand-ed, and additional statistical data as well as further findings on Twitter were added.

  10. MARKETING POLITICIANS ON FACEBOOK: AN EXAMINATION OF THE SINGAPORE GENERAL ELECTION 2011

    OpenAIRE

    LENG Ho Keat

    2012-01-01

    In recent years, politicians have been using social network sites in garnering votes and supporters. However, marketing on social network sites is distinctively different from traditional marketing as consumers no longer play a passive role on this new marketing platform. This paper examines the use of social network site by two young female politicians in the recent General Election in Singapore and concludes that campaigning on social network sites raises two important issues. First of all,...

  11. Outsourcing primary health care services--how politicians explain the grounds for their decisions.

    Science.gov (United States)

    Laamanen, Ritva; Simonsen-Rehn, Nina; Suominen, Sakari; Øvretveit, John; Brommels, Mats

    2008-12-01

    To explore outsourcing of primary health care (PHC) services in four municipalities in Finland with varying amounts and types of outsourcing: a Southern municipality (SM) which contracted all PHC services to a not-for-profit voluntary organization, and Eastern (EM), South-Western (SWM) and Western (WM) municipalities which had contracted out only a few services to profit or public organizations. A mail survey to all municipality politicians (response rate 52%, N=101) in 2004. Data were analyzed using cross-tabulations, Spearman correlation and linear regression analyses. Politicians were willing to outsource PHC services only partially, and many problems relating to outsourcing were reported. Politicians in all municipalities were least likely to outsource preventive services. A multiple linear regression model showed that reported preference to outsource in EM and in SWM was lower than in SM, and also lower among politicians from "leftist" political parties than "rightist" political parties. Perceived difficulties in local health policy issues were related to reduced preference to outsource. The model explained 27% of the variance of the inclination to outsource PHC services. The findings highlight how important it is to take into account local health policy issues when assessing service-provision models.

  12. How Politicians' Reelection Efforts Can Reduce Public Trust, Electoral Support, and Policy Approval

    DEFF Research Database (Denmark)

    Bøggild, Troels

    2016-01-01

    shows that, in addition to outcomes, people care about procedural fairness and, particularly, impartial decision-makers who make decisions without personal motives and interests. This, I argue, confronts politicians with a delicate task: Politicians must present voters with favorable policy outcomes...... but without appearing as if they pursue these policies based on a personal, vote-maximizing motive for reelection. In four survey experiments, I find support for this argument. Participants were significantly less inclined to trust and vote for politicians and support their policies when political decisions......Politicians’ desire for reelection motivates them to be responsive to voters’ policy preferences. In the traditional view, voters choose between candidates based on their delivery of favorable outcomes such as ideologically appealing policies or a prospering economy. However, research in psychology...

  13. From hybrid-media system to hybrid-media politicians

    DEFF Research Database (Denmark)

    Blach-Ørsten, Mark; Eberholst, Mads Kæmsgaard; Burkal, Rasmus

    2017-01-01

    ’ media use is changing rapidly; 15%–16% of Danish candidates used Twitter in 2011 but 68% in 2015. In this large-sample content analysis, party leaders have high traditional-news-media and low Twitter presence, and younger candidates visa-versa, but some politicians have high presence in both. Hybrid...

  14. Rational Planning and Politicians' Preferences for Spending and Reform

    DEFF Research Database (Denmark)

    George, Bert; Deschmidt, Sebastian; Nielsen, Poul Aaes

    2017-01-01

    The rational planning cycle of formulating strategic goals and using performance information to assess goal implementation is assumed to assist decision-making by politicians. Empirical evidence supporting this assumption is scarce. Our study replicates Nielsen and Baekgaard's (2015) experiment...

  15. Women Politicians and Parliamentary Elections in Ukraine and Georgia in 2012

    Directory of Open Access Journals (Sweden)

    Tetiana Kostiuchenko

    2015-09-01

    Full Text Available Abstract: Post-communist countries undergoing social transformations in the last twenty years needed to implement political and economic reforms. Changes also had to support the principles of equality in the access to power, specifically gender quotas in executive and legislative branches of government and within political parties. The events in Ukraine and Georgia in 2004-2005 known as the “colour revolutions” gave impulse to the promotion of equality and implementation of reforms. However, the number of women participating in national politics in both countries remains low. This paper proposes an analysis of gender equality principles during the parliamentary election campaigns in Ukraine and Georgia in 2012 from the perspective of women’s participation in politics and their self-representation as politicians. This empirical study covers public attitudes towards women in politics and examines networks of female parliamentarians. The findings raise hopes for better representation of women in politics as female politicians promote them from the top down, and mass public perception of gender equality principles set the ground for bottom-up activism. Keywords: Gender Equality, Women Politicians, Public Attitudes, Social Network Analysis (SNA

  16. Politics Backstage - Television Documentaries, Politics and Politicians

    OpenAIRE

    Ib Bondebjerg

    2006-01-01

    This article deals with "the transformation of visibility" in political discourse on and representation of politics and politicians in resent Dansih television documentaries. Drawing on the theories of Habermas, Meyrowitz and John B. Thompson, it is argued that the political persona on television is moved closer to the individual citizen, creating a sort "mediated quasi-inter- action" giving mediated communication a stronger element of face-to-face interaction. Together...

  17. Personality and Party Ideology Among Politicians. A Closer Look at Political Elites From Canada and Belgium

    Science.gov (United States)

    Joly, Jeroen K.; Hofmans, Joeri; Loewen, Peter

    2018-01-01

    We examined the relationship between Big Five personality and the political ideology of elected politicians. To this end, we studied 303 politicians from Flanders, Wallonia, and Canada, relating their self-reported Big Five scores to a partisanship-based measure of political ideology. Our findings show that, in line with the congruency model of personality, Openness to Experience is the best and most consistent correlate of political ideology, with politicians high on Openness to Experience being more likely to be found among the more progressive left-wing political parties. PMID:29719525

  18. Personality and Party Ideology Among Politicians. A Closer Look at Political Elites From Canada and Belgium.

    Science.gov (United States)

    Joly, Jeroen K; Hofmans, Joeri; Loewen, Peter

    2018-01-01

    We examined the relationship between Big Five personality and the political ideology of elected politicians. To this end, we studied 303 politicians from Flanders, Wallonia, and Canada, relating their self-reported Big Five scores to a partisanship-based measure of political ideology. Our findings show that, in line with the congruency model of personality, Openness to Experience is the best and most consistent correlate of political ideology, with politicians high on Openness to Experience being more likely to be found among the more progressive left-wing political parties.

  19. Time-motion analysis of goalball players in attacks: differences of the player positions and the throwing techniques.

    Science.gov (United States)

    Monezi, Lucas Antônio; Magalhães, Thiago Pinguelli; Morato, Márcio Pereira; Mercadante, Luciano Allegretti; Furtado, Otávio Luis Piva da Cunha; Misuta, Milton Shoiti

    2018-03-26

    In this study, we aimed to analyse goalball players time-motion variables (distance covered, time spent, maximum and average velocities) in official goalball match attacks, taking into account the attack phases (preparation and throwing), player position (centres and wings) and throwing techniques (frontal, spin and between the legs). A total of 365 attacks were assessed using a video based method (2D) through manual tracking using the Dvideo system. Inferential non-parametric statistics were applied for comparison of preparation vs. throwing phase, wings vs. centres and, among the throwing techniques, frontal, spin and between the legs. Significant differences were found between the attack preparation versus the throwing phase for all player time-motion variables: distance covered, time spent, maximum player velocity and average player velocity. Wing players performed most of the throws (85%) and covered longer distances than centres (1.65 vs 0.31 m). The between the legs and the spin throwing techniques presented greater values for most of the time-motion variables (distance covered, time spent and maximum player velocity) than did the frontal technique in both attack phases. These findings provide important information regarding players' movement patterns during goalball matches that can be used to plan more effective training.

  20. Gender differences in personal values of national and local Italian politicians, activists and voters.

    Science.gov (United States)

    Francescato, Donata; Mebane, Minou E; Vecchione, Michele

    2017-10-01

    Theorists of politics of presence postulate that women elected to political office would still hold values similar to ordinary women and therefore represent them better than male politicians. Gender differences in personal values, which underline and give coherence to core political values, have been found among voters: males score higher on self-enhancement values (power and achievement) and females higher on self-transcendence values (universalism and benevolence). Our study aims to explore if gender differences in personal values are still present among activists, local and national politicians. We administer a shortened version of the Portrait Values Questionnaire to 233 Italian national politicians (46% females), 425 local politicians (56% females), 626 political activists (44% females), and 3249 ordinary citizens (49% females). Our results confirm only partially politics of presence theory: females at all levels of political involvement score higher in self-transcendent values that emphasise concern for the welfare of others, but no significant gender differences emerge for self-enhancement, which favour the pursuit of self-interest. Our findings support ethical struggles for more balanced gender representation: a higher proportion of women in politics could strengthen the political representation of self-transcendence values. © 2015 International Union of Psychological Science.

  1. Exposure to Political Disparagement Humor and Its Impact on Trust in Politicians: How Long Does It Last?

    Directory of Open Access Journals (Sweden)

    Andrés Mendiburo-Seguel

    2017-12-01

    Full Text Available The experimental research that looks into the effects of political humor on an individual’s attitudes toward politics and politicians does not evaluate its long-term effects. With this in mind, this study aims to determine the possible effects that being exposed to humor which belittles politicians may have on an ordinary citizen’s trust in them, while at the same time it observes the possible effects that such exposure has on them and the time such effects last. Two hypotheses were tested. The first one was that humor involves less cognitive elaboration, which leads to a short-term impact on the perception of the individual. The second one was that the repetition of a message can augment the swing of such message. Also, a series of elements regarding disposition toward politicians and political affiliation were considered. Two experiments were designed. The first experiment, (N = 94, considered three groups: one exposed to political disparagement humor; one control group exposed to disparagement humor against non-politician subjects; and a control group exposed to a non-humorous political video. Trust in politicians was evaluated first at baseline, then immediately after the experimental manipulation, and once again a week after the experimental manipulation had happened. In the second experiment (N = 146, participants were randomly assigned to one experimental and two control groups. The trust in politicians of the three groups was estimated and they were sent political cartoons, non-political cartoons, and newspaper headlines regarding political topics twice a day for a week via WhatsApp. Trust in politicians among the three groups was assessed again after 1 week, and for a third time 1 week after that. As a result, it was observed that a one-off exposure to political disparagement humor affects trust in politicians negatively; however, the effect it attains is short-lived and can be explained through the political content of the item and

  2. Exposure to Political Disparagement Humor and Its Impact on Trust in Politicians: How Long Does It Last?

    Science.gov (United States)

    Mendiburo-Seguel, Andrés; Vargas, Salvador; Rubio, Andrés

    2017-01-01

    The experimental research that looks into the effects of political humor on an individual's attitudes toward politics and politicians does not evaluate its long-term effects. With this in mind, this study aims to determine the possible effects that being exposed to humor which belittles politicians may have on an ordinary citizen's trust in them, while at the same time it observes the possible effects that such exposure has on them and the time such effects last. Two hypotheses were tested. The first one was that humor involves less cognitive elaboration, which leads to a short-term impact on the perception of the individual. The second one was that the repetition of a message can augment the swing of such message. Also, a series of elements regarding disposition toward politicians and political affiliation were considered. Two experiments were designed. The first experiment, ( N = 94), considered three groups: one exposed to political disparagement humor; one control group exposed to disparagement humor against non-politician subjects; and a control group exposed to a non-humorous political video. Trust in politicians was evaluated first at baseline, then immediately after the experimental manipulation, and once again a week after the experimental manipulation had happened. In the second experiment ( N = 146), participants were randomly assigned to one experimental and two control groups. The trust in politicians of the three groups was estimated and they were sent political cartoons, non-political cartoons, and newspaper headlines regarding political topics twice a day for a week via WhatsApp. Trust in politicians among the three groups was assessed again after 1 week, and for a third time 1 week after that. As a result, it was observed that a one-off exposure to political disparagement humor affects trust in politicians negatively; however, the effect it attains is short-lived and can be explained through the political content of the item and not only humor

  3. How Politicians Make Decisions: A Political Choice Experiment

    OpenAIRE

    Fatás, Enrique; Neugebauer, Tibor; Tamborero, Pilar

    2004-01-01

    The present paper reports on a political choice experiment with elected real-world politicians. A questionnaire on political and public issues is taken to examine whether prospect theory predicts the responses of experts from the field better than rational choice theory. The results indicate that framing effects exist but that expertise may weaken the deviation from rational choice.

  4. Do People “Like” Politicians on Facebook? Not really

    DEFF Research Database (Denmark)

    Nielsen, Rasmus Kleis; Cristian, Vaccari

    2013-01-01

    The online popularity of a few exceptional candidates has led many to suggest that social media have given politicians powerful new ways of communicating directly with voters. Examining whether this is happening on a significant scale, we find that, based on analysis of 224 major party candidates...

  5. Rotary balance data for a single-engine trainer design for an angle-of-attack range of 8 deg to 90 deg. [conducted in langely spin tunnel

    Science.gov (United States)

    Pantason, P.; Dickens, W.

    1979-01-01

    Aerodynamic characteristics obtained in a rotational flow environment utilizing a rotary balance located in the Langley spin tunnel are presented in plotted form for a 1/6 scale, single engine trainer airplane model. The configurations tested included the basic airplane, various wing leading edge devices, elevator, aileron and rudder control settings as well as airplane components. Data are presented without analysis for an angle of attack range of 8 to 90 degrees and clockwise and counter-clockwise rotations.

  6. Political strategies in difficult times - The "backstage" experience of Swedish politicians on formal priority setting in healthcare.

    Science.gov (United States)

    Garpenby, Peter; Nedlund, Ann-Charlotte

    2016-08-01

    This paper contributes to the knowledge on the governing of healthcare in a democratic context in times of austerity. Resource allocation in healthcare is a highly political issue but the political nature of healthcare is not always made clear and the role of politicians is often obscure. The absence of politicians in rationing/disinvestment arrangements is usually explained with blame-shifting arguments; they prefer to delegate "the burden of responsibility" to administrative agencies or professionals. Drawing on a case where Swedish regional politicians involved themselves in setting priorities at a more detailed level than previously, the findings suggest that the subject of "blame avoidance" is more complicated than usually assumed. A qualitative case study was designed, involving semi-structured interviews with 14 regionally elected politicians in one Swedish health authority, conducted in June 2011. The interviews were analysed through a thematic analysis in accordance with the "framework approach" by Ritchie and Lewis. Findings show that an overarching strategy among the politicians was to appear united and to suppress conflict, which served to underpin the vital strategy of bringing the medical profession into the process. A key finding is the importance that politicians, when appearing "backstage", attach to the prevention of blame from the medical profession. This case illustrates that one has to take into account that priority settings requires various types of skills and knowledges - not only technical but also political and social. Another important lesson points toward the need to broaden the political leadership repertoire, as leadership in the case of priority setting is not about politicians being all in or all out. The results suggest that in a priority-setting process it is of importance to have politics on-board at an early stage to secure loyalty to the process, although not necessarily being involved in all details. Copyright © 2016 Elsevier

  7. Politics and Politicians – Main Topic and Main Characters on Television News

    Directory of Open Access Journals (Sweden)

    Viktorija Car

    2010-01-01

    Full Text Available The paper examines the relationship between television as a medium, and politics and politicians as the content of television news in Croatia. The first part of the paper explains the models of ‘media logic’, ‘partisan logic’ and ‘party logic’. The second part of the paper presents the results of the research conducted on the representative sample of primetime news HTV Dnevnik for the period 1991-2009, and Nova TV Dnevnik and RTL Vijesti for the period 2005-2009. The goal of the research was to examine the presence of political topics on primetime news, as well to what extent politicians are presented as main characters. The results show a sustained decline of politics on the news and their simultaneous replacement by news on disasters and lifestyle. Further, citizens and their opinion become more important than opinions of politicians, experts and scientists. Comparing the news on public service television and on commercial televisions, the author elaborates on the internal processes and changes of the television medium and finally introduces the concept of ‘power logic’ to explain news selection and news editing on the Croatian TV channels.

  8. How Do Politicians Attribute Bureaucratic Responsibility for Performance? Negativity Bias and Interest Group Advocacy

    DEFF Research Database (Denmark)

    Nielsen, Poul A.; Moynihan, Donald P.

    2017-01-01

    Voters reward or punish politicians by deeming them responsible for positive and negative outcomes, but how, in turn, do politicians attribute responsibility to those who actually deliver public services? Inattention to this question renders incomplete current perspectives on democratic processes...... to attribute causal responsibility to bureaucratic leaders, but only in cases of low performance, suggesting a negativity bias in public sector responsibility attribution processes. Additionally, we offer evidence that interest group advocates influence how elected officials use performance information...... to attribute responsibility, but contingent on ideological alignment....

  9. Monarchy, jesters, politicians and audiences Comparison of TV satire in UK and Spain

    Directory of Open Access Journals (Sweden)

    José Luis Valhondo Crego, Ph. D.

    2011-01-01

    Full Text Available Satire programmes have become a frequent form of political communication on TV. After the liberalisation of media and the globalization of formats, countries like Spain have adopted satirical formats derived from earlier ones, which relied on old traditions from nearly the inception of television similar to the United Kingdom. The goal of this article is to build a definition of the genre, taking into account the examples of the two mentioned countries and, also, referring to both periods, before and after liberalisation. We will use a comparative methodology relative to the profile of the audiences, of the buffoons of satire and the role played by the politicians through the short history of television satire. The results point to an evolution. During the sixties in the past century, the genre targeted the middle classes, writers tried to popularize politics for a society respectful to the Establishment and politicians censored the program in case it created an imbalance between ideological options during elections. In the nineties, satire jesters acquired the main role in the show and the politicians not only immunized themselves against satire but seemed to take advantage of it.

  10. 'Of course we are on Facebook': Use and non-use of social media among Swedish and Norwegian politicians.

    Science.gov (United States)

    Larsson, Anders O; Kalsnes, Bente

    2014-12-01

    While plenty of research has provided important insights into the uses of the Internet by politicians during elections, a relatively scarce amount of work has looked into these uses outside of such parliamentary events. This article seeks to remedy this lack of research by presenting a study on the 'routine' uses of two of the currently most popular social media services - Facebook and Twitter. Focusing on politicians elected to the national parliaments of Norway and Sweden, the article employs novel methodologies for data collection and statistical analyses in order to provide an overarching, structural view of the day-to-day social media practices of Scandinavian politicians. Findings indicate that use levels are rather low for both services - the median amount of tweets sent and messages posted on Facebook is close to one per day. Further analyses reveal that the most active politicians could be labelled as 'underdogs', as they are more likely to be younger, in opposition and out of the political limelight.

  11. THE ROLE OF LANGUAGE GAME IN THE BUILDING UP OF A POLITICIAN'S IMAGE (PRAGMALINGUISTIC PERLOCUTIONARY EXPERIMENT)

    OpenAIRE

    Khanina E. A.

    2016-01-01

    The article discusses the results of the pragmalinguistic experiment. Since language game is a result of speech creative work, which manifests the individuality of a linguistic personality, the politician can intentionally use language game and thereby consciously form his attractive image. The politician, who uses different kinds of language game, makes some personal characteristics building up the portrait aspect of effective political image more distinguished and thus affects the election ...

  12. Career or Family? The Fight of Two Prominent Scandinavian Feminist Politicians

    NARCIS (Netherlands)

    Ribberink, J.C.A.P.

    2017-01-01

    Internationally, in the twentieth century, women in higher and managerial occupations were confronted with barriers because they had to fight prejudices concerning their ability to maintain themselves in traditionally male occupations. This was the case for instance, with women politicians in the

  13. Dark Matter: The "Gravitational Pull" of Maternalist Discourses on Politicians' Decision Making for Early Childhood Policy in Australia

    Science.gov (United States)

    Bown, Kathryn; Sumsion, Jennifer; Press, Frances

    2011-01-01

    The article reports on a study investigating influences on Australian politicians' decision making for early childhood education and care (ECEC) policy. The astronomical concept of dark matter is utilised as a metaphor for considering normalising, and therefore frequently difficult to detect and disrupt, influences implicated in politicians'…

  14. Mário Schenberg: Physicist, politician and art critic

    International Nuclear Information System (INIS)

    Guzzo, M. M.; Reggiani, N.

    2015-01-01

    Mário Schenberg is considered one of the greatest theoretical physicists of Brazil. He worked in different fields of physics including thermodynamics, quantum mechanics, statistical mechanics, general relativity, astrophysics and mathematics. He was assistant of the Ukrainian naturalized Italian physicist Gleb Wataghin and worked with prestigious physicists like as the Brazilians José Leite Lopes and César Lattes, the Russian-born American George Gamow and the Indian astrophysicist Subrahmanyan Chandrasekhar. Besides, he was also an active politician and critic of art

  15. The good, the bad, and the voter: the impact of hate speech prosecution of a politician on the electoral support for his party

    NARCIS (Netherlands)

    van Spanje, J.; de Vreese, C.

    2015-01-01

    Hate speech prosecution of politicians is a common phenomenon in established democracies. Examples of politicians tried for hate speech include Nick Griffin in Britain and Jean-Marie Le Pen in France. Does hate speech prosecution of politicians affect the electoral support for their party? This is

  16. Deconstructing national leadership: politicians' accounts of electoral success and failure in the Irish Lisbon Treaty referenda.

    Science.gov (United States)

    Burns, Michele; Stevenson, Clifford

    2013-03-01

    The Self Categorization approach to national leadership proposes that leaders rhetorically construct national identity as essentialized and inevitable in order to consensualize and mobilize the population. In contrast, discursive studies have demonstrated how national politicians flexibly construct the nation to manage their own accountability in local interactions, though this in turn has neglected broader leadership processes. The present paper brings both approaches together to examine how and when national politicians construct versions of national identity in order to account for their failure as well as success in mobilizing the electorate. Eight semi-structured conversational style interviews were conducted with a strategic sample of eight leading Irish politicians on the subject of the 2008/2009 Irish Lisbon Treaty referenda. Using a Critical Discourse Psychology approach, the hegemonic repertoire of the 'settled will' of the informed and consensualized Irish nation was identified across all interviews. Politicians either endorsed the 'settled will' repertoire as evidence of their successful leadership, or rejected the repertoire by denying the rationality or unity of the populace to account for their failure. Our results suggest national identity is only constructed as essentialized and inevitable to the extent that it serves a strategic political purpose. © 2011 The British Psychological Society.

  17. Digital Communication and Politics in Aragon. A two-way communication formula for the interaction between politicians and citizens

    Directory of Open Access Journals (Sweden)

    María Ruiz-Carreras

    2010-01-01

    Full Text Available This research presents blogs as an innovative and rich tool for political communication. Blogs can facilitate two-way communication and true interaction between citizens and politicians. The article analyses in depth the content, uses, and characteristics of five weblogs written by Aragonese politicians. Although the study detects some weaknesses in the current political use of blogs, it encourages political parties to use blogs and other online resources, not only during electoral campaigns to improve the reputation of political leaders but also continuously and particularly in situations of special interest for the citizenship. The study shows that the use of blogs by Aragonese politicians is no longer just a transitory phenomenon and has become a reality. The article also demonstrates that politicians use blogs mostly as a pre-electoral tooland to a much lesser extent as an element of communication to promote democracy. It has been observed that politicians’ blogs are used as a tool to overcome situations of crisis and to compensate negative opinions caused by questionable acts.

  18. Geoscientists as Politicians; it is a necessity, not a luxury.

    Science.gov (United States)

    Hawarey, Mosab

    2016-04-01

    Conventionally speaking, geoscientists are not thought of as the proper material to become politicians. Rather, lawyers and businessmen are the premium candidates, all along with retired brass. This is highly eccentric when we execute a disciplined thought process based on the Measure of Rightness and Wrongness (MRW). As with any scientific research geoscientists are delighted to present to the world, any argument that lacks the underpinning MRW is useless; without the MRW one might hear 10 different opinions and consider each of them right because the presenter of each opinion has done his homework brilliantly. Facts are facts because of their own selves not because of people's perceptions of them. Perceptions might differ, but facts remain facts. Every two different points are a distance apart from each other; one straight distance. When there are 10 different opinions about that distance: bring a tape and measure it; the tape would constitute the MRW here, and the measurement might fit one out of the 10 opinions, and might fit none; there is absolutely no other probability. The same argument holds for all topics: regardless of the numerous opinions, only one is right or none is; two different opinions cannot be right at the same time. So, what is the material of Geoscientists? They are individuals with analytical capabilities, with skills to recognize problems, with skills to structure ways to deal with those problems, and with abilities to make the best usage of available resources. They are individuals who have made the conscious choice to dedicate their whole lives to study, understand, and sustain earth; hence all its inhabitants. It's not a mere profession for them; it's an obsession and way of life. By definition; they are scientists of Earth, they care about Earth as if they have fallen in love with it. It wasn't just a feeling that rushed through their veins for an hour then dissipated; they decided to pursue their own lives for the sake of maintaining

  19. What's behind the leadership shift in sustainable development from politicians to CEOs?

    NARCIS (Netherlands)

    Zoeteman, B.C.J.

    2013-01-01

    Leadership in sustainable development has gradually shifted during the past decades, with forward-thinking CEOs of prominent multinational corporations increasingly taking over the role formerly played exclusively by national politicians. This paper discusses possible drivers for a growing divide in

  20. ‘Of course we are on Facebook’: Use and non-use of social media among Swedish and Norwegian politicians

    Science.gov (United States)

    Kalsnes, Bente

    2014-01-01

    While plenty of research has provided important insights into the uses of the Internet by politicians during elections, a relatively scarce amount of work has looked into these uses outside of such parliamentary events. This article seeks to remedy this lack of research by presenting a study on the ‘routine’ uses of two of the currently most popular social media services – Facebook and Twitter. Focusing on politicians elected to the national parliaments of Norway and Sweden, the article employs novel methodologies for data collection and statistical analyses in order to provide an overarching, structural view of the day-to-day social media practices of Scandinavian politicians. Findings indicate that use levels are rather low for both services – the median amount of tweets sent and messages posted on Facebook is close to one per day. Further analyses reveal that the most active politicians could be labelled as ‘underdogs’, as they are more likely to be younger, in opposition and out of the political limelight. PMID:28596632

  1. Leading local politicians visit CERN

    CERN Multimedia

    2001-01-01

    Left to right:  Professor Maiani, Ernest Nycollin, Anne-Marie Comparini, and Jean Pépin surrounded by young PRAC. On the 13th of November leading local politicians : Mme Anne-Marie Comparini, Présidente du Conseil régional de Rhône-Alpes, M. Ernest Nycollin, Président du Conseil général de la Haute-Savoie et M. Jean Pépin, Président du Conseil général de l'Ain took part in a ceremony which featured the insertion of one of the first LHC magnets into its cryostat.  The department of l'Ain financed a large part of the contruction of building SMA 18 which will see intense activity during the assembly of LHC magnets over the next four years. The department of Haute-Savoie helped in the development of the ultrasonic welding machine for the superconducting cables and the conception of integrated circuits that will be used to measure temperature and pressure inside the magnets. T...

  2. The Influence of Negative Advertising Frames on Political Cynicism and Politician Accountability.

    Science.gov (United States)

    Schenck-Hamlin, William J.; Procter, David E.; Rumsey, Deborah J.

    2000-01-01

    Examines the influence of negative political advertising frames on the thoughts and feelings undergraduate students generate in response to campaign advertising. Finds that participants were more likely to generate cynical comments and hold politicians accountable for the country's ills when reading candidate theme advertisements than ad hoc issue…

  3. Threats to Mutual Trust: Czech Local Politicians and Local Journalists in the Era of Professional Political Communication

    Directory of Open Access Journals (Sweden)

    Roman Hájek

    2015-06-01

    Full Text Available The study discusses changes in the relationship between local journalists and local politicians in the Czech Republic as a consequence of the professionalization of political communications at national as well as local levels following the so-called Velvet Revolution of 1989. This phenomenon has been studied widely in Western democracies but is relatively new in the Czech Republic. Politicians’ improved communication skills and the employment of communication professionals in politics influence trust – a key component in the relationship – between politicians and journalists. The article is based on semi-structured interviews with 10 journalists and 11 politicians from different Czech localities, which aim to explore how these actors understand and maintain levels of mutual trust. First we describe key components of trust and explain why in the era of professionalized political communication trust is perceived as more threatened than in the 1990s and we conclude by exploring the three most important threats to trust as identified by our interviewees.

  4. How politicians make decisions under risk: a political choice experiment

    OpenAIRE

    Enrique Fatás; Tibor Neugebauer; Pilar Tamborero

    2004-01-01

    We report on an experimental study with real-world politicians. These political experts face political choice problems under risk and probability. Thus, we test the frequently observed violations of rational choice theory -the reference point effect, loss aversion, framing effects, and the common ratio effect- with experts from the field. Their choices violate expected utility theory. Nevertheless, they appear to be more rational and less risk averse (loving) in the domain of gains (losses) t...

  5. Rotary balance data for a typical single-engine general aviation design for an angle-of-attack range of 20 to 90 deg. 3: Influence of control deflection on predicted model D spin modes

    Science.gov (United States)

    Ralston, J. N.; Barnhart, B. P.

    1984-01-01

    The influence of control deflections on the rotational flow aerodynamics and on predicted spin modes is discussed for a 1/6-scale general aviation airplane model. The model was tested for various control settings at both zero and ten degree sideslip angles. Data were measured, using a rotary balance, over an angle-of-attack range of 30 deg to 90 deg, and for clockwise and counter-clockwise rotations covering an omegab/2V range of 0 to 0.5.

  6. "Islam" In the Anti-Multicultural Rhetoric of Western European Politicians and Anthropologists: Congruence or Coincidence?

    Directory of Open Access Journals (Sweden)

    Marko Pišev

    2016-02-01

    Full Text Available The recent rhetoric of the "end" or "failure" of multiculturalism in Europe and beyond came as no surprise to anthropologists. Moreover, the statements made by leading politicians of key European economies seem as though they are based on the decades old anthropological critique of the consequences of the failed implementation of multicultural policies in Europe and on the global level. It is as though the messages we have been getting over the course of the last few years – that multicultural policies are contraindicated, that they weaken the contacts between cultures, rob individuals of the right to change and chose their identities and strengthen intra-cultural mediators of power, with patriarchy, violence against women and children, leaving school, religious fundamentalism and even terrorism as main consequences – are being read by politicians from anthropological analyses of abuses of collective "cultural" rights. The paper considers the nature of this similarity between the discourse of politicians and anthropologists with a special emphasis on the status of "Islam" in them, and discusses whether it is congruence or mere coincidence of stances toward minorities, immigrants and cultural differences, as toward the regulations which were tasked with protecting this diversity as a fundamental European value which today, at least at the rhetorical level, seems to be fading.

  7. Politician2.0 on Facebook: Information Behavior and Dissemination on Social Networking Sites – Gaps and Best-Practice. Evaluation Results of a novel eParticipation toolbox to let politicians engage with citizens online.

    Directory of Open Access Journals (Sweden)

    Timo Wandhoefer

    2012-01-01

    Full Text Available This article covers our findings on information behavior and dissemination of parliamentary decision-makers in terms of using Social Networking Sites like Facebook. The article investigates why politicians use those technologies and integrate them more and more in their everyday workflow. In addition to the purpose of social network usage, the focus of our paper is also on best practices and how to deal with challenges like authenticity of politicians’ online profiles. The results presented within the remit of this paper are the outcome of 16 semi-structured interviews that took place as part of an evaluation effort within the EU research project WeGov [1]. The overall aim of the project is to develop a toolbox that enriches the dialogue between citizens and politicians on the web.

  8. The Effects of Tax Competition when Politicians Create Rents to Buy Political Support

    DEFF Research Database (Denmark)

    Eggert, Wolfgang; Sørensen, Peter Birch

    We set up a probabilistic voting model to explore the hypothesis that tax competition improves public sector efficiency and social welfare. In the absence of tax base mobility, distortions in the political process induce vote-maximising politicians to create rents to public sector employees...

  9. The effects of tax competition when politicians create rents to buy political support

    DEFF Research Database (Denmark)

    Eggert, Wolfgang; Sørensen, Peter Birch

    2008-01-01

    We set up a probabilistic voting model to explore the hypothesis that tax competition improves public sector efficiency and social welfare. In the absence of tax base mobility, distortions in the political process induce vote-maximising politicians to create rents to public sector employees...

  10. The management of high-level nuclear wastes - Issues politicians face regarding the risk of ionizing radiation

    International Nuclear Information System (INIS)

    Bataille, C.

    1992-01-01

    The management of ionizing radiation is not a new issue, and it is not a subject that could be easily communicated with the general public. Politicians responsible for decision making are faced with the public who are concerned with the risks. Without general acceptance and support from the public, nuclear programs can not be pursued. The author provides three key guidelines for politicians to follow, the same advice given to the French Parliament earlier: addressing the protection of the population and environment in a responsible manner, assuming an open, non secretive and transparent approach, and adopting a democratic attitude to allow public participation in decision making

  11. Moth tails divert bat attack: evolution of acoustic deflection.

    Science.gov (United States)

    Barber, Jesse R; Leavell, Brian C; Keener, Adam L; Breinholt, Jesse W; Chadwell, Brad A; McClure, Christopher J W; Hill, Geena M; Kawahara, Akito Y

    2015-03-03

    Adaptations to divert the attacks of visually guided predators have evolved repeatedly in animals. Using high-speed infrared videography, we show that luna moths (Actias luna) generate an acoustic diversion with spinning hindwing tails to deflect echolocating bat attacks away from their body and toward these nonessential appendages. We pit luna moths against big brown bats (Eptesicus fuscus) and demonstrate a survival advantage of ∼ 47% for moths with tails versus those that had their tails removed. The benefit of hindwing tails is equivalent to the advantage conferred to moths by bat-detecting ears. Moth tails lured bat attacks to these wing regions during 55% of interactions between bats and intact luna moths. We analyzed flight kinematics of moths with and without hindwing tails and suggest that tails have a minimal role in flight performance. Using a robust phylogeny, we find that long spatulate tails have independently evolved four times in saturniid moths, further supporting the selective advantage of this anti-bat strategy. Diversionary tactics are perhaps more common than appreciated in predator-prey interactions. Our finding suggests that focusing on the sensory ecologies of key predators will reveal such countermeasures in prey.

  12. Wind tunneling testing and analysis relating to the spinning of light aircraft

    Science.gov (United States)

    Mccormick, B. W.; Zilliac, G. G.; Ballin, M. G.

    1984-01-01

    Included is a summary of two studies related to the spinning of light aircraft. The first study was conducted to demonstrate that the aerodynamic forces and moments acting on a tail of a spinning aircraft can be obtained from static wind-tunnel tests. The second study analytically investigated spinning using a high angle-of-attack aerodynamic model derived from a static wind-tunnel data base. The validity of the aerodynamic model is shown by comparisons with rotary-balance data and forced-oscillation tests. The results of a six-degree-of-freedom analysis show that the dynamics and aerodynamics of the steep- and flat-spin modes of a modified Yankee have been properly modeled.

  13. Two politicians in a realistic experiment: attraction, discrepancy, intensity of delivery, and attitude change

    NARCIS (Netherlands)

    Wiegman, O.

    1985-01-01

    The leader of the Socialists in the Dutch Parliament and his Liberal opponent participated in this realistic experiment. Identical TV interviews with the two politicians were recorded and shown to subjects of both parties. The intensity of delivery was also varied: emotional versus rational. Our

  14. Perceptions of Social Media: A Joint Arena for Voters and Politicians?

    OpenAIRE

    Segaard, Signe Bock

    2015-01-01

    While observers have focused on the political use of social media when exploring their democratic potential, we know little about users’ perceptions of these media. These perceptions could well be important to understanding the political use of social media. In exploring users’ perceptions, the article asks whether politicians and voters view social media in a similar way, and to what extent they consider social media to be an apt arena for political communication. Within a Norwegian context,...

  15. The Werther Effect of Two Celebrity Suicides: an Entertainer and a Politician

    OpenAIRE

    Kim, Jae-Hyun; Park, Eun-Cheol; Nam, Jung-Mo; Park, SoHee; Cho, Jaelim; Kim, Sun-Jung; Choi, Jae-Woo; Cho, Eun

    2013-01-01

    PURPOSE: Suicide is a major health problem in Korea. Extensive media exposure of celebrity suicide may induce imitative suicide, a phenomenon called the Werther effect. We examined the increased suicide risk following the suicides of an entertainer and a politician, and identified the relative suicide risks. METHODS: News articles about the celebrity suicides were obtained from three major newspapers and analysed for quantitative and qualitative features. Imitative suicide risk was investigat...

  16. [Marcel Sembat's Psychology: the Hobby of a Politician?

    Science.gov (United States)

    Carroy, Jacqueline

    The socialist politician Marcel Sembat’s unpublished manuscripts reveal the unexpected figure of a diarist with a passion for his own intimate, bodily, sexual and affective economy, and of an autodidact and sometimes polemical reader of psychology (for instance Pierre Janet’s). Sembat was recognized nonetheless as a potentially publishable author by Georges Dumas, the editor of the Journal de psychologie normale et pathologique, who asked him to contribute an article – which was never published – on dreaming. Sembat was also particularly receptive to Freud’s early conceptions of sexuality. Was Marcel Sembat an amateur, like the painter Ingres playing the violin? Could he be characterized as a “psychologist from below”? As a dilettante? Or simply as a cultivated man according to the meaning this period ascribed to the term?

  17. What Drives Politicians to Run for Office: Money, Fame or Public Service?

    OpenAIRE

    Balian Arpie G.; Gasparyan Arman

    2017-01-01

    This is a multiple case study that investigates the motivations and ambitions of politicians who run for elections. It uses a mixed research design that applies inductive reasoning in the collection and analysis of data from six communities of rural Armenia. Data-collection instruments include in-depth interviews, focus groups, field observations and community survey. Whereas the study considers various theories of motivation and ambition, the conclusive evidence shows that the attractiveness...

  18. Who takes care of the children? The presentation of female top politicians in the media

    Directory of Open Access Journals (Sweden)

    Christina Holtz-Bacha

    2013-10-01

    Full Text Available The essay reflects on the media representation commonly associates with women politicians. Starting with a critique of media coverage about some political leaders in several countries, such as Angela Merkel, Michelle Bachelet, Ségolène Royal, Cristina Fernández de Kirchner and Hillary Clinton, the paper discusses the phenomenon of the double bind to which women are subjected in politics: if a woman presents herself as being cool, calculating and aggressive as it is expected in the political business she risks to be rejected as a virago. If she recommends herself with allegedly female traits, she will be regarded as not being viable for the serious challenges of the political business. There is no easy formula for how women should represent themselves. Since there are only few opportunities for direct contact between politicians and the electorate, it is necessary to deal with public image reported by media.

  19. [Training of managers and politicians in ethics of science and ethics of public health].

    Science.gov (United States)

    Beaudry, Nicole

    2013-01-01

    First of all, I will identify the various possible objectives of training in ethics of science and health. I will then examine the institutional context in which managers and politicians act in the light of what is done in Quebec. This analysis will lead me to defend the thesis that in Quebec at least such training is necessary.

  20. When truth is personally inconvenient, attitudes change: the impact of extreme weather on implicit support for green politicians and explicit climate-change beliefs.

    Science.gov (United States)

    Rudman, Laurie A; McLean, Meghan C; Bunzl, Martin

    2013-11-01

    A naturalistic investigation of New Jersey residents, both before and after they experienced Hurricanes Irene and Sandy, examined support for politicians committed or opposed to policies designed to combat climate change. At Time 1, before both hurricanes, participants showed negative implicit attitudes toward a green politician, but at Time 2, after the hurricanes, participants drawn from the same cohort showed a reversed automatic preference. Moreover, those who were significantly affected by Hurricane Sandy were especially likely to implicitly prefer the green politician, and implicit attitudes were the best predictor of voting after the storms, whereas explicit climate-change beliefs was the best predictor before the storms. In concert, the results suggest that direct experience with extreme weather can increase pro-environmentalism, and further support conceptualizing affective experiences as a source of implicit attitudes.

  1. DYNAMICS OF THE MOST INFLUENTIAL POLITICIANS OF THE REPUBLIC OF KHAKASSIA (BY RESULTS OF MONITORING EXPERT POLLS OF 1998–2014

    Directory of Open Access Journals (Sweden)

    Vladimir Il’ich Zlotkovskij

    2017-02-01

    The following conclusions are drawn by results of the conducted researches. First, line items of heads of managerial and economic structures in the top ten of the most influential republican politicians during the researched period underwent to essential transformation. In 1998, there was a rare situation in the Russian practice heavily on the political elite of the economic elite in the name of the representatives of the leading industrial enterprises of Khakassia – Sayan Aluminum Plant. Over time, the situation has changed in 2009. was set up regional “party of power” in the face of the Republican government and the party “United Russia”, around which all the relevant actors of regional political process. Secondly, engaging the top positions in the power structures necessary but not sufficient condition for the occurrence of the most influential Republican politicians. This number does not include bank and trade union officials, media executives and university leaders of political parties, with the exception of “United Russia”, public organizations and associations. Third, in recent years, as part of the 30 most influential politicians intensified the “political weight” of the leaders of the republican government and the law enforcement system and decreased – employees legislative authorities, media leaders and heads of local self-government. Fourthly, results of monitoring expert polls on determination of the leading republican politicians act as the effective tool for understanding and forecasting of regional political process.

  2. Effect of holding office on the behavior of politicians

    Science.gov (United States)

    Enemark, Daniel; Gibson, Clark C.; McCubbins, Mathew D.; Seim, Brigitte

    2016-01-01

    Reciprocity is central to our understanding of politics. Most political exchanges—whether they involve legislative vote trading, interbranch bargaining, constituent service, or even the corrupt exchange of public resources for private wealth—require reciprocity. But how does reciprocity arise? Do government officials learn reciprocity while holding office, or do recruitment and selection practices favor those who already adhere to a norm of reciprocity? We recruit Zambian politicians who narrowly won or lost a previous election to play behavioral games that provide a measure of reciprocity. This combination of regression discontinuity and experimental designs allows us to estimate the effect of holding office on behavior. We find that holding office increases adherence to the norm of reciprocity. This study identifies causal effects of holding office on politicians’ behavior. PMID:27856736

  3. Thinking politics sociologically - The Daily Life of the Professional Politician between Innovation and Determinism

    Directory of Open Access Journals (Sweden)

    Massimo Cerulo

    2012-06-01

    Full Text Available Abstract: The aim of my essay is to present some reflections on the possibility of thinking politics sociologically, from the point of view of a sociologist of everyday-life. During more than one year of ethnographic research on the field, I followed sixteen politicians in Calabria (south of Italy, eleven men and five women, using theshadowing technique and interviews. I will, here, attempt to resume some results of my enquiry, focusing in particular on the relation between innovation and determinism, as it comes out from the everyday actions of the political agents. Referring to the socialtheory of Pierre Bourdieu and to his analysis of the political field, I will underline how this latter influences practically the political agents. The internal dynamics in the political field seem to firmly bind the politicians and by consequence these latter appearto be forced to lay down experience and innovation. Their behaviour and their actions are determined by the political field’s logic and they seem compelled to act and take the world for granted.It appears therefore that there is no space for imagination in the professional politician’s everyday-life. The political field seems to spread an inescapable determinism.

  4. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  5. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  6. THE ATTITUDES OF DANISH POLITICIANS TO THE PROSPECTS OF URANIUM MINING IN GREENLAND

    OpenAIRE

    Westerberg, Niklas; Szpisjak, Aron; Schow, Marco

    2014-01-01

    The following case study may well function as a basis or groundwork for another project on Greenland concerning natural resources. The study gathered data primarily from interviews with experts on the subject i.e. politicians. The main point of this study is the attitudes of the Danish party political spectrum to the prospect of uranium extraction in Greenland. The study discusses whether or not Greenland has jurisdiction over its own resources, as well as entailing a summary of the jurisdict...

  7. Numerical simulation of steady supersonic flow over spinning bodies of revolution

    Science.gov (United States)

    Sturek, W. B.; Schiff, L. B.

    1982-01-01

    A recently reported parabolized Navier-Stokes code has been employed to compute the supersonic flowfield about a spinning cone and spinning and nonspinning ogive cylinder and boattailed bodies of revolution at moderate incidence. The computations were performed for flow conditions where extensive measurements for wall pressure, boundary-layer velocity profiles, and Magnus force had been obtained. Comparisons between the computational results and experiment indicate excellent agreement for angles of attack up to 6 deg. At angles greater than 6 deg discrepancies are noted which are tentatively attributed to turbulence modeling errors. The comparisons for Magnus effects show that the code accurately predicts the effects of body shape for the selected models.

  8. The micro dynamics of agency: Repetition and subversion in a Mexican right-wing female politician's life story

    NARCIS (Netherlands)

    Davids, T.

    2011-01-01

    This article analyses the micro dynamics of agency represented in the life story of a Mexican right-wing female politician - particularly how agency manifests itself in the way she repeats the rhetorical structures of her party's discourse. Although claiming to be a modern woman, a high ranking

  9. The Werther Effect of Two Celebrity Suicides: an Entertainer and a Politician

    Science.gov (United States)

    Kim, Jae-Hyun; Park, Eun-Cheol; Nam, Jung-Mo; Park, SoHee; Cho, Jaelim; Kim, Sun-Jung; Choi, Jae-Woo; Cho, Eun

    2013-01-01

    Purpose Suicide is a major health problem in Korea. Extensive media exposure of celebrity suicide may induce imitative suicide, a phenomenon called the Werther effect. We examined the increased suicide risk following the suicides of an entertainer and a politician, and identified the relative suicide risks. Methods News articles about the celebrity suicides were obtained from three major newspapers and analysed for quantitative and qualitative features. Imitative suicide risk was investigated by applying a Poisson time series autoregression model with suicide mortality data from the National Statistics Office for 1.5 years before and 1.5 years after each celebrity’s suicide. The period with a significantly increased number of suicides immediately after the celebrity’s suicide determined the Werther effect band. The relative risk during this period was examined for different ages, genders, and suicide methods. Results News reports were more numerous and they contained more positive definitions about the entertainer’s suicide. The risk of suicide deaths rose markedly after both celebrity suicides. However, the Werther effect band was longer for the entertainer (6 weeks) than for the politician (4 weeks). The relative suicide risk was significant for almost all ages and both genders during that of both individuals. Use of the same suicide method was a prominent risk factor after both celebrity suicides. Conclusions Our results confirm the existence of imitative suicide behaviours, suggesting a facilitation effect of media reports. Guidelines for responsible media reporting need to be implemented to enhance public mental health in Korea. PMID:24386428

  10. The werther effect of two celebrity suicides: an entertainer and a politician.

    Directory of Open Access Journals (Sweden)

    Jae-Hyun Kim

    Full Text Available PURPOSE: Suicide is a major health problem in Korea. Extensive media exposure of celebrity suicide may induce imitative suicide, a phenomenon called the Werther effect. We examined the increased suicide risk following the suicides of an entertainer and a politician, and identified the relative suicide risks. METHODS: News articles about the celebrity suicides were obtained from three major newspapers and analysed for quantitative and qualitative features. Imitative suicide risk was investigated by applying a Poisson time series autoregression model with suicide mortality data from the National Statistics Office for 1.5 years before and 1.5 years after each celebrity's suicide. The period with a significantly increased number of suicides immediately after the celebrity's suicide determined the Werther effect band. The relative risk during this period was examined for different ages, genders, and suicide methods. RESULTS: News reports were more numerous and they contained more positive definitions about the entertainer's suicide. The risk of suicide deaths rose markedly after both celebrity suicides. However, the Werther effect band was longer for the entertainer (6 weeks than for the politician (4 weeks. The relative suicide risk was significant for almost all ages and both genders during that of both individuals. Use of the same suicide method was a prominent risk factor after both celebrity suicides. CONCLUSIONS: Our results confirm the existence of imitative suicide behaviours, suggesting a facilitation effect of media reports. Guidelines for responsible media reporting need to be implemented to enhance public mental health in Korea.

  11. What Drives Politicians to Run for Office: Money, Fame or Public Service?

    Directory of Open Access Journals (Sweden)

    Balian Arpie G.

    2017-06-01

    Full Text Available This is a multiple case study that investigates the motivations and ambitions of politicians who run for elections. It uses a mixed research design that applies inductive reasoning in the collection and analysis of data from six communities of rural Armenia. Data-collection instruments include in-depth interviews, focus groups, field observations and community survey. Whereas the study considers various theories of motivation and ambition, the conclusive evidence shows that the attractiveness of office at the local-government level in smaller rural communities is not driven by financial considerations and is rather compelled by the desire to make a difference motivated primarily by personal interest in and dedication to bringing positive change in the quality of life in one’s own community. The study also shows that motivators oft en stem from several other factors, including one’s deep-rooted connection with the community, lineage, length of term in office, record of community satisfaction, resultant personal power built over the years in service and the need to be acclaimed by one’s own community. A derivative closely linked to the priority of building the personal reputation of an incumbent mayor is the resultant power of decision-making. These conclusions can be explained using the model offered by Besley and Ghatak (2005 where politicians view public service as a personal mission. This study connects personal drive to sense of community and ancestral presence. The study also explains why mission accomplishment is more attractive than personal profit-making and how the sense of community and ownership are linked to personal drive.

  12. Mainlandization, the ICAC, and the Seriousness Attached by Local Politicians to Corruption in Post-1997 Hong Kong.

    Science.gov (United States)

    Li, Li; Lo, T Wing

    2018-05-01

    To date, few studies have focused on how the public has perceived the effectiveness of the Independent Commission Against Corruption (ICAC). Furthermore, little is known about how the public has assessed the functions of the ICAC during the political-economic convergence between Hong Kong and mainland China since 1997. This study attempts to explore local politicians' perceptions towards the ICAC in post-1997 Hong Kong. The quantitative data show that the important historical juncture of mainlandization has been politicized in Hong Kong and has deeply influenced the seriousness attached by local politicians to corruption. Moreover, a mediating path of the effect of "Conflict of Interest" on the "Perceived Seriousness of Corruption" has been found, that is, mainlandization is found to have brought about increased levels of conflict of interest among government officials, which has weakened the symbolic anti-corruption function of the ICAC and, in turn, has affected the perceived seriousness attached to corruption.

  13. Smileys Without Borders. A Critique of Transboundary Interaction Between Politicians, Journalists and PR Practitioners on Social Media

    Directory of Open Access Journals (Sweden)

    Peter Berglez

    2018-01-01

    Full Text Available The purpose of the article is to contribute a critical theoretical understanding of cross-professional relations on social media, focusing on politicians, journalists and PR practitioners. It is well known that these professional groups establish personal and close relations in offline contexts, but more attention needs to be paid to the role of social media. Here, it is argued that, in the context of digital media use, semi-private chatting, humour, and mutual acknowledgement, including the use of likes, smileys, heart symbols, etc. are evidence of a 'neoliberalization' of cross-professional relations. The underlying idea is that the common practice of self-branding undermines representations of professional belonging and exacerbates the blurring of professional boundaries. The critical conceptualization of such 'transboundary' interaction between politicians, journalists and PR practitioners, which is guided by a cultural materialist approach, includes the presentation of examples deriving from the Swedish Twittersphere, and suggestions for empirical research.

  14. Two politicians in a realistic experiment: attraction, discrepancy, intensity of delivery, and attitude change

    OpenAIRE

    Wiegman, O.

    1985-01-01

    The leader of the Socialists in the Dutch Parliament and his Liberal opponent participated in this realistic experiment. Identical TV interviews with the two politicians were recorded and shown to subjects of both parties. The intensity of delivery was also varied: emotional versus rational. Our findgins indicated that the experimental interveiw changed the attitude of the subjects. In addition, support was found for a second hypothesis: Attitude change was greater for the attractive source f...

  15. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  16. Malnutrition in elder care: qualitative analysis of ethical perceptions of politicians and civil servants.

    Science.gov (United States)

    Mamhidir, Anna-Greta; Kihlgren, Mona; Soerlie, Venke

    2010-06-16

    Few studies have paid attention to ethical responsibility related to malnutrition in elder care. The aim was to illuminate whether politicians and civil servants reason about malnutrition in elder care in relation to ethical responsibility, and further about possible causes and how to address them. Eighteen elected politicians and appointed civil servants at the municipality and county council level from two counties in Sweden were interviewed. They worked at a planning, control and executive level, with responsibility for both the elder care budget and quality of care. Qualitative method was used for the data analysis. Two themes emerged from their reasoning about malnutrition related to ethical responsibility. The theme assumed role involves the subthemes quality of care and costs, competent staff and govern at a distance. Old and ill patients were mentioned as being at risk for malnutrition. Caregivers were expected to be knowledgeable and stated primary responsible for providing adequate nutritional care. Extended physician responsibility was requested owing to patients' illnesses. Little was reported on the local management's role or on their own follow-up routines. The theme moral perception includes the subthemes discomfort, trust and distrust. Feelings of discomfort concerned caregivers having to work in a hurried, task-oriented manner. Trust meant that they believed for the most part that caregivers had the competence to deal appropriately with nutritional care, but they felt distrust when nutritional problems reappeared on their agenda. No differences could be seen between the politicians and civil servants. New knowledge about malnutrition in elder care related to ethical responsibility was illuminated by persons holding top positions. Malnutrition was stressed as an important dimension of the elder care quality. Governing at a distance meant having trust in the staff, on the one hand, and discomfort and distrust when confronted with reports of

  17. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  18. Why do Indonesian politicians promote shari’alaws? An analytic framework for Muslim-majority democracies

    OpenAIRE

    Pisani, Elizabeth; Buehler, Michael

    2016-01-01

    Taking the discussion in the existing literature on the adoption of shari’a laws in democratising Muslim-majority countries as a starting point, we posit that there are two broad motivations for democratically-elected politicians to adopt shari’a laws and regulations: ideological conviction on the one hand and response to the expressed or perceived preference of constituents on the other hand. The ‘demand side’ can be further divided into the preferences of individual voters, and the interest...

  19. Crony Attack: Strategic Attack’s Silver Bullet

    Science.gov (United States)

    2006-11-01

    physical assets or financial assets. The form of crony attack that most closely resembles classic strategic attack is to deny, degrade, or destroy a money...February 1951. Reprinted in Airpower Studies Coursebook , Air Command and Staff College, Maxwell AFB, AL, 2002, 152–58. Hirsch, Michael. “NATO’s Game of

  20. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  1. Rotary balance data for a single-engine agricultural airplane configuration for an angle-of-attack range of 8 deg to 90 deg

    Science.gov (United States)

    Mulcay, W. J.; Chu, J.

    1980-01-01

    Aerodynamic characteristics obtained in a helical flow environment utilizing a rotary balance located in the Langley spin tunnel are presented in plotted form for a 1/10 scale single engine agricultural airplane model. The configurations tested include the basic airplane, various wing leading edge and wing tip devices, elevator, aileron, and rudder control settings, and other modifications. Data are presented without analysis for an angle of attack range of 8 deg to 90 deg, and clockwise and counter-clockwise rotations covering a spin coefficient range from 0 to .9.

  2. Freedom of speech versus freedom of religion? The case of Dutch politician Geert Wilders

    OpenAIRE

    Howard, Erica

    2017-01-01

    Dutch right-wing politician Geert Wilders has already been prosecuted once for incitement to hatred and group defamation over remarks and a film criticising Islam and comparing the Quran to Hitler’s Mein Kampf. He was acquitted, but now faces another criminal trial on the same charges concerning remarks he made in March 2014 about ‘fewer Moroccans’. This Article examines Wilders’ expressions which led to both prosecutions. The case law of the European Court of Human Rights on freedom of expre...

  3. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  4. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  5. Blocking of Brute Force Attack

    OpenAIRE

    M.Venkata Krishna Reddy

    2012-01-01

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it co...

  6. Solidarity under Attack

    DEFF Research Database (Denmark)

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  7. Noblesse oblige? Social status and economic inequality maintenance among politicians.

    Science.gov (United States)

    Kraus, Michael W; Callaghan, Bennett

    2014-01-01

    Economic inequality is at historically high levels in the United States and is among the most pressing issues facing society. And yet, predicting the behavior of politicians with respect to their support of economic inequality remains a significant challenge. Given that high status individuals tend to conceive of the current structure of society as fair and just, we expected that high status members of the U.S. House of Representatives would be more likely to support economic inequality in their legislative behavior than would their low status counterparts. Results supported this prediction particularly among Democratic members of Congress: Whereas Republicans tended to support legislation increasing economic inequality regardless of their social status, the social status of Democrats - measured in terms of average wealth, race, or gender - was a significant predictor of support for economic inequality. Policy implications of the observed relationship between social status and support for economic inequality are considered.

  8. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  9. Investigation of Spinning and Tumbling Characteristics of a 1/20-Scale Model of the Consolidated Vultee XFY-1 Airplane in the Free-Spinning Tunnel, TED No. NACA DE 370

    Science.gov (United States)

    Lee, Henry A.

    1952-01-01

    An investigation has been conducted in the Langley 20-foot free-spinning tunnel on a l/20-scale model of the Consolidated Vultee XFY-1 airplane with a windmilling propeller simulated to determine the effects of control setting and movements upon the erect spin and recovery characteristics for a range of airplane-loading conditions. The effects on the model's spin-recovery characteristics of removing the lower vertical tail, removing the gun pods, and fixing the rudders at neutral were also investigated briefly. The investigation included determination of the size parachute required for emergency recovery from demonstration spins. The tumbling tendencies of the model were also investigated. Brief static force tests were made to determine the aerodynamic characteristics in pitch at high angles of attack. The investigation indicated that the spin and recovery characteristics of the airplane with propeller windmilling will be satisfactory for all loading conditions if recovery is attempted by full rudder reversal accompanied by simultaneous movement of the stick laterally to full with the spin (stick right in a right spin) and longitudinally to neutral. Inverted spins should be satisfactorily terminated by fully reversing the rudder followed immediately by moving the stick laterally towards the forward rudder pedal and longitudinally to neutral. Removal of the gun pods or fixing the rudders at neutral will not adversely affect the airplane's spin-recovery characteristics, but removal of the lower vertical tail will result in unsatisfactory spin-recovery characteristics. The model-test results showed that a 13.3-foot wing-tip conventional parachute (drag coefficient approximately 0.7) should be effective as an emergency spin-recovery device during demonstration spins of the airplane. It was indicated that the airplane should not tumble and that no unusual longitudinal-trim characteristics should be obtained for the center-of-gravity positions investigated.

  10. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  11. Entangled spins and ghost-spins

    Directory of Open Access Journals (Sweden)

    Dileep P. Jatkar

    2017-09-01

    Full Text Available We study patterns of quantum entanglement in systems of spins and ghost-spins regarding them as simple quantum mechanical toy models for theories containing negative norm states. We define a single ghost-spin as in [20] as a 2-state spin variable with an indefinite inner product in the state space. We find that whenever the spin sector is disentangled from the ghost-spin sector (both of which could be entangled within themselves, the reduced density matrix obtained by tracing over all the ghost-spins gives rise to positive entanglement entropy for positive norm states, while negative norm states have an entanglement entropy with a negative real part and a constant imaginary part. However when the spins are entangled with the ghost-spins, there are new entanglement patterns in general. For systems where the number of ghost-spins is even, it is possible to find subsectors of the Hilbert space where positive norm states always lead to positive entanglement entropy after tracing over the ghost-spins. With an odd number of ghost-spins however, we find that there always exist positive norm states with negative real part for entanglement entropy after tracing over the ghost-spins.

  12. Spin Current Noise of the Spin Seebeck Effect and Spin Pumping

    Science.gov (United States)

    Matsuo, M.; Ohnuma, Y.; Kato, T.; Maekawa, S.

    2018-01-01

    We theoretically investigate the fluctuation of a pure spin current induced by the spin Seebeck effect and spin pumping in a normal-metal-(NM-)ferromagnet(FM) bilayer system. Starting with a simple ferromagnet-insulator-(FI-)NM interface model with both spin-conserving and non-spin-conserving processes, we derive general expressions of the spin current and the spin-current noise at the interface within second-order perturbation of the FI-NM coupling strength, and estimate them for a yttrium-iron-garnet-platinum interface. We show that the spin-current noise can be used to determine the effective spin carried by a magnon modified by the non-spin-conserving process at the interface. In addition, we show that it provides information on the effective spin of a magnon, heating at the interface under spin pumping, and spin Hall angle of the NM.

  13. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  14. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks. In prac......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks....... In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  15. Geometrical spin symmetry and spin

    International Nuclear Information System (INIS)

    Pestov, I. B.

    2011-01-01

    Unification of General Theory of Relativity and Quantum Mechanics leads to General Quantum Mechanics which includes into itself spindynamics as a theory of spin phenomena. The key concepts of spindynamics are geometrical spin symmetry and the spin field (space of defining representation of spin symmetry). The essence of spin is the bipolar structure of geometrical spin symmetry induced by the gravitational potential. The bipolar structure provides a natural derivation of the equations of spindynamics. Spindynamics involves all phenomena connected with spin and provides new understanding of the strong interaction.

  16. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  17. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  18. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  19. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  20. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  1. Heart attack - discharge

    Science.gov (United States)

    ... and lifestyle Cholesterol - drug treatment Controlling your high blood pressure Deep vein thrombosis - discharge Dietary fats explained Fast food tips Heart attack - discharge Heart attack - what to ask your doctor Heart bypass ... pacemaker - discharge High blood pressure - what to ask your doctor How to read ...

  2. Spin Torques in Systems with Spin Filtering and Spin Orbit Interaction

    KAUST Repository

    Ortiz Pauyac, Christian

    2016-06-19

    In the present thesis we introduce the reader to the field of spintronics and explore new phenomena, such as spin transfer torques, spin filtering, and three types of spin-orbit torques, Rashba, spin Hall, and spin swapping, which have emerged very recently and are promising candidates for a new generation of memory devices in computer technology. A general overview of these phenomena is presented in Chap. 1. In Chap. 2 we study spin transfer torques in tunnel junctions in the presence of spin filtering. In Chap. 3 we discuss the Rashba torque in ferromagnetic films, and in Chap. 4 we study spin Hall effect and spin swapping in ferromagnetic films, exploring the nature of spin-orbit torques based on these mechanisms. Conclusions and perspectives are summarized in Chap. 5.

  3. A High-Spin Rate Measurement Method for Projectiles Using a Magnetoresistive Sensor Based on Time-Frequency Domain Analysis.

    Science.gov (United States)

    Shang, Jianyu; Deng, Zhihong; Fu, Mengyin; Wang, Shunting

    2016-06-16

    Traditional artillery guidance can significantly improve the attack accuracy and overall combat efficiency of projectiles, which makes it more adaptable to the information warfare of the future. Obviously, the accurate measurement of artillery spin rate, which has long been regarded as a daunting task, is the basis of precise guidance and control. Magnetoresistive (MR) sensors can be applied to spin rate measurement, especially in the high-spin and high-g projectile launch environment. In this paper, based on the theory of a MR sensor measuring spin rate, the mathematical relationship model between the frequency of MR sensor output and projectile spin rate was established through a fundamental derivation. By analyzing the characteristics of MR sensor output whose frequency varies with time, this paper proposed the Chirp z-Transform (CZT) time-frequency (TF) domain analysis method based on the rolling window of a Blackman window function (BCZT) which can accurately extract the projectile spin rate. To put it into practice, BCZT was applied to measure the spin rate of 155 mm artillery projectile. After extracting the spin rate, the impact that launch rotational angular velocity and aspect angle have on the extraction accuracy of the spin rate was analyzed. Simulation results show that the BCZT TF domain analysis method can effectively and accurately measure the projectile spin rate, especially in a high-spin and high-g projectile launch environment.

  4. Spin-polarized spin excitation spectroscopy

    International Nuclear Information System (INIS)

    Loth, Sebastian; Lutz, Christopher P; Heinrich, Andreas J

    2010-01-01

    We report on the spin dependence of elastic and inelastic electron tunneling through transition metal atoms. Mn, Fe and Cu atoms were deposited onto a monolayer of Cu 2 N on Cu(100) and individually addressed with the probe tip of a scanning tunneling microscope. Electrons tunneling between the tip and the substrate exchange energy and spin angular momentum with the surface-bound magnetic atoms. The conservation of energy during the tunneling process results in a distinct onset threshold voltage above which the tunneling electrons create spin excitations in the Mn and Fe atoms. Here we show that the additional conservation of spin angular momentum leads to different cross-sections for spin excitations depending on the relative alignment of the surface spin and the spin of the tunneling electron. For this purpose, we developed a technique for measuring the same local spin with a spin-polarized and a non-spin-polarized tip by exchanging the last apex atom of the probe tip between different transition metal atoms. We derive a quantitative model describing the observed excitation cross-sections on the basis of an exchange scattering process.

  5. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  6. Can trust in politicians explain individuals' support for climate policy? The case of CO2 tax

    International Nuclear Information System (INIS)

    Hammar, Henrik; Jagers, Sverker C.

    2006-01-01

    This article provides an analysis of the support for public policies from a trust perspective. The empirical focus is on the use of a tax on carbon dioxide (CO 2 ), a policy tool aimed at coordinating national emissions targets in Sweden. Among economists and experts in the field of climate policy, a CO 2 tax is viewed as a cost-effective policy. The policy problem is that public support for CO 2 taxes is very low, leaving policy makers with high-cost options. Apart from traditional explanatory variables such as demographic factors, level of education, ideology and self-interest, what can explain this public opposition? Using individual level data, we analyse whether support for increases in the CO 2 tax on gasoline can be explained by citizens' generalized trust in other individuals (who they do not necessarily know) or by their trust in politicians. We find that only the latter measure gains support in a regression analysis. Moreover, when splitting the sample into high-trusting and low-trusting individuals, we find that high-trusting individuals who have access to a car (compared with those without access) are statistically no more likely to resist increases in CO 2 taxes than people without access to a car. Rather, it is individuals with access to a car and who do not trust their politicians who are likely to resist CO 2 taxes. (Author)

  7. The work-averse cyber attacker model : theory and evidence from two million attack signatures

    NARCIS (Netherlands)

    Allodi, L.; Massacci, F.; Williams, J.

    The typical cyber attacker is assumed to be all powerful and to exploit all possible vulnerabilities. In this paper we present, and empirically validate, a novel and more realistic attacker model. The intuition of our model is that an attacker will optimally choose whether to act and weaponize a new

  8. Spin current and spin transfer torque in ferromagnet/superconductor spin valves

    Science.gov (United States)

    Moen, Evan; Valls, Oriol T.

    2018-05-01

    Using fully self-consistent methods, we study spin transport in fabricable spin valve systems consisting of two magnetic layers, a superconducting layer, and a spacer normal layer between the ferromagnets. Our methods ensure that the proper relations between spin current gradients and spin transfer torques are satisfied. We present results as a function of geometrical parameters, interfacial barrier values, misalignment angle between the ferromagnets, and bias voltage. Our main results are for the spin current and spin accumulation as functions of position within the spin valve structure. We see precession of the spin current about the exchange fields within the ferromagnets, and penetration of the spin current into the superconductor for biases greater than the critical bias, defined in the text. The spin accumulation exhibits oscillating behavior in the normal metal, with a strong dependence on the physical parameters both as to the structure and formation of the peaks. We also study the bias dependence of the spatially averaged spin transfer torque and spin accumulation. We examine the critical-bias effect of these quantities, and their dependence on the physical parameters. Our results are predictive of the outcome of future experiments, as they take into account imperfect interfaces and a realistic geometry.

  9. Web server attack analyzer

    OpenAIRE

    Mižišin, Michal

    2013-01-01

    Web server attack analyzer - Abstract The goal of this work was to create prototype of analyzer of injection flaws attacks on web server. Proposed solution combines capabilities of web application firewall and web server log analyzer. Analysis is based on configurable signatures defined by regular expressions. This paper begins with summary of web attacks, followed by detection techniques analysis on web servers, description and justification of selected implementation. In the end are charact...

  10. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  11. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based......Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....

  12. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  13. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  14. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  15. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  16. Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics

    Directory of Open Access Journals (Sweden)

    Sárkány Zoltán

    2016-03-01

    Full Text Available Introduction: The objective of this study was to investigate with the help of a computerized simulation model whether the treatment of an acute asthma attack can be individualized based on the severity of the attack and the characteristics of the patient. Material and Method: A stochastic lung model was used to simulate the deposition of 1 nm - 10 μm particles during a mild and a moderate asthma attack. Breathing parameters were varied to maximize deposition, and simulation results were compared with those obtained in the case of a severe asthma attack. In order to investigate the effect of height on the deposition of inhaled particles, another series of simulations was carried out with identical breathing parameters, comparing patient heights of 155 cm, 175 cm and 195 cm. Results: The optimization process yielded an increase in the maximum deposition values of around 6-7% for each type of investigated asthma attack, and the difference between attacks of different degree of severity was around 5% for both the initial and the optimized values, a higher degree of obstruction increasing the amount of deposited particles. Conclusions: Our results suggest that the individualization of asthma attack treatment cannot be based on particles of different size, as the highest deposited fraction in all three types of attacks can be obtained using 0.01 μm particles. The use of a specific set of breathing parameters yields a difference between a mild and a moderate, as well as a moderate and a severe asthma attack of around 5%.

  17. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  18. Building up trust with the female politicians and women's organizations

    International Nuclear Information System (INIS)

    Heininen-Ojanperae, Marke

    1995-01-01

    Since the Finnish Parliament by its decision on September 24, 1993, cancelled or abandoned the option of a fifth nuclear unit for Finland, it has been difficult to approach the politicians in terms of promoting nuclear energy. Thus, our lacking of a concrete target, namely a scheme, a program or a definite project, has brought about an opportunity to find new and innovational forms of influence. As the future option of nuclear energy should be kept open from the energy security point of view and because existing installations are in operation with the consequently piling up nuclear waste, the dialogue should continue in a balanced and constructive way. Moreover, the environmental benefits of the existing and possible future units are always available. This general condition, the lack of a visible objective, applies to both male and female promoters, but it may be that men are more dependent on working in society in line with their Big Project thinking whereas the ladies' social roles have traditionally been more maintenance-oriented

  19. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  20. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  1. Spin current evolution in the separated spin-up and spin-down quantum hydrodynamics

    International Nuclear Information System (INIS)

    Trukhanova, Mariya Iv.

    2015-01-01

    We have developed a method of quantum hydrodynamics (QHD) that describes particles with spin-up and with spin-down in separate. We have derived the equation of the spin current evolution as a part of the set of the quantum hydrodynamics equations that treat particles with different projection of spin on the preferable direction as two different species. We have studied orthogonal propagation of waves in the external magnetic field and determined the contribution of quantum corrections due to the Bohm potential and to magnetization energy of particles with different projections of spin in the spin-current wave dispersion. We have analyzed the limits of weak and strong magnetic fields. - Highlights: • We derive the spin current equation for particles with different projection of spin. • We predict the contribution of Bohm potential to the dynamics of spin current. • We derive the spin-current wave in the system of spin-polarized particles. • We study the propagation of spin-acoustic wave in magnetized dielectrics.

  2. Pericarditis - after heart attack

    Science.gov (United States)

    ... include: A previous heart attack Open heart surgery Chest trauma A heart attack that has affected the thickness of your heart muscle Symptoms Symptoms include: Anxiety Chest pain from the swollen pericardium rubbing on the ...

  3. Muonium spin exchange in spin-polarized media: Spin-flip and -nonflip collisions

    International Nuclear Information System (INIS)

    Senba, M.

    1994-01-01

    The transverse relaxation of the muon spin in muonium due to electron spin exchange with a polarized spin-1/2 medium is investigated. Stochastic calculations, which assume that spin exchange is a Poisson process, are carried out for the case where the electron spin polarization of the medium is on the same axis as the applied field. Two precession signals of muonium observed in intermediate fields (B>30 G) are shown to have different relaxation rates which depend on the polarization of the medium. Furthermore, the precession frequencies are shifted by an amount which depends on the spin-nonflip rate. From the two relaxation rates and the frequency shift in intermediate fields, one can determine (i) the encounter rate of muonium and the paramagnetic species, (ii) the polarization of the medium, and most importantly (iii) the quantum-mechanical phase shift (and its sign) associated with the potential energy difference between electron singlet and triplet encounters. Effects of spin-nonflip collisions on spin dynamics are discussed for non-Poisson as well as Poisson processes. In unpolarized media, the time evolution of the muon spin in muonium is not influenced by spin-nonflip collisions, if the collision process is Poissonian. This seemingly obvious statement is not true anymore in non-Poissonian processes, i.e., it is necessary to specify both spin-flip and spin-nonflip rates to fully characterize spin dynamics

  4. [Paul Konitzer (1894-1947): hygienist, physician, social medicine and health politician].

    Science.gov (United States)

    Schneck, Peter

    2004-01-01

    Paul Konitzer was one of the outstanding and well-known physicians in the years after the World War II in East-Germany. THe paper describes his professional way as hygienist, social medical, municipal physician and last but not least as health politician in the times of four different political regimes: the imperial era in Germany till 1918, the time of "Weimarer Republic" till 1933, the Nazi dictatorship till 1945 and the early years in the Soviet occupation zone of Germany. The life of Konitzer is a typical example of the fate of a German doctor in the first half of the 20th century. Konitzer was arrested in February 1947 by the Soviet Military Government in Berlin in connection with some political troubles and reproach with a typhus epidemic in a German camp for Russian Prisoners of War in the Nazi era. On April 22nd 1947 he died in prison of Dresden by suicide without condemnation.

  5. Partidele româneşti, între politicianism şi politică

    Directory of Open Access Journals (Sweden)

    Bogdan Ficeac

    2011-08-01

    Full Text Available The „originality” of the Romanian transition from totalitarianism to democracy represents, in fact, the failure of this process. The power was not transferred from the hands of a leader or of a small group of discretionary leaders to the legal-rational-bureaucratic institutions, but to the large structures of new rich, which control the entire economic and political life of the country, including the political parties. The only way to cure the Romanian political life is to professionalize the politics, to provoke the politicians to live for politics not off politics. This vital goal could be reach by strictly bringing into force the EU rules and practice, especially the EU model of spending the public money.

  6. Rotary balance data for a typical single-engine general aviation design for an angle-of-attack range of 8 deg to 90 deg. 2: High-wing model C

    Science.gov (United States)

    Hultberg, R. S.; Chu, J.

    1980-01-01

    Aerodynamic characteristics obtained in a helical flow environment utilizing a rotary balance located in the Langley spin g tunnel are presented in plotted form for a 1/6 scale, single engine, high wing, general aviation model. The configurations tested included the basic airplane and control deflections, wing leading edge devices, tail designs, and airplane components. Data are presented without analysis for an angle of attack range of 8 deg to 90 deg and clockwise and counter clockwise rotations covering a spin coefficient range from 0 to 0.9.

  7. Neutron spin quantum precession using multilayer spin splitters and a phase-spin echo interferometer

    International Nuclear Information System (INIS)

    Ebisawa, Toru; Tasaki, Seiji; Kawai, Takeshi; Hino, Masahiro; Akiyoshi, Tsunekazu; Achiwa, Norio; Otake, Yoshie; Funahashi, Haruhiko.

    1996-01-01

    Neutron spin quantum precession by multilayer spin splitter has been demonstrated using a new spin interferometer. The multilayer spin splitter consists of a magnetic multilayer mirror on top, followed by a gap layer and a non magnetic multilayer mirror which are evaporated on a silicon substrate. Using the multilayer spin splitter, a polarized neutron wave in a magnetic field perpendicular to the polarization is split into two spin eigenstates with a phase shift in the direction of the magnetic field. The spin quantum precession is equal to the phase shift, which depends on the effective thickness of the gap layer. The demonstration experiments verify the multilayer spin splitter as a neutron spin precession device as well as the coherent superposition principle of the two spin eigenstates. We have developed a new phase-spin echo interferometer using the multilayer spin splitters. We present successful performance tests of the multilayer spin splitter and the phase-spin echo interferometer. (author)

  8. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  9. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...... AES or similar algorithms in virtualized environments. This paper applies variants of this cache timing attack to Intel's latest generation of microprocessors. It enables a spy-process to recover cryptographic keys, interacting with the victim processes only over TCP. The threat model is a logically...... separated but CPU co-located attacker with root privileges. We report successful and practically verified applications of this attack against a wide range of microarchitectures, from a two-core Nehalem processor (i5-650) to two-core Haswell (i7-4600M) and four-core Skylake processors (i7-6700). The attack...

  10. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  11. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  12. Spin drift and spin diffusion currents in semiconductors

    Energy Technology Data Exchange (ETDEWEB)

    Idrish Miah, M [Nanoscale Science and Technology Centre and School of Biomolecular and Physical Sciences, Griffith University, Nathan, Brisbane, QLD 4111 (Australia)], E-mail: m.miah@griffith.edu.au

    2008-09-15

    On the basis of a spin drift-diffusion model, we show how the spin current is composed and find that spin drift and spin diffusion contribute additively to the spin current, where the spin diffusion current decreases with electric field while the spin drift current increases, demonstrating that the extension of the spin diffusion length by a strong field does not result in a significant increase in spin current in semiconductors owing to the competing effect of the electric field on diffusion. We also find that there is a spin drift-diffusion crossover field for a process in which the drift and diffusion contribute equally to the spin current, which suggests a possible method of identifying whether the process for a given electric field is in the spin drift or spin diffusion regime. Spin drift-diffusion crossover fields for GaAs are calculated and are found to be quite small. We derive the relations between intrinsic spin diffusion length and the spin drift-diffusion crossover field of a semiconductor for different electron statistical regimes. The findings resulting from this investigation might be important for semiconductor spintronics.

  13. Spin drift and spin diffusion currents in semiconductors

    Directory of Open Access Journals (Sweden)

    M Idrish Miah

    2008-01-01

    Full Text Available On the basis of a spin drift-diffusion model, we show how the spin current is composed and find that spin drift and spin diffusion contribute additively to the spin current, where the spin diffusion current decreases with electric field while the spin drift current increases, demonstrating that the extension of the spin diffusion length by a strong field does not result in a significant increase in spin current in semiconductors owing to the competing effect of the electric field on diffusion. We also find that there is a spin drift-diffusion crossover field for a process in which the drift and diffusion contribute equally to the spin current, which suggests a possible method of identifying whether the process for a given electric field is in the spin drift or spin diffusion regime. Spin drift-diffusion crossover fields for GaAs are calculated and are found to be quite small. We derive the relations between intrinsic spin diffusion length and the spin drift-diffusion crossover field of a semiconductor for different electron statistical regimes. The findings resulting from this investigation might be important for semiconductor spintronics.

  14. Spin drift and spin diffusion currents in semiconductors

    International Nuclear Information System (INIS)

    Idrish Miah, M

    2008-01-01

    On the basis of a spin drift-diffusion model, we show how the spin current is composed and find that spin drift and spin diffusion contribute additively to the spin current, where the spin diffusion current decreases with electric field while the spin drift current increases, demonstrating that the extension of the spin diffusion length by a strong field does not result in a significant increase in spin current in semiconductors owing to the competing effect of the electric field on diffusion. We also find that there is a spin drift-diffusion crossover field for a process in which the drift and diffusion contribute equally to the spin current, which suggests a possible method of identifying whether the process for a given electric field is in the spin drift or spin diffusion regime. Spin drift-diffusion crossover fields for GaAs are calculated and are found to be quite small. We derive the relations between intrinsic spin diffusion length and the spin drift-diffusion crossover field of a semiconductor for different electron statistical regimes. The findings resulting from this investigation might be important for semiconductor spintronics.

  15. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  16. Predicting Factors of Zone 4 Attack in Volleyball.

    Science.gov (United States)

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  17. Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?

    Directory of Open Access Journals (Sweden)

    Ines Goicoechea-Telleria

    2018-01-01

    Full Text Available The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or to have access to places such as the gym or the office, so we rely on the security manufacturers offer when protecting our privileges and private life. It is well known that it is possible to hack into a fingerprint sensor using fake fingers made of Play-Doh and other easy-to-obtain materials but to what extent? Is this true for all users or only for specialists with a deep knowledge on biometrics? Are smartphone fingerprint sensors as reliable as desktop sensors? To answer these questions, we performed 3 separate evaluations. First, we evaluated 4 desktop fingerprint sensors of different technologies by attacking them with 7 different fake finger materials. All of them were successfully attacked by an experienced attacker. Secondly, we carried out a similar test on 5 smartphones with embedded sensors using the most successful materials, which also hacked the 5 sensors. Lastly, we gathered 15 simulated attackers with no background in biometrics to create fake fingers of several materials, and they had one week to attack the fingerprint sensors of the same 5 smartphones, with the starting point of a short video with the techniques to create them. All 5 smartphones were successfully attacked by an inexperienced attacker. This paper will provide the results achieved, as well as an analysis on the attack potential of every case. All results are given following the metrics of the standard ISO/IEC 30107-3.

  18. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia.

    Science.gov (United States)

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources.

  19. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

    Directory of Open Access Journals (Sweden)

    Željko Gavrić

    2018-01-01

    Full Text Available Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.

  20. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  1. Spin Polarization Oscillations without Spin Precession: Spin-Orbit Entangled Resonances in Quasi-One-Dimensional Spin Transport

    Directory of Open Access Journals (Sweden)

    D. H. Berman

    2014-03-01

    Full Text Available Resonant behavior involving spin-orbit entangled states occurs for spin transport along a narrow channel defined in a two-dimensional electron gas, including an apparent rapid relaxation of the spin polarization for special values of the channel width and applied magnetic field (so-called ballistic spin resonance. A fully quantum-mechanical theory for transport using multiple subbands of the one-dimensional system provides the dependence of the spin density on the applied magnetic field and channel width and position along the channel. We show how the spatially nonoscillating part of the spin density vanishes when the Zeeman energy matches the subband energy splittings. The resonance phenomenon persists in the presence of disorder.

  2. Effect of spin rotation coupling on spin transport

    International Nuclear Information System (INIS)

    Chowdhury, Debashree; Basu, B.

    2013-01-01

    We have studied the spin rotation coupling (SRC) as an ingredient to explain different spin-related issues. This special kind of coupling can play the role of a Dresselhaus like coupling in certain conditions. Consequently, one can control the spin splitting, induced by the Dresselhaus like term, which is unusual in a semiconductor heterostructure. Within this framework, we also study the renormalization of the spin-dependent electric field and spin current due to the k → ⋅p → perturbation, by taking into account the interband mixing in the rotating system. In this paper we predict the enhancement of the spin-dependent electric field resulting from the renormalized spin rotation coupling. The renormalization factor of the spin electric field is different from that of the SRC or Zeeman coupling. The effect of renormalized SRC on spin current and Berry curvature is also studied. Interestingly, in the presence of this SRC-induced SOC it is possible to describe spin splitting as well as spin galvanic effect in semiconductors. -- Highlights: •Studied effect of spin rotation coupling on the spin electric field, spin current and Berry curvature. •In the k → ⋅p → framework we study the renormalization of spin electric field and spin current. •For an inertial system we have discussed the spin splitting. •Expression for the Berry phase in the inertial system is discussed. •The inertial spin galvanic effect is studied

  3. Effect of spin rotation coupling on spin transport

    Energy Technology Data Exchange (ETDEWEB)

    Chowdhury, Debashree, E-mail: debashreephys@gmail.com; Basu, B., E-mail: sribbasu@gmail.com

    2013-12-15

    We have studied the spin rotation coupling (SRC) as an ingredient to explain different spin-related issues. This special kind of coupling can play the role of a Dresselhaus like coupling in certain conditions. Consequently, one can control the spin splitting, induced by the Dresselhaus like term, which is unusual in a semiconductor heterostructure. Within this framework, we also study the renormalization of the spin-dependent electric field and spin current due to the k{sup →}⋅p{sup →} perturbation, by taking into account the interband mixing in the rotating system. In this paper we predict the enhancement of the spin-dependent electric field resulting from the renormalized spin rotation coupling. The renormalization factor of the spin electric field is different from that of the SRC or Zeeman coupling. The effect of renormalized SRC on spin current and Berry curvature is also studied. Interestingly, in the presence of this SRC-induced SOC it is possible to describe spin splitting as well as spin galvanic effect in semiconductors. -- Highlights: •Studied effect of spin rotation coupling on the spin electric field, spin current and Berry curvature. •In the k{sup →}⋅p{sup →} framework we study the renormalization of spin electric field and spin current. •For an inertial system we have discussed the spin splitting. •Expression for the Berry phase in the inertial system is discussed. •The inertial spin galvanic effect is studied.

  4. Plants under dual attack

    NARCIS (Netherlands)

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses

  5. Threatening communication: A qualitative study of fear appeal effectiveness beliefs among intervention developers, policymakers, politicians, scientists, and advertising professionals

    OpenAIRE

    Peters, Gjalt-Jorn Y; Ruiter, Robert A C; Kok, Gerjo

    2013-01-01

    Threatening communication is a widely applied method in behavior change interventions, which at the same time has been heavily criticized in the psychological literature. The current paper describes a study of the reasons for this persistent wide application of threatening communication. We conducted qualitative interviews with 33 key actors in behavior change intervention development in The Netherlands. Specifically, we interviewed intervention developers, policymakers, politicians, scientis...

  6. Spin models for the single molecular magnet Mn12-AC

    Science.gov (United States)

    Al-Saqer, Mohamad A.

    2005-11-01

    The single molecular magnet (SMM) Mn12-AC attracted the attention of scientists since the discovery of its magnetic hystereses which are accompanied by sudden jumps in magnetic moments at low temperature. Unlike conventional bulk magnets, hysteresis in SMMs is of molecular origin. This qualifies them as candidates for next generation of high density storage media where a molecule which is at most few nanometers in size can be used to store a bit of information. However, the jumps in these hystereses, due to spin tunneling, can lead to undesired loss of information. Mn12-AC molecule contains twelve magnetic ions antiferromagnetically coupled by exchanges leading to S = 10 ground state manifold. The magnetic ions are surrounded by ligands which isolate them magnetically from neighboring molecules. The lowest state of S = 9 manifold is believed to lie at about 40 K above the ground state. Therefore, at low temperatures, the molecule is considered as a single uncoupled moment of spin S = 10. Such model has been used widely to understand phenomena exhibited by the molecule at low temperatures including the tunneling of its spin, while a little attention has been paid for the multi-spin nature of the molecule. Using the 8-spin model, we demonstrate that in order to understand the phenomena of tunneling, a full spin description of the molecule is required. We utilized a calculation scheme where a fraction of energy levels are used in the calculations and the influence of levels having higher energy is neglected. From the dependence of tunnel splittings on the number of states include, we conclude that models based on restricting the number of energy levels (single-spin and 8-spin models) lead to unreliable results of tunnel splitting calculations. To attack the full 12-spin model, we employed the Davidson algorithm to calculated lowest energy levels produced by exchange interactions and single ion anisotropies. The model reproduces the anisotropy properties at low

  7. New attacks on Wi-Fi Protected Setup

    OpenAIRE

    Hamed Mohtadi; Alireza Rahimi

    2015-01-01

    Wi-Fi Protected Setup (WPS) is a network security standard that is used to secure networks in home and office, introduced in 2006 by the Wi-Fi Alliance. It provides easier configuration setup and is used in almost all recent Wi-Fi devices. In this paper we propose two attacks on this standard. The first attack is an offline brute force attack that uses imbalance on registration protocol. This attack needs user action, but it is more efficient than previous attacks. The second attack uses weak...

  8. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  9. The Institutional Anchoring of Social Media Venues as Arenas for Local Political Communication. Perceptions by Voters and Politicians

    OpenAIRE

    Segaard, Signe Bock

    2017-01-01

    The article explores social media as institutions for political communication between voters and politicians. While observers have focused on the political use of social media when exploring their democratic potential, little is known about the users’ perceptions of these media. But as institutions are more than just behavior – they are also about formal as well as informal rules, norms and understandings – these perceptions could well be important to understanding the institutional anchoring...

  10. Invisible Trojan-horse attack

    DEFF Research Database (Denmark)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin

    2017-01-01

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance...

  11. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Sakuta, Hidenari

    2007-01-01

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  12. Script-viruses Attacks on UNIX OS

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-06-01

    Full Text Available In this article attacks on UNIX OS are considered. Currently antivirus developers are concentrated on protecting systems from viruses that are most common and attack popular operating systems. If the system or its components are not often attacked then the antivirus products are not protecting these components as it is not profitable. The same situation is with script-viruses for UNIX OS as most experts consider that it is impossible for such viruses to get enough rights to attack. Nevertheless the main conclusion of this article is the fact that such viruses can be very powerful and can attack systems and get enough rights.

  13. Hybrid attacks on model-based social recommender systems

    Science.gov (United States)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  14. Governance, Accountability, and Organizational Development: Eldercare Unit Managers' and Local Politicians' Experiences of and Responses to State Supervision of Swedish Eldercare.

    Science.gov (United States)

    Andersson, Katarina; Hanberger, Anders; Nygren, Lennart

    2018-02-22

    This article explores how local politicians and care unit managers in Swedish eldercare experience and respond to state supervision (SSV). Twelve politicians and twelve managers in 15 previously inspected municipalities were interviewed about their experiences of and reactions to SSV in relation to their views of care quality and routines in eldercare practice. The findings indicate that local managers and political chairs perceived SSV in eldercare positively at a superficial level but were critical of and disappointed with specific aspects of it. In terms of (a) governance, chairs and managers said SSV strengthened implementation of national policies via local actors, but they were critical of SSV's narrow focus on control and flaws in eldercare practice. With regard to (b) accountability, SSV was seen as limited to accountability for finances and systemic performance, and regarding (c) organizational development, SSV was seen as limited to improving routines and compliance with legislation, while local definitions of quality are broader than that. In general, local actors regarded SSV as improving administrative aspects and routines in practice but ignoring the relational content of eldercare quality.

  15. An Analysis of Attacks on Blockchain Consensus

    OpenAIRE

    Bissias, George; Levine, Brian Neil; Ozisik, A. Pinar; Andresen, Gavin

    2016-01-01

    We present and validate a novel mathematical model of the blockchain mining process and use it to conduct an economic evaluation of the double-spend attack, which is fundamental to all blockchain systems. Our analysis focuses on the value of transactions that can be secured under a conventional double-spend attack, both with and without a concurrent eclipse attack. Our model quantifies the importance of several factors that determine the attack's success, including confirmation depth, attacke...

  16. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank...

  17. Spin Hall and spin swapping torques in diffusive ferromagnets

    KAUST Repository

    Pauyac, C. O.

    2017-12-08

    A complete set of the generalized drift-diffusion equations for a coupled charge and spin dynamics in ferromagnets in the presence of extrinsic spin-orbit coupling is derived from the quantum kinetic approach, covering major transport phenomena, such as the spin and anomalous Hall effects, spin swapping, spin precession and relaxation processes. We argue that the spin swapping effect in ferromagnets is enhanced due to spin polarization, while the overall spin texture induced by the interplay of spin-orbital and spin precessional effects displays a complex spatial dependence that can be exploited to generate torques and nucleate/propagate domain walls in centrosymmetric geometries without use of external polarizers, as opposed to the conventional understanding of spin-orbit mediated torques.

  18. Spin Hall and spin swapping torques in diffusive ferromagnets

    KAUST Repository

    Pauyac, C. O.; Chshiev, M.; Manchon, Aurelien; Nikolaev, S. A.

    2017-01-01

    A complete set of the generalized drift-diffusion equations for a coupled charge and spin dynamics in ferromagnets in the presence of extrinsic spin-orbit coupling is derived from the quantum kinetic approach, covering major transport phenomena, such as the spin and anomalous Hall effects, spin swapping, spin precession and relaxation processes. We argue that the spin swapping effect in ferromagnets is enhanced due to spin polarization, while the overall spin texture induced by the interplay of spin-orbital and spin precessional effects displays a complex spatial dependence that can be exploited to generate torques and nucleate/propagate domain walls in centrosymmetric geometries without use of external polarizers, as opposed to the conventional understanding of spin-orbit mediated torques.

  19. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  20. Attacks on public telephone networks: technologies and challenges

    Science.gov (United States)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  1. Spin-orbit and spin-lattice coupling

    International Nuclear Information System (INIS)

    Bauer, Gerrit E.W.; Ziman, Timothy; Mori, Michiyasu

    2014-01-01

    We pursued theoretical research on the coupling of electron spins in the condensed matter to the lattice as mediated by the spin-orbit interaction with special focus on the spin and anomalous Hall effects. (author)

  2. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2010-01-01

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  3. Defense and attack of complex and dependent systems

    Energy Technology Data Exchange (ETDEWEB)

    Hausken, Kjell, E-mail: kjell.hausken@uis.n [Faculty of Social Sciences, University of Stavanger, N-4036 Stavanger (Norway)

    2010-01-15

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  4. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error......-prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...... are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  5. Pareto Efficient Solutions of Attack-Defence Trees

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2015-01-01

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as proba......Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes......, such as probability or cost of attacks and defences. In case of multiple parameters most analytical methods optimise one parameter at a time, e.g., minimise cost or maximise probability of an attack. Such methods may lead to sub-optimal solutions when optimising conflicting parameters, e.g., minimising cost while...... maximising probability. In order to tackle this challenge, we devise automated techniques that optimise all parameters at once. Moreover, in the case of conflicting parameters our techniques compute the set of all optimal solutions, defined in terms of Pareto efficiency. The developments are carried out...

  6. Spin rotation after a spin-independent scattering. Spin properties of an electron gas in a solid

    International Nuclear Information System (INIS)

    Zayets, V.

    2014-01-01

    It is shown that spin direction of an electron may not be conserved after a spin-independent scattering. The spin rotations occur due to a quantum-mechanical fact that when a quantum state is occupied by two electrons of opposite spins, the total spin of the state is zero and the spin direction of each electron cannot be determined. It is shown that it is possible to divide all conduction electrons into two group distinguished by their time-reversal symmetry. In the first group the electron spins are all directed in one direction. In the second group there are electrons of all spin directions. The number of electrons in each group is conserved after a spin-independent scattering. This makes it convenient to use these groups for the description of the magnetic properties of conduction electrons. The energy distribution of spins, the Pauli paramagnetism and the spin distribution in the ferromagnetic metals are described within the presented model. The effects of spin torque and spin-torque current are described. The origin of spin-transfer torque is explained within the presented model

  7. Spin injection and spin accumulation in all-metal mesoscopic spin valves

    NARCIS (Netherlands)

    Jedema, FJ; Nijboer, MS; Filip, AT; van Wees, BJ

    2003-01-01

    We study the electrical injection and detection of spin accumulation in lateral ferromagnetic-metal-nonmagnetic-metal-ferromagnetic-metal (F/N/F) spin valve devices with transparent interfaces. Different ferromagnetic metals, Permalloy (Py), cobalt (Co), and nickel (Ni), are used as electrical spin

  8. The susceptibilities in the spin-S Ising model

    International Nuclear Information System (INIS)

    Ainane, A.; Saber, M.

    1995-08-01

    The susceptibilities of the spin-S Ising model are evaluated using the effective field theory introduced by Tucker et al. for studying general spin-S Ising model. The susceptibilities are studied for all spin values from S = 1/2 to S = 5/2. (author). 12 refs, 4 figs

  9. Control of electron spin decoherence in nuclear spin baths

    Science.gov (United States)

    Liu, Ren-Bao

    2011-03-01

    Nuclear spin baths are a main mechanism of decoherence of spin qubits in solid-state systems, such as quantum dots and nitrogen-vacancy (NV) centers of diamond. The decoherence results from entanglement between the electron and nuclear spins, established by quantum evolution of the bath conditioned on the electron spin state. When the electron spin is flipped, the conditional bath evolution is manipulated. Such manipulation of bath through control of the electron spin not only leads to preservation of the center spin coherence but also demonstrates quantum nature of the bath. In an NV center system, the electron spin effectively interacts with hundreds of 13 C nuclear spins. Under repeated flip control (dynamical decoupling), the electron spin coherence can be preserved for a long time (> 1 ms) . Thereforesomecharacteristicoscillations , duetocouplingtoabonded 13 C nuclear spin pair (a dimer), are imprinted on the electron spin coherence profile, which are very sensitive to the position and orientation of the dimer. With such finger-print oscillations, a dimer can be uniquely identified. Thus, we propose magnetometry with single-nucleus sensitivity and atomic resolution, using NV center spin coherence to identify single molecules. Through the center spin coherence, we could also explore the many-body physics in an interacting spin bath. The information of elementary excitations and many-body correlations can be extracted from the center spin coherence under many-pulse dynamical decoupling control. Another application of the preserved spin coherence is identifying quantumness of a spin bath through the back-action of the electron spin to the bath. We show that the multiple transition of an NV center in a nuclear spin bath can have longer coherence time than the single transition does, when the classical noises due to inhomogeneous broadening is removed by spin echo. This counter-intuitive result unambiguously demonstrates the quantumness of the nuclear spin bath

  10. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  11. Heart Attack Symptoms in Women

    Science.gov (United States)

    ... fat, cholesterol and other substances (plaque). Watch an animation of a heart attack . Many women think the ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  12. Exact solutions in dynamics of alternation open spin chains s = 1/2 with XY-Hamiltonian and its application to the problems of many-quantum dynamics and quantum information theory

    International Nuclear Information System (INIS)

    Kuznetsova, E.I.; Fel'dman, Eh.B.

    2006-01-01

    Paper deals with a method of exact diagonalization of XY-Hamiltonian of s=1/2 alternated open chain of spins based on the Jordan-Wigner transform and analysis of dynamics of spinless fermions. One studied the many-quantum spin dynamics of alternated chains under high temperatures and calculated the intensities of many-quantum coherencies. One attacked the problem dealing with transfer of a quantum state from one end of the alternated chain to the opposite end. It is shown that perfect transfer of cubits may take place in alternated chains with larger number of spins in contrast to homogeneous chains [ru

  13. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing

  14. Magnetocaloric effect in quantum spin-s chains

    Directory of Open Access Journals (Sweden)

    A. Honecker

    2009-01-01

    Full Text Available We compute the entropy of antiferromagnetic quantum spin-s chains in an external magnetic field using exact diagonalization and Quantum Monte Carlo simulations. The magnetocaloric effect, i. e., temperature variations during adiabatic field changes, can be derived from the isentropes. First, we focus on the example of the spin-s=1 chain and show that one can cool by closing the Haldane gap with a magnetic field. We then move to quantum spin-s chains and demonstrate linear scaling with s close to the saturation field. In passing, we propose a new method to compute many low-lying excited states using the Lanczos recursion.

  15. Graphene spin diode: Strain-modulated spin rectification

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Yunhua; Wang, B., E-mail: stslyl@mail.sysu.edu.cn, E-mail: wangbiao@mail.sysu.edu.cn [Sino-French Institute of Nuclear Engineering and Technology, School of Physics and Engineering, State Key Laboratory of Optoelectronic Materials and Technologies, Sun Yat-sen University, Guangzhou 510275 (China); Liu, Yulan, E-mail: stslyl@mail.sysu.edu.cn, E-mail: wangbiao@mail.sysu.edu.cn [School of Engineering, Sun Yat-sen University, Guangzhou 510275 (China)

    2014-08-04

    Strain effects on spin transport in a ferromagnetic/strained/normal graphene junction are explored theoretically. It is shown that the spin-resolved Fermi energy range can be controlled by the armchair direction strain because the strain-induced pseudomagnetic field suppresses the current. The spin rectification effect for the bias reversal occurs because of a combination of ferromagnetic exchange splitting and the broken spatial symmetry of the junction. In addition, the spin rectification performance can be tuned remarkably by manipulation of the strains. In view of this strain-modulated spin rectification effect, we propose that the graphene-based ferromagnetic/strained/normal junction can be used as a tunable spin diode.

  16. Spin Torques in Systems with Spin Filtering and Spin Orbit Interaction

    KAUST Repository

    Ortiz Pauyac, Christian

    2016-01-01

    filtering. In Chap. 3 we discuss the Rashba torque in ferromagnetic films, and in Chap. 4 we study spin Hall effect and spin swapping in ferromagnetic films, exploring the nature of spin-orbit torques based on these mechanisms. Conclusions and perspectives

  17. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  18. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support....... However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  19. Drones, quasi-spin or iso-spin. A comparison of many-body techniques for general spin

    International Nuclear Information System (INIS)

    McKenzie, B.J.; Stedman, G.E.

    1976-01-01

    For an effective-spin system with 2S + 1 levels there are a number of possible mappings of spin onto pseudo-fermion operators. The relative merits of three of these methods are investigated by calculating to second order the dispersion relation for coupled spin-phonon modes in crystals containing S = 1 effective spin impurities. It is found that the drone formalism quickly becomes intractable at higher spin values, as does the related quasi-spin formalism developed in contrast with the iso-spin (or Abrinkosov projection) formalism. (author)

  20. Spin-current emission governed by nonlinear spin dynamics.

    Science.gov (United States)

    Tashiro, Takaharu; Matsuura, Saki; Nomura, Akiyo; Watanabe, Shun; Kang, Keehoon; Sirringhaus, Henning; Ando, Kazuya

    2015-10-16

    Coupling between conduction electrons and localized magnetization is responsible for a variety of phenomena in spintronic devices. This coupling enables to generate spin currents from dynamical magnetization. Due to the nonlinearity of magnetization dynamics, the spin-current emission through the dynamical spin-exchange coupling offers a route for nonlinear generation of spin currents. Here, we demonstrate spin-current emission governed by nonlinear magnetization dynamics in a metal/magnetic insulator bilayer. The spin-current emission from the magnetic insulator is probed by the inverse spin Hall effect, which demonstrates nontrivial temperature and excitation power dependences of the voltage generation. The experimental results reveal that nonlinear magnetization dynamics and enhanced spin-current emission due to magnon scatterings are triggered by decreasing temperature. This result illustrates the crucial role of the nonlinear magnon interactions in the spin-current emission driven by dynamical magnetization, or nonequilibrium magnons, from magnetic insulators.

  1. Spin Funneling for Enhanced Spin Injection into Ferromagnets

    Science.gov (United States)

    Sayed, Shehrin; Diep, Vinh Q.; Camsari, Kerem Yunus; Datta, Supriyo

    2016-07-01

    It is well-established that high spin-orbit coupling (SOC) materials convert a charge current density into a spin current density which can be used to switch a magnet efficiently and there is increasing interest in identifying materials with large spin Hall angle for lower switching current. Using experimentally benchmarked models, we show that composite structures can be designed using existing spin Hall materials such that the effective spin Hall angle is larger by an order of magnitude. The basic idea is to funnel spins from a large area of spin Hall material into a small area of ferromagnet using a normal metal with large spin diffusion length and low resistivity like Cu or Al. We show that this approach is increasingly effective as magnets get smaller. We avoid unwanted charge current shunting by the low resistive NM layer utilizing the newly discovered phenomenon of pure spin conduction in ferromagnetic insulators via magnon diffusion. We provide a spin circuit model for magnon diffusion in FMI that is benchmarked against recent experiments and theory.

  2. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  3. Spin nematics next to spin singlets

    Science.gov (United States)

    Yokoyama, Yuto; Hotta, Chisa

    2018-05-01

    We provide a route to generate nematic order in a spin-1/2 system. Unlike the well-known magnon-binding mechanism, our spin nematics requires neither the frustration effect nor spin polarization in a high field or in the vicinity of a ferromagnet, but instead appears next to the spin singlet phase. We start from a state consisting of a quantum spin-1/2 singlet dimer placed on each site of a triangular lattice, and show that interdimer ring exchange interactions efficiently dope the SU(2) triplets that itinerate and interact, easily driving a stable singlet state to either Bose-Einstein condensates or a triplet crystal, some hosting a spin nematic order. A variety of roles the ring exchange serves includes the generation of a bilinear-biquadratic interaction between nearby triplets, which is responsible for the emergent nematic order separated from the singlet phase by a first-order transition.

  4. Understanding How Components of Organisations Contribute to Attacks

    DEFF Research Database (Denmark)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors is diffi......Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors...... is difficult. Recently, system models have been used for automatically identifying possible attacks on the modelled organisation. The generated attacks consider all three layers, making the contribution of building infrastructure, computer infrastructure, and humans (insiders and outsiders) explicit. However......, this contribution is only visible in the attack trees as part of the performed steps; it cannot be mapped back to the model directly since the actions usually involve several elements (attacker and targeted actor or asset). Especially for large attack trees, understanding the relations between several model...

  5. Attack Graph Construction for Security Events Analysis

    Directory of Open Access Journals (Sweden)

    Andrey Alexeevich Chechulin

    2014-09-01

    Full Text Available The paper is devoted to investigation of the attack graphs construction and analysis task for a network security evaluation and real-time security event processing. Main object of this research is the attack modeling process. The paper contains the description of attack graphs building, modifying and analysis technique as well as overview of implemented prototype for network security analysis based on attack graph approach.

  6. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  7. Non magnetic neutron spin quantum precession using multilayer spin splitter and a phase-spin echo interferometer

    Energy Technology Data Exchange (ETDEWEB)

    Ebisawa, T.; Tasaki, S.; Kawai, T.; Akiyoshi, T. [Kyoto Univ., Kumatori, Osaka (Japan). Research Reactor Inst.; Achiwa, N.; Hino, M.; Otake, Y.; Funahashi, H.

    1996-08-01

    The authors have developed cold neutron optics and interferometry using multilayer mirrors. The advantages of the multilayer mirrors are their applicability to long wavelength neutrons and a great variety of the mirror performance. The idea of the present spin interferometry is based on nonmagnetic neutron spin quantum precession using multilayer spin splitters. The equation for polarized neutrons means that the polarized neutrons are equivalent to the coherent superposition of two parallel spin eigenstates. The structure and principle of a multilayer spin splitter are explained, and the nonmagnetic gap layer of the multilayer spin splitter gives rise to neutron spin quantum precession. The performance test of the multilayer spin splitter were made with a new spin interferometer, which is analogous optically to a spin echo system with vertical precession field. The spin interferometers were installed at Kyoto University research reactor and the JRR-3. The testing method and the results are reported. The performance tests on a new phase-spin echo interferometer are described, and its applications to the development of a high resolution spin echo system and a Jamin type cold neutron interferometer are proposed. (K.I.)

  8. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2016-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations...... approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  9. When Sinuses Attack! (For Kids)

    Science.gov (United States)

    ... First Aid & Safety Doctors & Hospitals Videos Recipes for Kids Kids site Sitio para niños How the Body Works ... Search English Español When Sinuses Attack! KidsHealth / For Kids / When Sinuses Attack! What's in this article? What ...

  10. Spin current through quantum-dot spin valves

    International Nuclear Information System (INIS)

    Wang, J; Xing, D Y

    2006-01-01

    We report a theoretical study of the influence of the Coulomb interaction on the equilibrium spin current in a quantum-dot spin valve, in which the quantum dot described by the Anderson impurity model is coupled to two ferromagnetic leads with noncollinear magnetizations. In the Kondo regime, electrons transmit through the quantum dot via higher-order virtual processes, in which the spin of either lead electrons or a localized electron on the quantum dot may reverse. It is found that the magnitude of the spin current decreases with increasing Coulomb interactions due to spin flip effects on the dot. However, the spatial direction of the spin current remains unchanged; it is determined only by the exchange coupling between two noncollinear magnetizations

  11. Heart Attack

    Science.gov (United States)

    ... properly causes your body's blood sugar levels to rise, increasing your risk of heart attack. Metabolic syndrome. This occurs when you have obesity, high blood pressure and high blood sugar. Having metabolic ...

  12. Compound nucleus effects in spin-spin cross sections

    International Nuclear Information System (INIS)

    Thompson, W.J.

    1976-01-01

    By comparison with recent data, it is shown that spin-spin cross sections for low-energy neutrons may be dominated by a simple compound-elastic level-density effect, independent of spin-spin terms in the nucleon-nucleus optical-model potential. (Auth.)

  13. Software-based Microarchitectural Attacks

    OpenAIRE

    Gruss, Daniel

    2017-01-01

    Modern processors are highly optimized systems where every single cycle of computation time matters. Many optimizations depend on the data that is being processed. Software-based microarchitectural attacks exploit effects of these optimizations. Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel. This leakage even persists across all common isolation boundaries, such as processes, containers, and virtual ...

  14. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    Nai Fovino, Igor; Masera, Marcelo; De Cian, Alessio

    2009-01-01

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  15. Integrating cyber attacks within fault trees

    Energy Technology Data Exchange (ETDEWEB)

    Nai Fovino, Igor [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy)], E-mail: igor.nai@jrc.it; Masera, Marcelo [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy); De Cian, Alessio [Department of Electrical Engineering, University di Genova, Genoa (Italy)

    2009-09-15

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  16. Attack and Vulnerability Penetration Testing: FreeBSD

    Directory of Open Access Journals (Sweden)

    Abdul Hanan Abdullah

    2013-07-01

    Full Text Available Computer system security has become a major concern over the past few years. Attacks, threasts or intrusions, against computer system and network have become commonplace events. However, there are some system devices and other tools that are available to overcome the threat of these attacks. Currently, cyber attack is a major research and inevitable. This paper presents some steps of penetration in FreeBSD operating system, some tools and new steps to attack used in this experiment, probes for reconnaissance, guessing password via brute force, gaining privilege access and flooding victim machine to decrease availability. All these attacks were executed and infiltrate within the environment of Intrusion Threat Detection Universiti Teknologi Malaysia (ITD UTM data set. This work is expected to be a reference for practitioners to prepare their systems from Internet attacks.

  17. Rotary balance data for a typical single-engine general aviation design for an angle-of-attack range of 8 degrees to 35 degrees, 3. Effect of wing leading-edge modifications, model A

    Science.gov (United States)

    Bihrle, W., Jr.; Mulcay, W.

    1979-01-01

    Aerodynamic characteristics obtained in a rotational flow environment utilizing a rotary balance located in the Langley spin tunnel are presented in plotted form for a 1/5 scale, single-engine, low-wing, general aviation airplane model. The configurations tested included the basic airplane, sixteen wing leading-edge modifications and lateral-directional control settings. Data are presented for all configurations without analysis for an angle of attack range of 8 deg to 35 deg and clockwise and counter-clockwise rotations covering an Omega b/2v range from 0 to 0.85. Also, data are presented above 35 deg of attack for some configurations.

  18. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  19. Recurrent spontaneous attacks of dizziness.

    Science.gov (United States)

    Lempert, Thomas

    2012-10-01

    This article describes the common causes of recurrent vertigo and dizziness that can be diagnosed largely on the basis of history. Ninety percent of spontaneous recurrent vertigo and dizziness can be explained by six disorders: (1) Ménière disease is characterized by vertigo attacks, lasting 20 minutes to several hours, with concomitant hearing loss, tinnitus, and aural fullness. Aural symptoms become permanent during the course of the disease. (2) Attacks of vestibular migraine may last anywhere from minutes to days. Most patients have a previous history of migraine headaches, and many experience migraine symptoms during the attack. (3) Vertebrobasilar TIAs affect older adults with vascular risk factors. Most attacks last less than 1 hour and are accompanied by other symptoms from the posterior circulation territory. (4) Vestibular paroxysmia is caused by vascular compression of the eighth cranial nerve. It manifests itself with brief attacks of vertigo that recur many times per day, sometimes with concomitant cochlear symptoms. (5) Orthostatic hypotension causes brief episodes of dizziness lasting seconds to a few minutes after standing up and is relieved by sitting or lying down. In older adults, it may be accompanied by supine hypertension. (6) Panic attacks usually last minutes, occur in specific situations, and are accompanied by choking, palpitations, tremor, heat, and anxiety. Less common causes of spontaneous recurrent vertigo and dizziness include perilymph fistula, superior canal dehiscence, autoimmune inner ear disease, otosclerosis, cardiac arrhythmia, and medication side effects. Neurologists need to venture into otolaryngology, internal medicine, and psychiatry to master the differential diagnosis of recurrent dizziness.

  20. Optical spin generation/detection and spin transport lifetimes

    International Nuclear Information System (INIS)

    Miah, M. Idrish

    2011-01-01

    We generate electron spins in semiconductors by optical pumping. The detection of them is also performed by optical technique using time-resolved pump-probe photoluminescence polarization measurements in the presence of an external magnetic field perpendicular to the generated spin. The spin polarization in dependences of the pulse length, pump-probe delay and external magnetic field is studied. From the dependence of spin-polarization on the delay of the probe, the electronic spin transport lifetimes and the spin relaxation frequencies as a function of the strength of the magnetic field are estimated. The results are discussed based on hyperfine effects for interacting electrons.

  1. Optical spin generation/detection and spin transport lifetimes

    Energy Technology Data Exchange (ETDEWEB)

    Miah, M. Idrish, E-mail: m.miah@griffith.edu.au [Department of Physics, University of Chittagong, Chittagong 4331 (Bangladesh)

    2011-02-25

    We generate electron spins in semiconductors by optical pumping. The detection of them is also performed by optical technique using time-resolved pump-probe photoluminescence polarization measurements in the presence of an external magnetic field perpendicular to the generated spin. The spin polarization in dependences of the pulse length, pump-probe delay and external magnetic field is studied. From the dependence of spin-polarization on the delay of the probe, the electronic spin transport lifetimes and the spin relaxation frequencies as a function of the strength of the magnetic field are estimated. The results are discussed based on hyperfine effects for interacting electrons.

  2. Can trust in politicians explain individuals' support for climate policy? The case of CO{sub 2} tax

    Energy Technology Data Exchange (ETDEWEB)

    Hammar, Henrik [Goeteborg Univ., Dept. of Economics, Goeteborg (Sweden); National Inst. of Economic Research (NIER), Stockholm (Sweden); Jagers, Sverker C. [Goeteborg Univ., Dept. of Polital Science, Goeteborg (Sweden)

    2006-07-01

    This article provides an analysis of the support for public policies from a trust perspective. The empirical focus is on the use of a tax on carbon dioxide (CO{sub 2}), a policy tool aimed at coordinating national emissions targets in Sweden. Among economists and experts in the field of climate policy, a CO{sub 2} tax is viewed as a cost-effective policy. The policy problem is that public support for CO{sub 2} taxes is very low, leaving policy makers with high-cost options. Apart from traditional explanatory variables such as demographic factors, level of education, ideology and self-interest, what can explain this public opposition? Using individual level data, we analyse whether support for increases in the CO{sub 2} tax on gasoline can be explained by citizens' generalized trust in other individuals (who they do not necessarily know) or by their trust in politicians. We find that only the latter measure gains support in a regression analysis. Moreover, when splitting the sample into high-trusting and low-trusting individuals, we find that high-trusting individuals who have access to a car (compared with those without access) are statistically no more likely to resist increases in CO{sub 2} taxes than people without access to a car. Rather, it is individuals with access to a car and who do not trust their politicians who are likely to resist CO{sub 2} taxes. (Author)

  3. Shark Attack Project - Marine Attack at Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Adrianus J

    2005-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  4. Novel Method For Low-Rate Ddos Attack Detection

    Science.gov (United States)

    Chistokhodova, A. A.; Sidorov, I. D.

    2018-05-01

    The relevance of the work is associated with an increasing number of advanced types of DDoS attacks, in particular, low-rate HTTP-flood. Last year, the power and complexity of such attacks increased significantly. The article is devoted to the analysis of DDoS attacks detecting methods and their modifications with the purpose of increasing the accuracy of DDoS attack detection. The article details low-rate attacks features in comparison with conventional DDoS attacks. During the analysis, significant shortcomings of the available method for detecting low-rate DDoS attacks were found. Thus, the result of the study is an informal description of a new method for detecting low-rate denial-of-service attacks. The architecture of the stand for approbation of the method is developed. At the current stage of the study, it is possible to improve the efficiency of an already existing method by using a classifier with memory, as well as additional information.

  5. Angular dependence of spin-orbit spin-transfer torques

    KAUST Repository

    Lee, Ki-Seung

    2015-04-06

    In ferromagnet/heavy-metal bilayers, an in-plane current gives rise to spin-orbit spin-transfer torque, which is usually decomposed into fieldlike and dampinglike torques. For two-dimensional free-electron and tight-binding models with Rashba spin-orbit coupling, the fieldlike torque acquires nontrivial dependence on the magnetization direction when the Rashba spin-orbit coupling becomes comparable to the exchange interaction. This nontrivial angular dependence of the fieldlike torque is related to the Fermi surface distortion, determined by the ratio of the Rashba spin-orbit coupling to the exchange interaction. On the other hand, the dampinglike torque acquires nontrivial angular dependence when the Rashba spin-orbit coupling is comparable to or stronger than the exchange interaction. It is related to the combined effects of the Fermi surface distortion and the Fermi sea contribution. The angular dependence is consistent with experimental observations and can be important to understand magnetization dynamics induced by spin-orbit spin-transfer torques.

  6. Angular dependence of spin-orbit spin-transfer torques

    KAUST Repository

    Lee, Ki-Seung; Go, Dongwook; Manchon, Aurelien; Haney, Paul M.; Stiles, M. D.; Lee, Hyun-Woo; Lee, Kyung-Jin

    2015-01-01

    In ferromagnet/heavy-metal bilayers, an in-plane current gives rise to spin-orbit spin-transfer torque, which is usually decomposed into fieldlike and dampinglike torques. For two-dimensional free-electron and tight-binding models with Rashba spin-orbit coupling, the fieldlike torque acquires nontrivial dependence on the magnetization direction when the Rashba spin-orbit coupling becomes comparable to the exchange interaction. This nontrivial angular dependence of the fieldlike torque is related to the Fermi surface distortion, determined by the ratio of the Rashba spin-orbit coupling to the exchange interaction. On the other hand, the dampinglike torque acquires nontrivial angular dependence when the Rashba spin-orbit coupling is comparable to or stronger than the exchange interaction. It is related to the combined effects of the Fermi surface distortion and the Fermi sea contribution. The angular dependence is consistent with experimental observations and can be important to understand magnetization dynamics induced by spin-orbit spin-transfer torques.

  7. Cement mortar-degraded spinney waste composite as a matrix for immobilizing some low and intermediate level radioactive wastes: Consistency under frost attack

    International Nuclear Information System (INIS)

    Eskander, S.B.; Saleh, H.M.

    2012-01-01

    Highlights: ► Spinney fiber is one of the wastes generated from spinning of cotton raw materials. ► Cement mortar composite was hydrated by using the degraded slurry of spinney wastes. ► Frost resistance was assessed for the mortar-degraded spinney waste composite specimens. ► SEM image, FT-IR and XRD patterns were performed for samples subjected to frost attack. - Abstract: The increasing amounts of spinning waste fibers generated from cotton fabrication are problematic subject. Simultaneous shortage in the landfill disposal space is also the most problem associated with dumping of these wastes. Cement mortar composite was developed by hydrating mortar components using the waste slurry obtained from wet oxidative degradation of these spinney wastes. The consistency of obtained composite was determined under freeze–thaw events. Frost resistance was assessed for the mortar composite specimens by evaluating its compressive strength, apparent porosity and mass loss at the end of each period of freeze–thaw up to 45 cycles. Scanning electron microscopy, infrared spectroscopy and X-ray diffraction analyses were performed for samples subjected to frost attack aiming at evaluating the cement mortar in the presence of degraded spinney waste. The cement mortar composite exhibits acceptable resistance and durability against the freeze–thaw treatment that could be chosen in radioactive waste management as immobilizing agent for some low and intermediate level radioactive wastes.

  8. Heart Attack

    Science.gov (United States)

    ... family history of heart attack race – African Americans, Mexican Americans, Native Americans, and native Hawaiians are at ... Your doctor will prescribe the medicines that are right for you. If you have had a heart ...

  9. Microscopic studies of nonlocal spin dynamics and spin transport (invited)

    Energy Technology Data Exchange (ETDEWEB)

    Adur, Rohan; Du, Chunhui; Cardellino, Jeremy; Scozzaro, Nicolas; Wolfe, Christopher S.; Wang, Hailong; Herman, Michael; Bhallamudi, Vidya P.; Pelekhov, Denis V.; Yang, Fengyuan; Hammel, P. Chris, E-mail: hammel@physics.osu.edu [Department of Physics, The Ohio State University, Columbus, Ohio 43210 (United States)

    2015-05-07

    Understanding the behavior of spins coupling across interfaces in the study of spin current generation and transport is a fundamental challenge that is important for spintronics applications. The transfer of spin angular momentum from a ferromagnet into an adjacent normal material as a consequence of the precession of the magnetization of the ferromagnet is a process known as spin pumping. We find that, in certain circumstances, the insertion of an intervening normal metal can enhance spin pumping between an excited ferromagnetic magnetization and a normal metal layer as a consequence of improved spin conductance matching. We have studied this using inverse spin Hall effect and enhanced damping measurements. Scanned probe magnetic resonance techniques are a complementary tool in this context offering high resolution magnetic resonance imaging, localized spin excitation, and direct measurement of spin lifetimes or damping. Localized magnetic resonance studies of size-dependent spin dynamics in the absence of lithographic confinement in both ferromagnets and paramagnets reveal the close relationship between spin transport and spin lifetime at microscopic length scales. Finally, detection of ferromagnetic resonance of a ferromagnetic film using the photoluminescence of nitrogen vacancy spins in neighboring nanodiamonds demonstrates long-range spin transport between insulating materials, indicating the complexity and generality of spin transport in diverse, spatially separated, material systems.

  10. Microscopic studies of nonlocal spin dynamics and spin transport (invited)

    Science.gov (United States)

    Adur, Rohan; Du, Chunhui; Cardellino, Jeremy; Scozzaro, Nicolas; Wolfe, Christopher S.; Wang, Hailong; Herman, Michael; Bhallamudi, Vidya P.; Pelekhov, Denis V.; Yang, Fengyuan; Hammel, P. Chris

    2015-05-01

    Understanding the behavior of spins coupling across interfaces in the study of spin current generation and transport is a fundamental challenge that is important for spintronics applications. The transfer of spin angular momentum from a ferromagnet into an adjacent normal material as a consequence of the precession of the magnetization of the ferromagnet is a process known as spin pumping. We find that, in certain circumstances, the insertion of an intervening normal metal can enhance spin pumping between an excited ferromagnetic magnetization and a normal metal layer as a consequence of improved spin conductance matching. We have studied this using inverse spin Hall effect and enhanced damping measurements. Scanned probe magnetic resonance techniques are a complementary tool in this context offering high resolution magnetic resonance imaging, localized spin excitation, and direct measurement of spin lifetimes or damping. Localized magnetic resonance studies of size-dependent spin dynamics in the absence of lithographic confinement in both ferromagnets and paramagnets reveal the close relationship between spin transport and spin lifetime at microscopic length scales. Finally, detection of ferromagnetic resonance of a ferromagnetic film using the photoluminescence of nitrogen vacancy spins in neighboring nanodiamonds demonstrates long-range spin transport between insulating materials, indicating the complexity and generality of spin transport in diverse, spatially separated, material systems.

  11. Microscopic studies of nonlocal spin dynamics and spin transport (invited)

    International Nuclear Information System (INIS)

    Adur, Rohan; Du, Chunhui; Cardellino, Jeremy; Scozzaro, Nicolas; Wolfe, Christopher S.; Wang, Hailong; Herman, Michael; Bhallamudi, Vidya P.; Pelekhov, Denis V.; Yang, Fengyuan; Hammel, P. Chris

    2015-01-01

    Understanding the behavior of spins coupling across interfaces in the study of spin current generation and transport is a fundamental challenge that is important for spintronics applications. The transfer of spin angular momentum from a ferromagnet into an adjacent normal material as a consequence of the precession of the magnetization of the ferromagnet is a process known as spin pumping. We find that, in certain circumstances, the insertion of an intervening normal metal can enhance spin pumping between an excited ferromagnetic magnetization and a normal metal layer as a consequence of improved spin conductance matching. We have studied this using inverse spin Hall effect and enhanced damping measurements. Scanned probe magnetic resonance techniques are a complementary tool in this context offering high resolution magnetic resonance imaging, localized spin excitation, and direct measurement of spin lifetimes or damping. Localized magnetic resonance studies of size-dependent spin dynamics in the absence of lithographic confinement in both ferromagnets and paramagnets reveal the close relationship between spin transport and spin lifetime at microscopic length scales. Finally, detection of ferromagnetic resonance of a ferromagnetic film using the photoluminescence of nitrogen vacancy spins in neighboring nanodiamonds demonstrates long-range spin transport between insulating materials, indicating the complexity and generality of spin transport in diverse, spatially separated, material systems

  12. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  13. Noise in tunneling spin current across coupled quantum spin chains

    Science.gov (United States)

    Aftergood, Joshua; Takei, So

    2018-01-01

    We theoretically study the spin current and its dc noise generated between two spin-1 /2 spin chains weakly coupled at a single site in the presence of an over-population of spin excitations and a temperature elevation in one subsystem relative to the other, and we compare the corresponding transport quantities across two weakly coupled magnetic insulators hosting magnons. In the spin chain scenario, we find that applying a temperature bias exclusively leads to a vanishing spin current and a concomitant divergence in the spin Fano factor, defined as the spin current noise-to-signal ratio. This divergence is shown to have an exact analogy to the physics of electron scattering between fractional quantum Hall edge states and not to arise in the magnon scenario. We also reveal a suppression in the spin current noise that exclusively arises in the spin chain scenario due to the fermion nature of the spin-1/2 operators. We discuss how the spin Fano factor may be extracted experimentally via the inverse spin Hall effect used extensively in spintronics.

  14. Further attacks on Yeung-Mintzer fragile watermarking scheme

    Science.gov (United States)

    Fridrich, Jessica; Goljan, Miroslav; Memon, Nasir D.

    2000-05-01

    In this paper, we describe new and improved attacks on the authentication scheme previously proposed by Yeung and Mintzer. Previous attacks assumed that the binary watermark logo inserted in an image for the purposes of authentication was known. Here we remove that assumption and show how the scheme is still vulnerable, even if the binary logo is not known but the attacker has access to multiple images that have been watermarked with the same secret key and contain the same (but unknown) logo. We present two attacks. The first attack infers the secret watermark insertion function and the binary logo, given multiple images authenticated with the same key and containing the same logo. We show that a very good approximation to the logo and watermark insertion function can be constructed using as few as two images. With color images, one needs many more images, nevertheless the attack is still feasible. The second attack we present, which we call the 'collage-attack' is a variation of the Holliman-Memon counterfeiting attack. The proposed variation does not require knowledge of the watermark logo and produces counterfeits of superior quality by means of a suitable dithering process that we develop.

  15. When measured spin polarization is not spin polarization

    International Nuclear Information System (INIS)

    Dowben, P A; Wu Ning; Binek, Christian

    2011-01-01

    Spin polarization is an unusually ambiguous scientific idiom and, as such, is rarely well defined. A given experimental methodology may allow one to quantify a spin polarization but only in its particular context. As one might expect, these ambiguities sometimes give rise to inappropriate interpretations when comparing the spin polarizations determined through different methods. The spin polarization of CrO 2 and Cr 2 O 3 illustrate some of the complications which hinders comparisons of spin polarization values. (viewpoint)

  16. Pareto Efficient Solution of Attack-Defence Trees

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as

  17. Magnetic Nanostructures Spin Dynamics and Spin Transport

    CERN Document Server

    Farle, Michael

    2013-01-01

    Nanomagnetism and spintronics is a rapidly expanding and increasingly important field of research with many applications already on the market and many more to be expected in the near future. This field started in the mid-1980s with the discovery of the GMR effect, recently awarded with the Nobel prize to Albert Fert and Peter Grünberg. The present volume covers the most important and most timely aspects of magnetic heterostructures, including spin torque effects, spin injection, spin transport, spin fluctuations, proximity effects, and electrical control of spin valves. The chapters are written by internationally recognized experts in their respective fields and provide an overview of the latest status.

  18. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  19. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-01-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  20. Genetic attack on neural cryptography

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  1. Attacks on the AJPS Mersenne-based cryptosystem

    NARCIS (Netherlands)

    K. de Boer (Koen); L. Ducas (Léo); S. Jeffery (Stacey); R. M. de Wolf (Ronald)

    2018-01-01

    textabstractAggarwal, Joux, Prakash and Santha recently introduced a new potentially quantum-safe public-key cryptosystem, and suggested that a brute-force attack is essentially optimal against it. They consider but then dismiss both Meet-in-the-Middle attacks and LLL-based attacks. Very soon after

  2. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  3. Robust Detection of Stepping-Stone Attacks

    National Research Council Canada - National Science Library

    He, Ting; Tong, Lang

    2006-01-01

    The detection of encrypted stepping-stone attack is considered. Besides encryption and padding, the attacker is capable of inserting chaff packets and perturbing packet timing and transmission order...

  4. Spin Relaxation and Manipulation in Spin-orbit Qubits

    Science.gov (United States)

    Borhani, Massoud; Hu, Xuedong

    2012-02-01

    We derive a generalized form of the Electric Dipole Spin Resonance (EDSR) Hamiltonian in the presence of the spin-orbit interaction for single spins in an elliptic quantum dot (QD) subject to an arbitrary (in both direction and magnitude) applied magnetic field. We predict a nonlinear behavior of the Rabi frequency as a function of the magnetic field for sufficiently large Zeeman energies, and present a microscopic expression for the anisotropic electron g-tensor. Similarly, an EDSR Hamiltonian is devised for two spins confined in a double quantum dot (DQD). Finally, we calculate two-electron-spin relaxation rates due to phonon emission, for both in-plane and perpendicular magnetic fields. Our results have immediate applications to current EDSR experiments on nanowire QDs, g-factor optimization of confined carriers, and spin decay measurements in DQD spin-orbit qubits.

  5. A Framework for Attack-Resilient Industrial Control Systems : Attack Detection and Controller Reconfiguration

    OpenAIRE

    Paridari, Kaveh; O'Mahony, Niamh; Mady, Alie El-Din; Chabukswar, Rohan; Boubekeur, Menouer; Sandberg, Henrik

    2017-01-01

    Most existing industrial control systems (ICSs), such as building energy management systems (EMSs), were installed when potential security threats were only physical. With advances in connectivity, ICSs are now, typically, connected to communications networks and, as a result, can be accessed remotely. This extends the attack surface to include the potential for sophisticated cyber attacks, which can adversely impact ICS operation, resulting in service interruption, equipment damage, safety c...

  6. Nonlinear spin current generation in noncentrosymmetric spin-orbit coupled systems

    Science.gov (United States)

    Hamamoto, Keita; Ezawa, Motohiko; Kim, Kun Woo; Morimoto, Takahiro; Nagaosa, Naoto

    2017-06-01

    Spin current plays a central role in spintronics. In particular, finding more efficient ways to generate spin current has been an important issue and has been studied actively. For example, representative methods of spin-current generation include spin-polarized current injections from ferromagnetic metals, the spin Hall effect, and the spin battery. Here, we theoretically propose a mechanism of spin-current generation based on nonlinear phenomena. By using Boltzmann transport theory, we show that a simple application of the electric field E induces spin current proportional to E2 in noncentrosymmetric spin-orbit coupled systems. We demonstrate that the nonlinear spin current of the proposed mechanism is supported in the surface state of three-dimensional topological insulators and two-dimensional semiconductors with the Rashba and/or Dresselhaus interaction. In the latter case, the angular dependence of the nonlinear spin current can be manipulated by the direction of the electric field and by the ratio of the Rashba and Dresselhaus interactions. We find that the magnitude of the spin current largely exceeds those in the previous methods for a reasonable magnitude of the electric field. Furthermore, we show that application of ac electric fields (e.g., terahertz light) leads to the rectifying effect of the spin current, where dc spin current is generated. These findings will pave a route to manipulate the spin current in noncentrosymmetric crystals.

  7. Spin temperature concept verified by optical magnetometry of nuclear spins

    Science.gov (United States)

    Vladimirova, M.; Cronenberger, S.; Scalbert, D.; Ryzhov, I. I.; Zapasskii, V. S.; Kozlov, G. G.; Lemaître, A.; Kavokin, K. V.

    2018-01-01

    We develop a method of nonperturbative optical control over adiabatic remagnetization of the nuclear spin system and apply it to verify the spin temperature concept in GaAs microcavities. The nuclear spin system is shown to exactly follow the predictions of the spin temperature theory, despite the quadrupole interaction that was earlier reported to disrupt nuclear spin thermalization. These findings open a way for the deep cooling of nuclear spins in semiconductor structures, with the prospect of realizing nuclear spin-ordered states for high-fidelity spin-photon interfaces.

  8. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  9. Spin-Mechatronics

    Science.gov (United States)

    Matsuo, Mamoru; Saitoh, Eiji; Maekawa, Sadamichi

    2017-01-01

    We investigate the interconversion phenomena between spin and mechanical angular momentum in moving objects. In particular, the recent results on spin manipulation and spin-current generation by mechanical motion are examined. In accelerating systems, spin-dependent gauge fields emerge, which enable the conversion from mechanical angular momentum into spins. Such a spin-mechanical effect is predicted by quantum theory in a non-inertial frame. Experiments which confirm the effect, i.e., the resonance frequency shift in nuclear magnetic resonance, the stray field measurement of rotating metals, and electric voltage generation in liquid metals, are discussed.

  10. Electron spin and nuclear spin manipulation in semiconductor nanosystems

    International Nuclear Information System (INIS)

    Hirayama, Yoshiro; Yusa, Go; Sasaki, Satoshi

    2006-01-01

    Manipulations of electron spin and nuclear spin have been studied in AlGaAs/GaAs semiconductor nanosystems. Non-local manipulation of electron spins has been realized by using the correlation effect between localized and mobile electron spins in a quantum dot- quantum wire coupled system. Interaction between electron and nuclear spins was exploited to achieve a coherent control of nuclear spins in a semiconductor point contact device. Using this device, we have demonstrated a fully coherent manipulation of any two states among the four spin levels of Ga and As nuclei. (copyright 2006 WILEY-VCH Verlag GmbH and Co. KGaA, Weinheim) (orig.)

  11. Bulk electron spin polarization generated by the spin Hall current

    OpenAIRE

    Korenev, V. L.

    2005-01-01

    It is shown that the spin Hall current generates a non-equilibrium spin polarization in the interior of crystals with reduced symmetry in a way that is drastically different from the previously well-known equilibrium polarization during the spin relaxation process. The steady state spin polarization value does not depend on the strength of spin-orbit interaction offering possibility to generate relatively high spin polarization even in the case of weak spin-orbit coupling.

  12. Bulk electron spin polarization generated by the spin Hall current

    Science.gov (United States)

    Korenev, V. L.

    2006-07-01

    It is shown that the spin Hall current generates a nonequilibrium spin polarization in the interior of crystals with reduced symmetry in a way that is drastically different from the previously well-known “equilibrium” polarization during the spin relaxation process. The steady state spin polarization value does not depend on the strength of spin-orbit interaction offering possibility to generate relatively high spin polarization even in the case of weak spin-orbit coupling.

  13. Countermeasures for unintentional and intentional video watermarking attacks

    Science.gov (United States)

    Deguillaume, Frederic; Csurka, Gabriela; Pun, Thierry

    2000-05-01

    These last years, the rapidly growing digital multimedia market has revealed an urgent need for effective copyright protection mechanisms. Therefore, digital audio, image and video watermarking has recently become a very active area of research, as a solution to this problem. Many important issues have been pointed out, one of them being the robustness to non-intentional and intentional attacks. This paper studies some attacks and proposes countermeasures applied to videos. General attacks are lossy copying/transcoding such as MPEG compression and digital/analog (D/A) conversion, changes of frame-rate, changes of display format, and geometrical distortions. More specific attacks are sequence edition, and statistical attacks such as averaging or collusion. Averaging attack consists of averaging locally consecutive frames to cancel the watermark. This attack works well for schemes which embed random independent marks into frames. In the collusion attack the watermark is estimated from single frames (based on image denoising), and averaged over different scenes for better accuracy. The estimated watermark is then subtracted from each frame. Collusion requires that the same mark is embedded into all frames. The proposed countermeasures first ensures robustness to general attacks by spread spectrum encoding in the frequency domain and by the use of an additional template. Secondly, a Bayesian criterion, evaluating the probability of a correctly decoded watermark, is used for rejection of outliers, and to implement an algorithm against statistical attacks. The idea is to embed randomly chosen marks among a finite set of marks, into subsequences of videos which are long enough to resist averaging attacks, but short enough to avoid collusion attacks. The Bayesian criterion is needed to select the correct mark at the decoding step. Finally, the paper presents experimental results showing the robustness of the proposed method.

  14. Link-layer Jamming Attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    2004-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  15. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  16. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example, after the launch of a DDOS (Distributed Denial of Service) attack, zombie computers may still connect to the target...-scrap- value-of-a-hacked-pc-revisited/ . Lancor, L., & Workman, R. (2007). Using Google Hacking to Enhance Defense Strategies. ACM SIGCSE Bulletin, 39 (1), 491-495. Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed Denial of Service...

  17. Determination of the Pt spin diffusion length by spin-pumping and spin Hall effect

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Wei; Pearson, John E.; Hoffmann, Axel [Materials Science Division, Argonne National Laboratory, Argonne, Illinois 60439 (United States); Vlaminck, Vincent [Materials Science Division, Argonne National Laboratory, Argonne, Illinois 60439 (United States); Colegio de Ciencias e Ingenería, Universidad San Fransciso de Quito, Quito (Ecuador); Divan, Ralu [Center for Nanoscale Materials, Argonne National Laboratory, Illinois 60439 (United States); Bader, Samuel D. [Materials Science Division, Argonne National Laboratory, Argonne, Illinois 60439 (United States); Center for Nanoscale Materials, Argonne National Laboratory, Illinois 60439 (United States)

    2013-12-09

    The spin diffusion length of Pt at room temperature and at 8 K is experimentally determined via spin pumping and spin Hall effect in permalloy/Pt bilayers. Voltages generated during excitation of ferromagnetic resonance from the inverse spin Hall effect and anisotropic magnetoresistance effect were investigated with a broadband approach. Varying the Pt layer thickness gives rise to an evolution of the voltage line shape due to the superposition of the above two effects. By studying the ratio of the two voltage components with the Pt layer thickness, the spin diffusion length of Pt can be directly extracted. We obtain a spin diffusion length of ∼1.2 nm at room temperature and ∼1.6 nm at 8 K.

  18. Unified communications forensics anatomy of common UC attacks

    CERN Document Server

    Grant, Nicholas Mr

    2013-01-01

    Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures

  19. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  20. Classifying network attack scenarios using an ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-03-01

    Full Text Available ) or to the target?s reputation. The Residue sub-phase refers to damage or artefacts of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example after the launch of a DDOS..., A. (1995). Hacking theft of $10 million from citibank revealed. Retrieved 10/10, 2011, from http://articles.latimes.com/1995-08-19/business/fi-36656_1_citibank-system Hurley, E. (2004). SCO site succumbs to DDoS attack. Retrieved 10/10, 2011, from...

  1. Modelling Social-Technical Attacks with Timed Automata

    DEFF Research Database (Denmark)

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof

    2015-01-01

    . In this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible attacks...... in our model and perform analysis and simulation of both model and attack, revealing details about the specific interaction between attacker and victim. Using timed automata also allows for intuitive modelling of systems, in which quantities like time and cost can be easily added and analysed....

  2. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack...... which guarantee or optimise some quantitative property, such as the probability of a successful attack, the expected cost incurred, or some multi-objective trade-off between the two. We implement our approach, building upon the PRISM-games model checker, and apply it to a case study of an RFID goods...

  3. Muon spin relaxation measurements of spin-correlation decay in spin-glass AgMn

    Energy Technology Data Exchange (ETDEWEB)

    Heffner, R.H.; Cooke, D.W.; Leon, M.; Schillaci, M.E. (Los Alamos National Lab., NM (USA)); MacLaughlin, D.E.; Gupta, L.C. (California Univ., Riverside (USA))

    1984-01-01

    The field (H) dependence of the muon longitudinal spin-lattice relaxation rate well below the spin glass temperature in AgMn is found to obey an algebraic form given by (H)sup(..gamma..-1), with ..gamma.. = 0.54 +- 0.05. This suggests that Mn spin correlations decay with time as tsup(-..gamma..), in agreement with mean field theories of spin-glass dynamics which yield ..gamma..

  4. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  5. Anti-discrimination Analysis Using Privacy Attack Strategies

    KAUST Repository

    Ruggieri, Salvatore

    2014-09-15

    Social discrimination discovery from data is an important task to identify illegal and unethical discriminatory patterns towards protected-by-law groups, e.g., ethnic minorities. We deploy privacy attack strategies as tools for discrimination discovery under hard assumptions which have rarely tackled in the literature: indirect discrimination discovery, privacy-aware discrimination discovery, and discrimination data recovery. The intuition comes from the intriguing parallel between the role of the anti-discrimination authority in the three scenarios above and the role of an attacker in private data publishing. We design strategies and algorithms inspired/based on Frèchet bounds attacks, attribute inference attacks, and minimality attacks to the purpose of unveiling hidden discriminatory practices. Experimental results show that they can be effective tools in the hands of anti-discrimination authorities.

  6. Spin manipulation and relaxation in spin-orbit qubits

    Science.gov (United States)

    Borhani, Massoud; Hu, Xuedong

    2012-03-01

    We derive a generalized form of the electric dipole spin resonance (EDSR) Hamiltonian in the presence of the spin-orbit interaction for single spins in an elliptic quantum dot (QD) subject to an arbitrary (in both direction and magnitude) applied magnetic field. We predict a nonlinear behavior of the Rabi frequency as a function of the magnetic field for sufficiently large Zeeman energies, and present a microscopic expression for the anisotropic electron g tensor. Similarly, an EDSR Hamiltonian is devised for two spins confined in a double quantum dot (DQD), where coherent Rabi oscillations between the singlet and triplet states are induced by jittering the inter-dot distance at the resonance frequency. Finally, we calculate two-electron-spin relaxation rates due to phonon emission, for both in-plane and perpendicular magnetic fields. Our results have immediate applications to current EDSR experiments on nanowire QDs, g-factor optimization of confined carriers, and spin decay measurements in DQD spin-orbit qubits.

  7. Spin transfer torque with spin diffusion in magnetic tunnel junctions

    KAUST Repository

    Manchon, Aurelien

    2012-08-09

    Spin transport in magnetic tunnel junctions in the presence of spin diffusion is considered theoretically. Combining ballistic tunneling across the barrier and diffusive transport in the electrodes, we solve the spin dynamics equation in the metallic layers. We show that spin diffusion mixes the transverse spin current components and dramatically modifies the bias dependence of the effective spin transfer torque. This leads to a significant linear bias dependence of the out-of-plane torque, as well as a nonconventional thickness dependence of both spin torque components.

  8. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  9. Simulation of Attacks for Security in Wireless Sensor Network.

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-11-18

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  10. Simulation of Attacks for Security in Wireless Sensor Network

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-01-01

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node’s software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work. PMID:27869710

  11. How do politicians use Facebook? An applied Social Observatory

    Directory of Open Access Journals (Sweden)

    Simon Caton

    2015-11-01

    Full Text Available In the age of the digital generation, written public data is ubiquitous and acts as an outlet for today's society. Platforms like Facebook, Twitter, Google+ and LinkedIn have profoundly changed how we communicate and interact. They have enabled the establishment of and participation in digital communities as well as the representation, documentation and exploration of social behaviours, and had a disruptive effect on how we use the Internet. Such digital communications present scholars with a novel way to detect, observe, analyse and understand online communities over time. This article presents the formalization of a Social Observatory: a low latency method for the observation and measurement of social indicators within an online community. Our framework facilitates interdisciplinary research methodologies via tools for data acquisition and analysis in inductive and deductive settings. By focusing our Social Observatory on the public Facebook profiles of 187 federal German politicians we illustrate how we can analyse and measure sentiment, public opinion, and information discourse in advance of the federal elections. To this extent, we analysed 54,665 posts and 231,147 comments, creating a composite index of overall public sentiment and the underlying conceptual discussion themes. Our case study demonstrates the observation of communities at various resolutions: “zooming” in on specific subsets or communities as a whole. The results of the case study illustrate the ability to observe published sentiment and public dialogue as well as the difficulties associated with established methods within the field of sentiment analysis within short informal text.

  12. Muon spin relaxation measurements of spin-correlation decay in spin-glass AgMn

    International Nuclear Information System (INIS)

    Heffner, R.H.; Cooke, D.W.; Leon, M.; Schillaci, M.E.; MacLaughlin, D.E.; Gupta, L.C.

    1984-01-01

    The field (H) dependence of the muon longitudinal spin-lattice relaxation rate well below the spin glass temperature in AgMn is found to obey an algebraic form given by (H)sup(γ-1), with γ = 0.54 +- 0.05. This suggests that Mn spin correlations decay with time as tsup(-γ), in agreement with mean field theories of spin-glass dynamics which yield γ < approx. 0.5. Near the glass temperature the agreement between the data and theory is not as good. (Auth.)

  13. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  14. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... of this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter ... most common heart attack symptom in men and women is chest pain or discomfort. However, women also ...

  15. Spin-orbit mediated control of spin qubits

    DEFF Research Database (Denmark)

    Flindt, Christian; Sørensen, A.S; Flensberg, Karsten

    2006-01-01

    We propose to use the spin-orbit interaction as a means to control electron spins in quantum dots, enabling both single-qubit and two-qubit operations. Very fast single-qubit operations may be achieved by temporarily displacing the electrons. For two-qubit operations the coupling mechanism is bas...... on a combination of the spin-orbit coupling and the mutual long-ranged Coulomb interaction. Compared to existing schemes using the exchange coupling, the spin-orbit induced coupling is less sensitive to random electrical fluctuations in the electrodes defining the quantum dots....

  16. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Ahmed, Z.; Nazir, B.; Zafar, M.F.; Anwar, M.M.; Azam, K.; Asar, A.U.

    2007-01-01

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  17. Spinning particle approach to higher spin field theory

    International Nuclear Information System (INIS)

    Corradini, Olindo

    2011-01-01

    We shortly review on the connection between higher-spin gauge field theories and supersymmetric spinning particle models. In such approach the higher spin equations of motion are linked to the first-class constraint algebra associated with the quantization of particle models. Here we consider a class of spinning particle models characterized by local O(N)-extended supersymmetry since these models are known to provide an alternative approach to the geometric formulation of higher spin field theory. We describe the canonical quantization of the models in curved target space and discuss the obstructions that appear in presence of an arbitrarily curved background. We then point out the special role that conformally flat spaces appear to have in such models and present a derivation of the higher-spin curvatures for maximally symmetric spaces.

  18. Shot noise of spin current and spin transfer torque

    Science.gov (United States)

    Yu, Yunjin; Zhan, Hongxin; Wan, Langhui; Wang, Bin; Wei, Yadong; Sun, Qingfeng; Wang, Jian

    2013-04-01

    We report the theoretical investigation of the shot noise of the spin current (Sσ) and the spin transfer torque (Sτ) for non-collinear spin polarized transport in a spin-valve device which consists of a normal scattering region connected by two ferromagnetic electrodes (MNM system). Our theory was developed using the non-equilibrium Green’s function method, and general nonlinear Sσ - V and Sτ - V relations were derived as a function of the angle θ between the magnetizations of two leads. We have applied our theory to a quantum dot system with a resonant level coupled with two ferromagnetic electrodes. It was found that, for the MNM system, the auto-correlation of the spin current is enough to characterize the fluctuation of the spin current. For a system with three ferromagnetic layers, however, both auto-correlation and cross-correlation of the spin current are needed to characterize the noise of the spin current. For a quantum dot with a resonant level, the derivative of spin torque with respect to bias voltage is proportional to sinθ when the system is far away from resonance. When the system is near resonance, the spin transfer torque becomes a non-sinusoidal function of θ. The derivative of the noise of the spin transfer torque with respect to the bias voltage Nτ behaves differently when the system is near or far away from resonance. Specifically, the differential shot noise of the spin transfer torque Nτ is a concave function of θ near resonance while it becomes a convex function of θ far away from resonance. For certain bias voltages, the period Nτ(θ) becomes π instead of 2π. For small θ, it was found that the differential shot noise of the spin transfer torque is very sensitive to the bias voltage and the other system parameters.

  19. Adaptive optimisation-offline cyber attack on remote state estimator

    Science.gov (United States)

    Huang, Xin; Dong, Jiuxiang

    2017-10-01

    Security issues of cyber-physical systems have received increasing attentions in recent years. In this paper, deception attacks on the remote state estimator equipped with the chi-squared failure detector are considered, and it is assumed that the attacker can monitor and modify all the sensor data. A novel adaptive optimisation-offline cyber attack strategy is proposed, where using the current and previous sensor data, the attack can yield the largest estimation error covariance while ensuring to be undetected by the chi-squared monitor. From the attacker's perspective, the attack is better than the existing linear deception attacks to degrade the system performance. Finally, some numerical examples are provided to demonstrate theoretical results.

  20. Cyber-physical attacks a growing invisible threat

    CERN Document Server

    Loukas, George

    2015-01-01

    Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road,  or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral

  1. Spin precession and spin Hall effect in monolayer graphene/Pt nanostructures

    Science.gov (United States)

    Savero Torres, W.; Sierra, J. F.; Benítez, L. A.; Bonell, F.; Costache, M. V.; Valenzuela, S. O.

    2017-12-01

    Spin Hall effects have surged as promising phenomena for spin logics operations without ferromagnets. However, the magnitude of the detected electric signals at room temperature in metallic systems has been so far underwhelming. Here, we demonstrate a two-order of magnitude enhancement of the signal in monolayer graphene/Pt devices when compared to their fully metallic counterparts. The enhancement stems in part from efficient spin injection and the large spin resistance of graphene but we also observe 100% spin absorption in Pt and find an unusually large effective spin Hall angle of up to 0.15. The large spin-to-charge conversion allows us to characterise spin precession in graphene under the presence of a magnetic field. Furthermore, by developing an analytical model based on the 1D diffusive spin-transport, we demonstrate that the effective spin-relaxation time in graphene can be accurately determined using the (inverse) spin Hall effect as a means of detection. This is a necessary step to gather full understanding of the consequences of spin absorption in spin Hall devices, which is known to suppress effective spin lifetimes in both metallic and graphene systems.

  2. Muon spin-relaxation measurements of spin-correlation decay in spin-glass AgMn

    International Nuclear Information System (INIS)

    Heffner, R.H.; Cooke, D.W.; Leon, M.; Schillaci, M.E.; MacLaughlin, D.E.; Gupta, L.C.

    1983-01-01

    The field (H) dependence of the muon longitudinal spin-lattice relaxation rate well below the spin-glass temperature in AgMn is found to obey an algebraic form given by (H)/sup nu-1/, with nu = 0.54 +- 0.05. This suggests that Mn spin correlations decay with time as t - /sup nu/, in agreement with mean field theories of spin-glass dynamics which yield nu less than or equal to 0.5. Near the glass temperature the agreement between the data and theory is not as good

  3. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  4. A fatal elephant attack.

    Science.gov (United States)

    Hejna, Petr; Zátopková, Lenka; Safr, Miroslav

    2012-01-01

    A rare case of an elephant attack is presented. A 44-year-old man working as an elephant keeper was attacked by a cow elephant when he tripped over a foot chain while the animal was being medically treated. The man fell down and was consequently repeatedly attacked with elephant tusks. The man sustained multiple stab injuries to both groin regions, a penetrating injury to the abdominal wall with traumatic prolapse of the loops of the small bowel, multiple defects of the mesentery, and incomplete laceration of the abdominal aorta with massive bleeding into the abdominal cavity. In addition to the penetrating injuries, the man sustained multiple rib fractures with contusion of both lungs and laceration of the right lobe of the liver, and comminuted fractures of the pelvic arch and left femoral body. The man died shortly after he had been received at the hospital. The cause of death was attributed to traumatic shock. © 2011 American Academy of Forensic Sciences.

  5. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  6. False Positive and False Negative Effects on Network Attacks

    Science.gov (United States)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  7. Spin-chirality decoupling in Heisenberg spin glasses and related systems

    OpenAIRE

    Kawamura, Hikaru

    2006-01-01

    Recent studies on the spin and the chirality orderings of the three-dimensional Heisenberg spin glass and related systems are reviewed with particular emphasis on the possible spin-chirality decoupling phenomena. Chirality scenario of real spin-glass transition and its experimental consequence on the ordering of Heisenberg-like spin glasses are discussed.

  8. Spin current

    CERN Document Server

    Valenzuela, Sergio O; Saitoh, Eiji; Kimura, Takashi

    2012-01-01

    In a new branch of physics and technology called spin-electronics or spintronics, the flow of electrical charge (usual current) as well as the flow of electron spin, the so-called 'spin current', are manipulated and controlled together. This book provides an introduction and guide to the new physics and application of spin current.

  9. Machine Learning Methods for Attack Detection in the Smart Grid.

    Science.gov (United States)

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  10. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  11. Application distribution model and related security attacks in VANET

    Science.gov (United States)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  12. Nonepileptic attack disorder among married women.

    Science.gov (United States)

    Dhanaraj, M; Rangaraj, R; Arulmozhi, T; Vengatesan, A

    2005-06-01

    To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD) among married women. Prospective cohort study with 1-year follow-up. A tertiary care teaching hospital. Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the generalized 'attack.' The data collected included clinical characteristics, semiology of the attacks, precipitating stressful events, and co-morbid psychiatric disorders. The control group included 30 age-matched married women with generalized tonic-clonic seizures. The long-term outcome and factors influencing the outcomes were analyzed. The mean duration of illness was 18 months, and the pattern of the attack was 'fall and lying still' in 53% and 'fall with generalized motor movements' in 47%. The frequency was one or more per week in 57% and occasionally in 43%. The important stressful events were matrimonial discord following illegal relationship of the husband with another woman (chi2 = 9.02, P = 0.003) and constant quarrel with other family members (chi2 = 5.19, P = 0.02). The prevalence of sexual abuse was low (7%). Co-morbid psychiatric disorder was observed in 70%. At the end of 1 year, 39% were free from the attack. Resolution of the stressful life events (chi2 = 4.52, P = 0.03) and lower frequency of attack at the time of reporting (chi2 = 3.88, P = 0.05) correlated with good outcomes. Among patients with NEAD in India, the major precipitating factors were matrimonial discord following illegal relationship of the husband with another woman and constant quarrel with other family members and not sexual abuse. Women with low frequency of attack at the time of reporting and the remission of the stressful events had better outcomes.

  13. Spin current

    CERN Document Server

    Valenzuela, Sergio O; Saitoh, Eiji; Kimura, Takashi

    2017-01-01

    Since the discovery of the giant magnetoresistance effect in magnetic multilayers in 1988, a new branch of physics and technology, called spin-electronics or spintronics, has emerged, where the flow of electrical charge as well as the flow of electron spin, the so-called “spin current,” are manipulated and controlled together. The physics of magnetism and the application of spin current have progressed in tandem with the nanofabrication technology of magnets and the engineering of interfaces and thin films. This book aims to provide an introduction and guide to the new physics and applications of spin current, with an emphasis on the interaction between spin and charge currents in magnetic nanostructures.

  14. Nuclear spin noise in the central spin model

    Science.gov (United States)

    Fröhling, Nina; Anders, Frithjof B.; Glazov, Mikhail

    2018-05-01

    We study theoretically the fluctuations of the nuclear spins in quantum dots employing the central spin model which accounts for the hyperfine interaction of the nuclei with the electron spin. These fluctuations are calculated both with an analytical approach using homogeneous hyperfine couplings (box model) and with a numerical simulation using a distribution of hyperfine coupling constants. The approaches are in good agreement. The box model serves as a benchmark with low computational cost that explains the basic features of the nuclear spin noise well. We also demonstrate that the nuclear spin noise spectra comprise a two-peak structure centered at the nuclear Zeeman frequency in high magnetic fields with the shape of the spectrum controlled by the distribution of the hyperfine constants. This allows for direct access to this distribution function through nuclear spin noise spectroscopy.

  15. Entanglement entropy in random quantum spin-S chains

    International Nuclear Information System (INIS)

    Saguia, A.; Boechat, B.; Continentino, M. A.; Sarandy, M. S.

    2007-01-01

    We discuss the scaling of entanglement entropy in the random singlet phase (RSP) of disordered quantum magnetic chains of general spin S. Through an analysis of the general structure of the RSP, we show that the entanglement entropy scales logarithmically with the size of a block, and we provide a closed expression for this scaling. This result is applicable for arbitrary quantum spin chains in the RSP, being dependent only on the magnitude S of the spin. Remarkably, the logarithmic scaling holds for the disordered chain even if the pure chain with no disorder does not exhibit conformal invariance, as is the case for Heisenberg integer-spin chains. Our conclusions are supported by explicit evaluations of the entanglement entropy for random spin-1 and spin-3/2 chains using an asymptotically exact real-space renormalization group approach

  16. Subclinical endophthalmitis following a rooster attack.

    Science.gov (United States)

    Lekse Kovach, Jaclyn; Maguluri, Srilakshmi; Recchia, Franco M

    2006-12-01

    Ocular injury resulting from rooster attacks is rarely reported in the literature. Sadly, the target of these attacks is most often children younger than 3 years old, whose naiveté of the aggressive, territorial behavior of birds can place them at risk. Acute sequelae of these attacks can result in a lifetime of visual impairment. The possibility of a subacute or occult infection is an unusual occurrence that must always be considered. In an effort to prevent future attacks and ocular casualties, we present a case of a 12-month-old boy who suffered an open globe following a rooster attack. The open globe was emergently repaired. One week later, a white cataract was noticed on examination in the absence of systemic or ocular signs of inflammation. Traumatic endophthalmitis and lenticular abscess were suspected during examination under anesthesia. Vitrectomy, lensectomy, and injection of intravitreal antibiotics were performed. Culture of lenticular and vitreous aspirates grew alpha-streptococcus. Alpha-streptococcal endophthalmitis can result from ocular injuries caused by rooster pecking. The infection may present insidiously and without typical ocular or systemic symptoms or signs. Management is challenging and may require surgery.

  17. Competing Spin Liquids and Hidden Spin-Nematic Order in Spin Ice with Frustrated Transverse Exchange

    Directory of Open Access Journals (Sweden)

    Mathieu Taillefumier

    2017-12-01

    Full Text Available Frustration in magnetic interactions can give rise to disordered ground states with subtle and beautiful properties. The spin ices Ho_{2}Ti_{2}O_{7} and Dy_{2}Ti_{2}O_{7} exemplify this phenomenon, displaying a classical spin-liquid state, with fractionalized magnetic-monopole excitations. Recently, there has been great interest in closely related “quantum spin-ice” materials, following the realization that anisotropic exchange interactions could convert spin ice into a massively entangled, quantum spin liquid, where magnetic monopoles become the charges of an emergent quantum electrodynamics. Here we show that even the simplest model of a quantum spin ice, the XXZ model on the pyrochlore lattice, can realize a still-richer scenario. Using a combination of classical Monte Carlo simulation, semiclassical molecular-dynamics simulation, and analytic field theory, we explore the properties of this model for frustrated transverse exchange. We find not one, but three competing forms of spin liquid, as well as a phase with hidden, spin-nematic order. We explore the experimental signatures of each of these different states, making explicit predictions for inelastic neutron scattering. These results show an intriguing similarity to experiments on a range of pyrochlore oxides.

  18. Robustness analysis of interdependent networks under multiple-attacking strategies

    Science.gov (United States)

    Gao, Yan-Li; Chen, Shi-Ming; Nie, Sen; Ma, Fei; Guan, Jun-Jie

    2018-04-01

    The robustness of complex networks under attacks largely depends on the structure of a network and the nature of the attacks. Previous research on interdependent networks has focused on two types of initial attack: random attack and degree-based targeted attack. In this paper, a deliberate attack function is proposed, where six kinds of deliberate attacking strategies can be derived by adjusting the tunable parameters. Moreover, the robustness of four types of interdependent networks (BA-BA, ER-ER, BA-ER and ER-BA) with different coupling modes (random, positive and negative correlation) is evaluated under different attacking strategies. Interesting conclusions could be obtained. It can be found that the positive coupling mode can make the vulnerability of the interdependent network to be absolutely dependent on the most vulnerable sub-network under deliberate attacks, whereas random and negative coupling modes make the vulnerability of interdependent network to be mainly dependent on the being attacked sub-network. The robustness of interdependent network will be enhanced with the degree-degree correlation coefficient varying from positive to negative. Therefore, The negative coupling mode is relatively more optimal than others, which can substantially improve the robustness of the ER-ER network and ER-BA network. In terms of the attacking strategies on interdependent networks, the degree information of node is more valuable than the betweenness. In addition, we found a more efficient attacking strategy for each coupled interdependent network and proposed the corresponding protection strategy for suppressing cascading failure. Our results can be very useful for safety design and protection of interdependent networks.

  19. Optimizing power system investments and resilience against attacks

    International Nuclear Information System (INIS)

    Fang, Yiping; Sansavini, Giovanni

    2017-01-01

    This paper studies the combination of capacity expansion and switch installation in electric systems that ensures optimum performance under nominal operations and attacks. The planner–attacker–defender model is adopted to develop decisions that minimize investment and operating costs, and functionality loss after attacks. The model bridges long-term system planning for transmission expansion and short-term switching operations in reaction to attacks. The mixed-integer optimization is solved by decomposition via two-layer cutting plane algorithm. Numerical results on an IEEE system shows that small investments in transmission line switching enhance resilience by responding to disruptions via system reconfiguration. Sensitivity analyses show that transmission planning under the assumption of small-scale attacks provides the most robust strategy, i.e. the minimum-regret planning, if many constraints and limited investment budget affect the planning. On the other hand, the assumption of large-scale attacks provides the most robust strategy if the planning process involves large flexibility and budget. - Highlights: • Investment optimization in power systems under attacks is presented. • Capacity expansion and switch installation for system reconfiguration are combined. • The problem is solved by decomposition via two-layer cutting plane algorithm. • Small investments in switch installation enhance resilience by response to attacks. • Sensitivity analyses identify robust planning against different attack scenarios.

  20. Separating inverse spin Hall voltage and spin rectification voltage by inverting spin injection direction

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Wenxu, E-mail: xwzhang@uestc.edu.cn; Peng, Bin; Han, Fangbin; Wang, Qiuru; Zhang, Wanli [State Key Laboratory of Electronic Thin Films and Integrated Devices, University of Electronic Science and Technology of China, Chengdu 610054 (China); Soh, Wee Tee; Ong, Chong Kim [Center for Superconducting and Magnetic Materials, Department of Physics, National University of Singapore, 2 Science Drive 3, Singapore 117551 (Singapore)

    2016-03-07

    We develop a method for universally resolving the important issue of separating the inverse spin Hall effect (ISHE) from the spin rectification effect (SRE) signal. This method is based on the consideration that the two effects depend on the spin injection direction: The ISHE is an odd function of the spin injection direction while the SRE is independent on it. Thus, the inversion of the spin injection direction changes the ISHE voltage signal, while the SRE voltage remains. It applies generally to analyzing the different voltage contributions without fitting them to special line shapes. This fast and simple method can be used in a wide frequency range and has the flexibility of sample preparation.

  1. Attacker Modelling in Ubiquitous Computing Systems

    DEFF Research Database (Denmark)

    Papini, Davide

    in with our everyday life. This future is visible to everyone nowadays: terms like smartphone, cloud, sensor, network etc. are widely known and used in our everyday life. But what about the security of such systems. Ubiquitous computing devices can be limited in terms of energy, computing power and memory...... attacker remain somehow undened and still under extensive investigation. This Thesis explores the nature of the ubiquitous attacker with a focus on how she interacts with the physical world and it denes a model that captures the abilities of the attacker. Furthermore a quantitative implementation...

  2. Peacetime Use of Computer Network Attack

    National Research Council Canada - National Science Library

    Busby, Daniel

    2000-01-01

    .... PDD-63 alerts the nation to prepare for impending cyber attacks. This paper examines the nature, scale, and likelihood of cyber attacks posited in PDD-63 and finds that the country does not face an imminent "electronic Pearl Harbor...

  3. Quantum dynamics of nuclear spins and spin relaxation in organic semiconductors

    Science.gov (United States)

    Mkhitaryan, V. V.; Dobrovitski, V. V.

    2017-06-01

    We investigate the role of the nuclear-spin quantum dynamics in hyperfine-induced spin relaxation of hopping carriers in organic semiconductors. The fast-hopping regime, when the carrier spin does not rotate much between subsequent hops, is typical for organic semiconductors possessing long spin coherence times. We consider this regime and focus on a carrier random-walk diffusion in one dimension, where the effect of the nuclear-spin dynamics is expected to be the strongest. Exact numerical simulations of spin systems with up to 25 nuclear spins are performed using the Suzuki-Trotter decomposition of the evolution operator. Larger nuclear-spin systems are modeled utilizing the spin-coherent state P -representation approach developed earlier. We find that the nuclear-spin dynamics strongly influences the carrier spin relaxation at long times. If the random walk is restricted to a small area, it leads to the quenching of carrier spin polarization at a nonzero value at long times. If the random walk is unrestricted, the carrier spin polarization acquires a long-time tail, decaying as 1 /√{t } . Based on the numerical results, we devise a simple formula describing the effect quantitatively.

  4. Chaotic spin exchange: is the spin non-flip rate observable?

    International Nuclear Information System (INIS)

    Senba, Masayoshi

    1994-01-01

    If spin exchange is of the Poisson nature, that is, if the time distribution of collisions obeys an exponential distribution function and the collision process is random, the muon spin depolarization is determined only by the spin flip rate regardless of the spin non-flip rate. In this work, spin exchange is discussed in the case of chaotic spin exchange, where the distribution of collision time sequences, generated by a deterministic equation, is exponential but not random (deterministic chaos). Even though this process has the same time distribution as a Poisson process, the muon polarization is affected by the spin non-flip rate. Having an exponential time distribution function is not a sufficient condition for the non-observation of the spin non-flip rate and it is essential that the process is also random. (orig.)

  5. Vibration dependence of the tensor spin-spin and scalar spin-spin hyperfine interactions by precision measurement of hyperfine structures of 127I2 near 532 nm

    International Nuclear Information System (INIS)

    Hong Fenglei; Zhang Yun; Ishikawa, Jun; Onae, Atsushi; Matsumoto, Hirokazu

    2002-01-01

    Hyperfine structures of the R(87)33-0, R(145)37-0, and P(132)36-0 transitions of molecular iodine near 532 nm are measured by observing the heterodyne beat-note signal of two I 2 -stabilized lasers, whose frequencies are bridged by an optical frequency comb generator. The measured hyperfine splittings are fit to a four-term Hamiltonian, which includes the electric quadrupole, spin-rotation, tensor spin-spin, and scalar spin-spin interactions, with an accuracy of ∼720 Hz. High-accurate hyperfine constants are obtained from this fit. Vibration dependences of the tensor spin-spin and scalar spin-spin hyperfine constants are determined for molecular iodine, for the first time to our knowledge. The observed hyperfine transitions are good optical frequency references in the 532-nm region

  6. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  7. Attacks on IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Dejan Milan Tepšić

    2013-06-01

    Full Text Available Security of wireless computer networks was initially secured with the WEP security protocol, which relies on the RC4 encryption algorithm and the CRC algorithm to check the integrity. The basic problems of the WEP are a short initialization vector, unsafe data integrity checking, using a common key, the lack of mechanisms for management and exchange of keys, the lack of protection from the endless insertion of the same package into the network, the lack of authentication of access points and the like. The consequences of these failures are easy attacks against the WEP network, namely their complete insecurity. Therefore, the work began on the IEEE 802.11i protocol, which should radically improve the security of wireless networks. Since the development of a protocol lasted, the WPA standard was released to offset the security gap caused by the WEP. The WPA also relies on RC4 and CRC algorithms, but brings temporary keys and the MIC algorithm for data integrity. The 802.1X authentication was introduced and common keys are no longer needed, since it is possible to use an authentication server. The length of the initialization vector was increased and the vector is obtained based on the packet serial number, in order to prevent the insertion of the same packet into the network. The weakness of the WPA security mechanism is the use of a common key. WPA2 (802.11i later appeared. Unlike the WPA mechanism that worked on old devices with the replacement of software, WPA2 requires new network devices that can perform AES encryption. AES replaces the RC4 algorithm and delivers much greater security. Data integrity is protected by encryption. Despite progress, there are still weaknesses in wireless networks. Attacks for denial of service are possible as well as spoofing package headers attacks. For now, it is not advisable to use wireless networks in environments where unreliability and unavailability are not tolerated. Introduction In the entire history of

  8. Shot noise of spin current and spin transfer torque

    International Nuclear Information System (INIS)

    Yu Yunjin; Zhan Hongxin; Wan Langhui; Wang Bin; Wei Yadong; Sun Qingfeng; Wang Jian

    2013-01-01

    We report the theoretical investigation of the shot noise of the spin current (S σ ) and the spin transfer torque (S τ ) for non-collinear spin polarized transport in a spin-valve device which consists of a normal scattering region connected by two ferromagnetic electrodes (MNM system). Our theory was developed using the non-equilibrium Green’s function method, and general nonlinear S σ − V and S τ − V relations were derived as a function of the angle θ between the magnetizations of two leads. We have applied our theory to a quantum dot system with a resonant level coupled with two ferromagnetic electrodes. It was found that, for the MNM system, the auto-correlation of the spin current is enough to characterize the fluctuation of the spin current. For a system with three ferromagnetic layers, however, both auto-correlation and cross-correlation of the spin current are needed to characterize the noise of the spin current. For a quantum dot with a resonant level, the derivative of spin torque with respect to bias voltage is proportional to sinθ when the system is far away from resonance. When the system is near resonance, the spin transfer torque becomes a non-sinusoidal function of θ. The derivative of the noise of the spin transfer torque with respect to the bias voltage N τ behaves differently when the system is near or far away from resonance. Specifically, the differential shot noise of the spin transfer torque N τ is a concave function of θ near resonance while it becomes a convex function of θ far away from resonance. For certain bias voltages, the period N τ (θ) becomes π instead of 2π. For small θ, it was found that the differential shot noise of the spin transfer torque is very sensitive to the bias voltage and the other system parameters. (paper)

  9. Temporal Cyber Attack Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  10. 12 CFR 263.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  11. 12 CFR 509.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding....17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  12. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  13. Vulnerability Assessment by Learning Attack Specifications in Graphs

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Lopes, Raul H.C.

    This paper presents an evolutionary approach for learning attack specifications that describe attack scenarios. The objective is to find vulnerabilities in computer networks which minimise the cost of an attack with maximum impact. Although we focus on Insider Threat, the proposed approach applies

  14. Attack Tree Generation by Policy Invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identi﬿cation. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identi﬿ed

  15. Roll Attitude Determination of Spin Projectile Based on GPS and Magnetoresistive Sensor

    Directory of Open Access Journals (Sweden)

    Dandan Yuan

    2017-01-01

    Full Text Available Improvement in attack accuracy of the spin projectiles is a very significant objective, which increases the overall combat efficiency of projectiles. The accurate determination of the projectile roll attitude is the recent objective of the efficient guidance and control. The roll measurement system for the spin projectile is commonly based on the magnetoresistive sensor. It is well known that the magnetoresistive sensor produces a sinusoidally oscillating signal whose frequency slowly decays with time, besides the possibility of blind spot. On the other hand, absolute sensors such as GPS have fixed errors even though the update rates are generally low. To earn the benefit while eliminating weaknesses from both types of sensors, a mathematical model using filtering technique can be designed to integrate the magnetoresistive sensor and GPS measurements. In this paper, a mathematical model is developed to integrate the magnetoresistive sensor and GPS measurements in order to get an accurate prediction of projectile roll attitude in a real flight time. The proposed model is verified using numerical simulations, which illustrated that the accuracy of the roll attitude measurement is improved.

  16. Neural network classifier of attacks in IP telephony

    Science.gov (United States)

    Safarik, Jakub; Voznak, Miroslav; Mehic, Miralem; Partila, Pavol; Mikulec, Martin

    2014-05-01

    Various types of monitoring mechanism allow us to detect and monitor behavior of attackers in VoIP networks. Analysis of detected malicious traffic is crucial for further investigation and hardening the network. This analysis is typically based on statistical methods and the article brings a solution based on neural network. The proposed algorithm is used as a classifier of attacks in a distributed monitoring network of independent honeypot probes. Information about attacks on these honeypots is collected on a centralized server and then classified. This classification is based on different mechanisms. One of them is based on the multilayer perceptron neural network. The article describes inner structure of used neural network and also information about implementation of this network. The learning set for this neural network is based on real attack data collected from IP telephony honeypot called Dionaea. We prepare the learning set from real attack data after collecting, cleaning and aggregation of this information. After proper learning is the neural network capable to classify 6 types of most commonly used VoIP attacks. Using neural network classifier brings more accurate attack classification in a distributed system of honeypots. With this approach is possible to detect malicious behavior in a different part of networks, which are logically or geographically divided and use the information from one network to harden security in other networks. Centralized server for distributed set of nodes serves not only as a collector and classifier of attack data, but also as a mechanism for generating a precaution steps against attacks.

  17. SU (N ) spin-wave theory: Application to spin-orbital Mott insulators

    Science.gov (United States)

    Dong, Zhao-Yang; Wang, Wei; Li, Jian-Xin

    2018-05-01

    We present the application of the SU (N ) spin-wave theory to spin-orbital Mott insulators whose ground states exhibit magnetic orders. When taking both spin and orbital degrees of freedom into account rather than projecting Hilbert space onto the Kramers doublet, which is the lowest spin-orbital locked energy levels, the SU (N ) spin-wave theory should take the place of the SU (2 ) one due to the inevitable spin-orbital multipole exchange interactions. To implement the application, we introduce an efficient general local mean-field method, which involves all local fluctuations, and develop the SU (N ) linear spin-wave theory. Our approach is tested firstly by calculating the multipolar spin-wave spectra of the SU (4 ) antiferromagnetic model. Then, we apply it to spin-orbital Mott insulators. It is revealed that the Hund's coupling would influence the effectiveness of the isospin-1 /2 picture when the spin-orbital coupling is not large enough. We further carry out the SU (N ) spin-wave calculations of two materials, α -RuCl3 and Sr2IrO4 , and find that the magnonic and spin-orbital excitations are consistent with experiments.

  18. SCADA system vulnerabilities to cyber attack

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, W. T. [Cyber Security Consulting (Canada)

    2004-10-01

    The susceptibility to terrorist attacks of computer-based supervisory control (SCADA) systems that are used to monitor and control water distribution systems, oil and gas pipelines and the electrical grid, is discussed. The discussion includes ways in which SCADA systems may be attacked and remedial actions that may be taken to reduce or eliminate the possibility of such attacks. Attacks may take the form of causing the system to generate false data to divert attention from impending system disasters, or commandeer the system to seriously disable it, or cause damage to the process or equipment being controlled by sending improper control commands. SCADA systems are also vulnerable to internal threats, either from an accidental action that results in damage, or an intentional action, as for example by a disgruntled employee, or ex-employee, usually by way of reprogramming an RTU or PLC by accessing the polling/communications circuit. Recent SCADA systems are much more susceptible to concerted cyber attacks because of the adoption of IT technologies and standards into the design of such systems. (Older systems are more likely to be unique designs, hence less susceptible to attack). As far as protection of SCADA systems is concerned, there are no technologies that would prevent a technologically sophisticated terrorist or disgruntled employee from doing major damage to the system, however, the IT world has developed a range of technologies for the protection of IT assets, and many of these same technologies can also be used to safeguard modern SCADA systems.

  19. Spin-inversion in nanoscale graphene sheets with a Rashba spin-orbit barrier

    Directory of Open Access Journals (Sweden)

    Somaieh Ahmadi

    2012-03-01

    Full Text Available Spin-inversion properties of an electron in nanoscale graphene sheets with a Rashba spin-orbit barrier is studied using transfer matrix method. It is found that for proper values of Rashba spin-orbit strength, perfect spin-inversion can occur in a wide range of electron incident angle near the normal incident. In this case, the graphene sheet with Rashba spin-orbit barrier can be considered as an electron spin-inverter. The efficiency of spin-inverter can increase up to a very high value by increasing the length of Rashba spin-orbit barrier. The effect of intrinsic spin-orbit interaction on electron spin inversion is then studied. It is shown that the efficiency of spin-inverter decreases slightly in the presence of intrinsic spin-orbit interaction. The present study can be used to design graphene-based spintronic devices.

  20. Spin-pump-induced spin transport in a thermally evaporated pentacene film

    Energy Technology Data Exchange (ETDEWEB)

    Tani, Yasuo; Shikoh, Eiji, E-mail: shikoh@elec.eng.osaka-cu.ac.jp [Graduate School of Engineering, Osaka City University, 3-3-138 Sugimoto, Sumiyoshi-ku, Osaka 558-8585 (Japan); Teki, Yoshio [Graduate School of Science, Osaka City University, 3-3-138 Sugimoto, Sumiyoshi-ku, Osaka 558-8585 (Japan)

    2015-12-14

    We report the spin-pump-induced spin transport properties of a pentacene film prepared by thermal evaporation. In a palladium(Pd)/pentacene/Ni{sub 80}Fe{sub 20} tri-layer sample, a pure spin-current is generated in the pentacene layer by the spin-pumping of Ni{sub 80}Fe{sub 20}, which is independent of the conductance mismatch problem in spin injection. The spin current is absorbed into the Pd layer, converted into a charge current with the inverse spin-Hall effect in Pd, and detected as an electromotive force. This is clear evidence for the pure spin current at room temperature in pentacene films prepared by thermal evaporation.

  1. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  2. Spin-Triplet Pairing Induced by Spin-Singlet Interactions in Noncentrosymmetric Superconductors

    Science.gov (United States)

    Matsuzaki, Tomoaki; Shimahara, Hiroshi

    2017-02-01

    In noncentrosymmetric superconductors, we examine the effect of the difference between the intraband and interband interactions, which becomes more important when the band splitting increases. We define the difference ΔVμ between their coupling constants, i.e., that between the intraband and interband hopping energies of intraband Cooper pairs. Here, the subscript μ of ΔVμ indicates that the interactions scatter the spin-singlet and spin-triplet pairs when μ = 0 and μ = 1,2,3, respectively. It is shown that the strong antisymmetric spin-orbit interaction reverses the target spin parity of the interaction: it converts the spin-singlet and spin-triplet interactions represented by ΔV0 and ΔVμ>0 into effective spin-triplet and spin-singlet pairing interactions, respectively. Hence, for example, triplet pairing can be induced solely by the singlet interaction ΔV0. We name the pairing symmetry of the system after that of the intraband Cooper pair wave function, but with an odd-parity phase factor excluded. The pairing symmetry must then be even, even for the triplet component, and the following results are obtained. When ΔVμ is small, the spin-triplet p-wave interactions induce spin-triplet s-wave and spin-triplet d-wave pairings in the regions where the repulsive singlet s-wave interaction is weak and strong, respectively. When ΔV0 is large, a repulsive interband spin-singlet interaction can stabilize spin-triplet pairing. When the Rashba interaction is adopted for the spin-orbit interaction, the spin-triplet pairing interactions mediated by transverse magnetic fluctuations do not contribute to triplet pairing.

  3. Dynamical spin accumulation in large-spin magnetic molecules

    Science.gov (United States)

    Płomińska, Anna; Weymann, Ireneusz; Misiorny, Maciej

    2018-01-01

    The frequency-dependent transport through a nanodevice containing a large-spin magnetic molecule is studied theoretically in the Kondo regime. Specifically, the effect of magnetic anisotropy on dynamical spin accumulation is of primary interest. Such accumulation arises due to finite components of frequency-dependent conductance that are off diagonal in spin. Here, employing the Kubo formalism and the numerical renormalization group method, we demonstrate that the dynamical transport properties strongly depend on the relative orientation of spin moments in electrodes of the device, as well as on intrinsic parameters of the molecule. In particular, the effect of dynamical spin accumulation is found to be greatly affected by the type of magnetic anisotropy exhibited by the molecule, and it develops for frequencies corresponding to the Kondo temperature. For the parallel magnetic configuration of the device, the presence of dynamical spin accumulation is conditioned by the interplay of ferromagnetic-lead-induced exchange field and the Kondo correlations.

  4. Hardy's argument and successive spin-s measurements

    International Nuclear Information System (INIS)

    Ahanj, Ali

    2010-01-01

    We consider a hidden-variable theoretic description of successive measurements of noncommuting spin observables on an input spin-s state. In this scenario, the hidden-variable theory leads to a Hardy-type argument that quantum predictions violate it. We show that the maximum probability of success of Hardy's argument in quantum theory is ((1/2)) 4s , which is more than in the spatial case.

  5. Large spin current injection in nano-pillar-based lateral spin valve

    Energy Technology Data Exchange (ETDEWEB)

    Nomura, Tatsuya [Department of Physics, Kyushu University, 744 Motooka, Fukuoka, 819-0395 (Japan); Ohnishi, Kohei; Kimura, Takashi, E-mail: t-kimu@phys.kyushu-u.ac.jp [Department of Physics, Kyushu University, 744 Motooka, Fukuoka, 819-0395 (Japan); Research Center for Quantum Nano-Spin Sciences, Kyushu University, 744 Motooka, Fukuoka, 819-0395 (Japan)

    2016-08-26

    We have investigated the influence of the injection of a large pure spin current on a magnetization process of a non-locally located ferromagnetic dot in nano-pillar-based lateral spin valves. Here, we prepared two kinds of the nano-pillar-type lateral spin valve based on Py nanodots and CoFeAl nanodots fabricated on a Cu film. In the Py/Cu lateral spin valve, although any significant change of the magnetization process of the Py nanodot has not been observed at room temperature. The magnetization reversal process is found to be modified by injecting a large pure spin current at 77 K. Switching the magnetization by the nonlocal spin injection has also been demonstrated at 77 K. In the CoFeAl/Cu lateral spin valve, a room temperature spin valve signal was strongly enhanced from the Py/Cu lateral spin valve because of the highly spin-polarized CoFeAl electrodes. The room temperature nonlocal switching has been demonstrated in the CoFeAl/Cu lateral spin valve.

  6. Spin Hall effects

    Science.gov (United States)

    Sinova, Jairo; Valenzuela, Sergio O.; Wunderlich, J.; Back, C. H.; Jungwirth, T.

    2015-10-01

    Spin Hall effects are a collection of relativistic spin-orbit coupling phenomena in which electrical currents can generate transverse spin currents and vice versa. Despite being observed only a decade ago, these effects are already ubiquitous within spintronics, as standard spin-current generators and detectors. Here the theoretical and experimental results that have established this subfield of spintronics are reviewed. The focus is on the results that have converged to give us the current understanding of the phenomena, which has evolved from a qualitative to a more quantitative measurement of spin currents and their associated spin accumulation. Within the experimental framework, optical-, transport-, and magnetization-dynamics-based measurements are reviewed and linked to both phenomenological and microscopic theories of the effect. Within the theoretical framework, the basic mechanisms in both the extrinsic and intrinsic regimes are reviewed, which are linked to the mechanisms present in their closely related phenomenon in ferromagnets, the anomalous Hall effect. Also reviewed is the connection to the phenomenological treatment based on spin-diffusion equations applicable to certain regimes, as well as the spin-pumping theory of spin generation used in many measurements of the spin Hall angle. A further connection to the spin-current-generating spin Hall effect to the inverse spin galvanic effect is given, in which an electrical current induces a nonequilibrium spin polarization. This effect often accompanies the spin Hall effect since they share common microscopic origins. Both can exhibit the same symmetries when present in structures comprising ferromagnetic and nonmagnetic layers through their induced current-driven spin torques or induced voltages. Although a short chronological overview of the evolution of the spin Hall effect field and the resolution of some early controversies is given, the main body of this review is structured from a pedagogical

  7. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    Energy Technology Data Exchange (ETDEWEB)

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills, and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between

  8. Reproductive rights in Poland: when politicians fear the wrath of the Church.

    Science.gov (United States)

    Heinen, Jacqueline; Portet, Stéphane

    2010-01-01

    The historical prestige of the Polish Catholic Church is the result of its presence as a national symbol of resistance, both under foreign occupation and during the communist regime. In the post-communist era the power of the Church within the political arena has significantly increased, through the Concordat that was signed with the state as well as through formal and informal ties with political parties. Catholicism is the de facto religion of the state, even if Poland remains a nominally secular country. This was illustrated by the adoption, in 1993, of a total abortion ban. Although the relation of Poles to the Catholic dogma on sexuality and reproductive rights tends to be weak, fearing criticism from Church authorities, most politicians avoid controversial topics and express their commitment to Catholic dogma. Thus women's groups have encountered serious difficulties in their efforts to defend women's rights to sexual and reproductive autonomy. Although accession to the European Union has put Poland in an awkward position with respect to equality of rights between women and men, it has not fundamentally altered the real situation with respect to the controversial topic of abortion.

  9. Spin-orbit induced electronic spin separation in semiconductor nanostructures.

    Science.gov (United States)

    Kohda, Makoto; Nakamura, Shuji; Nishihara, Yoshitaka; Kobayashi, Kensuke; Ono, Teruo; Ohe, Jun-ichiro; Tokura, Yasuhiro; Mineno, Taiki; Nitta, Junsaku

    2012-01-01

    The demonstration of quantized spin splitting by Stern and Gerlach is one of the most important experiments in modern physics. Their discovery was the precursor of recent developments in spin-based technologies. Although electrical spin separation of charged particles is fundamental in spintronics, in non-uniform magnetic fields it has been difficult to separate the spin states of charged particles due to the Lorentz force, as well as to the insufficient and uncontrollable field gradients. Here we demonstrate electronic spin separation in a semiconductor nanostructure. To avoid the Lorentz force, which is inevitably induced when an external magnetic field is applied, we utilized the effective non-uniform magnetic field which originates from the Rashba spin-orbit interaction in an InGaAs-based heterostructure. Using a Stern-Gerlach-inspired mechanism, together with a quantum point contact, we obtained field gradients of 10(8) T m(-1) resulting in a highly polarized spin current.

  10. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  11. Mean-Field Studies of a Mixed Spin-3/2 and Spin-2 and a Mixed Spin-3/2 and Spin-5/2 Ising System with Different Anisotropies

    International Nuclear Information System (INIS)

    Wei Guozhu; Miao Hailing

    2009-01-01

    The magnetic properties of a mixed spin-3/2 and spin-2 and a mixed spin-3/2 and spin-5/2 Ising ferromagnetic system with different anisotropies are studied by means of mean-field theory (MFT). The dependence of the phase diagram on single-ion anisotropy strengths is studied too. In the mixed spin-3/2 and spin-2 Ising model, besides the second-order phase transition, the first order-disorder phase transition and the tricritical line are found. In the mixed spin-3/2 and spin-5/2 Ising model, there is no first-order transition and tricritical line. (condensed matter: electronic structure, electrical, magnetic, and optical properties)

  12. Limit Asthma Attacks Caused by Colds or Flu

    Science.gov (United States)

    Asthma: Limit asthma attacks caused by colds or flu A cold or the flu can trigger an asthma attack. Here's why — and how to keep your sneeze ... plan. If you notice warning signs of an asthma attack — such as coughing, wheezing, chest tightness or shortness ...

  13. Quantitative Attack Tree Analysis via Priced Timed Automata

    NARCIS (Netherlands)

    Kumar, Rajesh; Ruijters, Enno Jozef Johannes; Stoelinga, Mariëlle Ida Antoinette; Sankaranarayanan, Sriram; Vicario, Enrico

    The success of a security attack crucially depends on the resources available to an attacker: time, budget, skill level, and risk appetite. Insight in these dependencies and the most vulnerable system parts is key to providing effective counter measures. This paper considers attack trees, one of the

  14. Finite Energy and Bounded Actuator Attacks on Cyber-Physical Systems

    Energy Technology Data Exchange (ETDEWEB)

    Djouadi, Seddik M [ORNL; Melin, Alexander M [ORNL; Ferragut, Erik M [ORNL; Laska, Jason A [ORNL; Dong, Jin [ORNL; Drira, Anis [ORNL

    2015-01-01

    As control system networks are being connected to enterprise level networks for remote monitoring, operation, and system-wide performance optimization, these same connections are providing vulnerabilities that can be exploited by malicious actors for attack, financial gain, and theft of intellectual property. Much effort in cyber-physical system (CPS) protection has focused on protecting the borders of the system through traditional information security techniques. Less effort has been applied to the protection of cyber-physical systems from intelligent attacks launched after an attacker has defeated the information security protections to gain access to the control system. In this paper, attacks on actuator signals are analyzed from a system theoretic context. The threat surface is classified into finite energy and bounded attacks. These two broad classes encompass a large range of potential attacks. The effect of theses attacks on a linear quadratic (LQ) control are analyzed, and the optimal actuator attacks for both finite and infinite horizon LQ control are derived, therefore the worst case attack signals are obtained. The closed-loop system under the optimal attack signals is given and a numerical example illustrating the effect of an optimal bounded attack is provided.

  15. Comparative Aspects of Spin-Dependent Interaction Potentials for Spin-1/2 and Spin-1 Matter Fields

    Directory of Open Access Journals (Sweden)

    P. C. Malta

    2016-01-01

    Full Text Available This paper sets out to establish a comparative study between classes of spin- and velocity-dependent potentials for spin-1/2 and spin-1 matter currents/sources in the nonrelativistic regime. Both (neutral massive scalar and vector particles are considered to mediate the interactions between (pseudo-scalar sources or (pseudo-vector currents. Though our discussion is more general, we contemplate specific cases in which our results may describe the electromagnetic interaction with a massive (Proca-type photon exchanged between two spin-1/2 or two spin-1 carriers. We highlight the similarities and peculiarities of the potentials for the two different types of charged matter and also focus our attention on the comparison between the particular aspects of two different field representations for spin-1 matter particles. We believe that our results may contribute to a further discussion of the relation between charge, spin, and extensibility of elementary particles.

  16. Modeling attacker-defender interactions in information networks.

    Energy Technology Data Exchange (ETDEWEB)

    Collins, Michael Joseph

    2010-09-01

    The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in isolation from one another: an attacker seeks to penetrate or disrupt a system that has been protected to a given level, while a defender attempts to thwart particular attacks. Such a model also views all non-malicious parties as having the same goal of preventing all attacks. But in fact, attackers and defenders are interacting parts of the same system, and different defenders have their own individual interests: defenders may be willing to accept some risk of successful attack if the cost of defense is too high. We have used game theory to develop models of how non-cooperative but non-malicious players in a network interact when there is a substantial cost associated with effective defensive measures. Although game theory has been applied in this area before, we have introduced some novel aspects of player behavior in our work, including: (1) A model of how players attempt to avoid the costs of defense and force others to assume these costs; (2) A model of how players interact when the cost of defending one node can be shared by other nodes; and (3) A model of the incentives for a defender to choose less expensive, but less effective, defensive actions.

  17. Heat and spin interconversion

    International Nuclear Information System (INIS)

    Ohnuma, Yuichi; Matsuo, Mamoru; Maekawa, Sadamichi; Saitoh, Eeiji

    2017-01-01

    Spin Seebeck and spin Peltier effects, which are mutual conversion phenomena of heat and spin, are discussed on the basis of the microscopic theory. First, the spin Seebeck effect, which is the spin-current generation due to heat current, is discussed. The recent progress in research on the spin Seebeck effect are introduced. We explain the origin of the observed sign changes of the spin Seebeck effect in compensated ferromagnets. Next, the spin Peltier effect, which is the heat-current generation due to spin current, is discussed. Finally, we show that the spin Seebeck and spin Peltier effects are summarized by Onsager's reciprocal relation and derive Kelvin's relation for the spin and heat transports. (author)

  18. Rotational Invariance of the 2d Spin - Spin Correlation Function

    Science.gov (United States)

    Pinson, Haru

    2012-09-01

    At the critical temperature in the 2d Ising model on the square lattice, we establish the rotational invariance of the spin-spin correlation function using the asymptotics of the spin-spin correlation function along special directions (McCoy and Wu in the two dimensional Ising model. Harvard University Press, Cambridge, 1973) and the finite difference Hirota equation for which the spin-spin correlation function is shown to satisfy (Perk in Phys Lett A 79:3-5, 1980; Perk in Proceedings of III international symposium on selected topics in statistical mechanics, Dubna, August 22-26, 1984, JINR, vol II, pp 138-151, 1985).

  19. Spin-independent transparency of pure spin current at normal/ferromagnetic metal interface

    Science.gov (United States)

    Hao, Runrun; Zhong, Hai; Kang, Yun; Tian, Yufei; Yan, Shishen; Liu, Guolei; Han, Guangbing; Yu, Shuyun; Mei, Liangmo; Kang, Shishou

    2018-03-01

    The spin transparency at the normal/ferromagnetic metal (NM/FM) interface was studied in Pt/YIG/Cu/FM multilayers. The spin current generated by the spin Hall effect (SHE) in Pt flows into Cu/FM due to magnetic insulator YIG blocking charge current and transmitting spin current via the magnon current. Therefore, the nonlocal voltage induced by an inverse spin Hall effect (ISHE) in FM can be detected. With the magnetization of FM parallel or antiparallel to the spin polarization of pure spin currents ({{\\boldsymbol{σ }}}sc}), the spin-independent nonlocal voltage is induced. This indicates that the spin transparency at the Cu/FM interface is spin-independent, which demonstrates that the influence of spin-dependent electrochemical potential due to spin accumulation on the interfacial spin transparency is negligible. Furthermore, a larger spin Hall angle of Fe20Ni80 (Py) than that of Ni is obtained from the nonlocal voltage measurements. Project supported by the National Basic Research Program of China (Grant No. 2015CB921502), the National Natural Science Foundation of China (Grant Nos. 11474184 and 11627805), the 111 Project, China (Grant No. B13029), and the Fundamental Research Funds of Shandong University, China.

  20. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered...... the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure...

  1. Algebraic Side-Channel Attack on Twofish

    Directory of Open Access Journals (Sweden)

    Chujiao Ma

    2017-05-01

    Full Text Available While algebraic side-channel attack (ASCA has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish. Compared to other algorithms that ASCA has been used on, Twofish is more difficult to attack due to the key-dependent S-boxes as well as the complex key scheduling. In this paper, we propose the first algebraic side-channel attack on Twofish, and examine the importance of side-channel information in getting past the key-dependent S-boxes and the complex key scheduling. The cryptographic algorithm and side-channel information are both expressed as boolean equations and a SAT solver is used to recover the key. While algebraic attack by itself is not sufficient to break the algorithm, with the help of side-channel information such as Hamming weights, we are able to correctly solve for 96 bits of the 128 bits key in under 2 hours with known plaintext/ciphertext.

  2. On localization attacks against cloud infrastructure

    Science.gov (United States)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  3. Network attacks and defenses a hands-on approach

    CERN Document Server

    Trabelsi, Zouheir; Al Braiki, Arwa; Mathew, Sujith Samuel

    2012-01-01

    The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both offensive and defensive techniques. Using step-by-step processes to build and generate attacks using offensive techniques, Network Attacks and Defenses: A Hands-on Approach enables students to implement appropriate network security solutions within a laborat

  4. SDN-Based Double Hopping Communication against Sniffer Attack

    Directory of Open Access Journals (Sweden)

    Zheng Zhao

    2016-01-01

    Full Text Available Sniffer attack has been a severe threat to network communication security. Traditional network usually uses static network configuration, which provides convenience to sniffer attack. In this paper, an SDN-based double hopping communication (DHC approach is proposed to solve this problem. In DHC, ends in communication packets as well as the routing paths are changed dynamically. Therefore, the traffic will be distributed to multiple flows and transmitted along different paths. Moreover, the data from multiple users will be mixed, bringing difficulty for attackers in obtaining and recovering the communication data, so that sniffer attack will be prevented effectively. It is concluded that DHC is able to increase the overhead of sniffer attack, as well as the difficulty of communication data recovery.

  5. Attacks on Bluetooth Security Architecture and Its Countermeasures

    Science.gov (United States)

    Iqbal, Mian Muhammad Waseem; Kausar, Firdous; Wahla, Muhammad Arif

    WPANs compliment the traditional IEEE 802.11 wireless networks by facilitating the clients with flexibility in network topologies, higher mobility and relaxed configuration/hardware requirements. Bluetooth, a WPAN technology, is an open standard for short-range radio frequency (RF) communication. However, it is also susceptible to typical security threats found in wireless LANs. This paper discuses some of the attack scenarios against the bluetooth network such as hostile intrusion, active Man-in-the-Middle (MITM) attack using unit key and various forms of denial of service (DoS) attacks. These threats and attacks compromise the confidentiality and availability of bluetooth data and services. This paper proposes an improved security architecture for bluetooth device which provides protection against the above mentioned attacks.

  6. Spin-lattice relaxation of individual solid-state spins

    Science.gov (United States)

    Norambuena, A.; Muñoz, E.; Dinani, H. T.; Jarmola, A.; Maletinsky, P.; Budker, D.; Maze, J. R.

    2018-03-01

    Understanding the effect of vibrations on the relaxation process of individual spins is crucial for implementing nanosystems for quantum information and quantum metrology applications. In this work, we present a theoretical microscopic model to describe the spin-lattice relaxation of individual electronic spins associated to negatively charged nitrogen-vacancy centers in diamond, although our results can be extended to other spin-boson systems. Starting from a general spin-lattice interaction Hamiltonian, we provide a detailed description and solution of the quantum master equation of an electronic spin-one system coupled to a phononic bath in thermal equilibrium. Special attention is given to the dynamics of one-phonon processes below 1 K where our results agree with recent experimental findings and analytically describe the temperature and magnetic-field scaling. At higher temperatures, linear and second-order terms in the interaction Hamiltonian are considered and the temperature scaling is discussed for acoustic and quasilocalized phonons when appropriate. Our results, in addition to confirming a T5 temperature dependence of the longitudinal relaxation rate at higher temperatures, in agreement with experimental observations, provide a theoretical background for modeling the spin-lattice relaxation at a wide range of temperatures where different temperature scalings might be expected.

  7. Muon spin rotation and other microscopic probes of spin-glass dynamics

    International Nuclear Information System (INIS)

    MacLaughlin, D.E.

    1980-01-01

    A number of different microscopic probe techniques have been employed to investigate the onset of the spin-glass state in dilute magnetic alloys. Among these are Moessbauer-effect spectroscopy, neutron scattering, ESR of the impurity spins, host NMR and, most recently, muon spin rotation and depolarization. Spin probes yield information on the microscopic static and dynamic behavior of the impurity spins, and give insight into both the spin freezing process and the nature of low-lying excitations in the ordered state. Microscopic probe experiments in spin glasses are surveyed, and the unique advantages of muon studies are emphasized

  8. Quantifying Spin Hall Angles from Spin Pumping : Experiments and Theory

    NARCIS (Netherlands)

    Mosendz, O.; Pearson, J.E.; Fradin, F.Y.; Bauer, G.E.W.; Bader, S.D.; Hoffmann, A.

    2010-01-01

    Spin Hall effects intermix spin and charge currents even in nonmagnetic materials and, therefore, ultimately may allow the use of spin transport without the need for ferromagnets. We show how spin Hall effects can be quantified by integrating Ni80Fe20|normal metal (N) bilayers into a coplanar

  9. An SDN-Based Fingerprint Hopping Method to Prevent Fingerprinting Attacks

    Directory of Open Access Journals (Sweden)

    Zheng Zhao

    2017-01-01

    Full Text Available Fingerprinting attacks are one of the most severe threats to the security of networks. Fingerprinting attack aims to obtain the operating system information of target hosts to make preparations for future attacks. In this paper, a fingerprint hopping method (FPH is proposed based on software-defined networks to defend against fingerprinting attacks. FPH introduces the idea of moving target defense to show a hopping fingerprint toward the fingerprinting attackers. The interaction of the fingerprinting attack and its defense is modeled as a signal game, and the equilibriums of the game are analyzed to develop an optimal defense strategy. Experiments show that FPH can resist fingerprinting attacks effectively.

  10. Spin-orbit-coupled transport and spin torque in a ferromagnetic heterostructure

    KAUST Repository

    Wang, Xuhui; Ortiz Pauyac, Christian; Manchon, Aurelien

    2014-01-01

    Ferromagnetic heterostructures provide an ideal platform to explore the nature of spin-orbit torques arising from the interplay mediated by itinerant electrons between a Rashba-type spin-orbit coupling and a ferromagnetic exchange interaction. For such a prototypic system, we develop a set of coupled diffusion equations to describe the diffusive spin dynamics and spin-orbit torques. We characterize the spin torque and its two prominent—out-of-plane and in-plane—components for a wide range of relative strength between the Rashba coupling and ferromagnetic exchange. The symmetry and angular dependence of the spin torque emerging from our simple Rashba model is in an agreement with experiments. The spin diffusion equation can be generalized to incorporate dynamic effects such as spin pumping and magnetic damping.

  11. Spin-orbit-coupled transport and spin torque in a ferromagnetic heterostructure

    KAUST Repository

    Wang, Xuhui

    2014-02-07

    Ferromagnetic heterostructures provide an ideal platform to explore the nature of spin-orbit torques arising from the interplay mediated by itinerant electrons between a Rashba-type spin-orbit coupling and a ferromagnetic exchange interaction. For such a prototypic system, we develop a set of coupled diffusion equations to describe the diffusive spin dynamics and spin-orbit torques. We characterize the spin torque and its two prominent—out-of-plane and in-plane—components for a wide range of relative strength between the Rashba coupling and ferromagnetic exchange. The symmetry and angular dependence of the spin torque emerging from our simple Rashba model is in an agreement with experiments. The spin diffusion equation can be generalized to incorporate dynamic effects such as spin pumping and magnetic damping.

  12. Electron-Spin Filters Would Offer Spin Polarization Greater than 1

    Science.gov (United States)

    Ting, David Z.

    2009-01-01

    A proposal has been made to develop devices that would generate spin-polarized electron currents characterized by polarization ratios having magnitudes in excess of 1. Heretofore, such devices (denoted, variously, as spin injectors, spin polarizers, and spin filters) have typically offered polarization ratios having magnitudes in the approximate range of 0.01 to 0.1. The proposed devices could be useful as efficient sources of spin-polarized electron currents for research on spintronics and development of practical spintronic devices.

  13. Efficient micromagnetic modelling of spin-transfer torque and spin-orbit torque

    Science.gov (United States)

    Abert, Claas; Bruckner, Florian; Vogler, Christoph; Suess, Dieter

    2018-05-01

    While the spin-diffusion model is considered one of the most complete and accurate tools for the description of spin transport and spin torque, its solution in the context of dynamical micromagnetic simulations is numerically expensive. We propose a procedure to retrieve the free parameters of a simple macro-spin like spin-torque model through the spin-diffusion model. In case of spin-transfer torque the simplified model complies with the model of Slonczewski. A similar model can be established for the description of spin-orbit torque. In both cases the spin-diffusion model enables the retrieval of free model parameters from the geometry and the material parameters of the system. Since these parameters usually have to be determined phenomenologically through experiments, the proposed method combines the strength of the diffusion model to resolve material parameters and geometry with the high performance of simple torque models.

  14. Spin Drag and Spin-Charge Separation in Cold Fermi Gases

    International Nuclear Information System (INIS)

    Polini, Marco; Vignale, Giovanni

    2007-01-01

    Low-energy spin and charge excitations of one-dimensional interacting fermions are completely decoupled and propagate with different velocities. These modes, however, can decay due to several possible mechanisms. In this Letter we expose a new facet of spin-charge separation: not only the speeds but also the damping rates of spin and charge excitations are different. While the propagation of long-wavelength charge excitations is essentially ballistic, spin propagation is intrinsically damped and diffusive. We suggest that cold Fermi gases trapped inside a tight atomic waveguide offer the opportunity to measure the spin-drag relaxation rate that controls the broadening of a spin packet

  15. Felicjan Sławoj-Składkowski (1885-1962): The only known doctor-soldier-politician with an outdoor-wooden-toilet named after him.

    Science.gov (United States)

    Ohry, Avi

    2017-05-01

    Felicjan Sławoj-Składkowski was a Polish physician, General and politician who served as Polish Minister of Internal Affairs and was the last Prime Minister of Poland before the Second World War. The lack of basic sanitation in many of Poland's villages caused him to issue a decree that every household in Poland must have a latrine in working order. Wooden sheds were built in the backyards, subsequently named 'sławojkis'.

  16. Data-plane Defenses against Routing Attacks on Tor

    Directory of Open Access Journals (Sweden)

    Tan Henry

    2016-10-01

    Full Text Available Tor is susceptible to traffic correlation attacks in which an adversary who observes flows entering and leaving the anonymity network can apply statistical techniques to correlate flows and de-anonymize their endpoints. While an adversary may not be naturally positioned to conduct such attacks, a recent study shows that the Internet’s control-plane can be manipulated to increase an adversary’s view of the network, and consequently, improve its ability to perform traffic correlation. This paper explores, in-depth, the effects of control-plane attacks on the security of the Tor network. Using accurate models of the live Tor network, we quantify Tor’s susceptibility to these attacks by measuring the fraction of the Tor network that is vulnerable and the advantage to the adversary of performing the attacks. We further propose defense mechanisms that protect Tor users from manipulations at the control-plane. Perhaps surprisingly, we show that by leveraging existing trust anchors in Tor, defenses deployed only in the data-plane are sufficient to detect most control-plane attacks. Our defenses do not assume the active participation of Internet Service Providers, and require only very small changes to Tor. We show that our defenses result in a more than tenfold decrease in the effectiveness of certain control-plane attacks.

  17. Spinning Them Off: Entrepreneuring Practices in Corporate Spin-Offs

    Directory of Open Access Journals (Sweden)

    Katja Maria Hydle

    2016-01-01

    Full Text Available This paper focuses on the practices between parent and child firms in corporate spinoffs. We uncover the enacted aspects of knowledge, called knowing, through theories from seven cases of incumbent-backed spin-offs and find that the management of the parent firms are highly involved in the spin-offs. The practices associated with spinning off are solving problems, involving multidisciplinary expertise and entrepreneuring management at the parent firm. We contribute to the spin-off literature by discussing the knowledge required for successfully spinning off child firms and to practice theory by empirically uncovering the practical understanding involved in the origin and perpetuation of an organization.

  18. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...

  19. Spin and tunneling dynamics in an asymmetrical double quantum dot with spin-orbit coupling: Selective spin transport device

    Science.gov (United States)

    Singh, Madhav K.; Jha, Pradeep K.; Bhattacherjee, Aranya B.

    2017-09-01

    In this article, we study the spin and tunneling dynamics as a function of magnetic field in a one-dimensional GaAs double quantum dot with both the Dresselhaus and Rashba spin-orbit coupling. In particular, we consider different spatial widths for the spin-up and spin-down electronic states. We find that the spin dynamics is a superposition of slow as well as fast Rabi oscillations. It is found that the Rashba interaction strength as well as the external magnetic field strongly modifies the slow Rabi oscillations which is particularly useful for implementing solid state selective spin transport device.

  20. Enhanced Spin-Orbit Torque via Modulation of Spin Current Absorption

    KAUST Repository

    Qiu, Xuepeng

    2016-11-18

    The magnitude of spin-orbit torque (SOT), exerted to a ferromagnet (FM) from an adjacent heavy metal (HM), strongly depends on the amount of spin current absorbed in the FM. We exploit the large spin absorption at the Ru interface to manipulate the SOTs in HM/FM/Ru multilayers. While the FM thickness is smaller than its spin dephasing length of 1.2 nm, the top Ru layer largely boosts the absorption of spin currents into the FM layer and substantially enhances the strength of SOT acting on the FM. Spin-pumping experiments induced by ferromagnetic resonance support our conclusions that the observed increase in the SOT efficiency can be attributed to an enhancement of the spin-current absorption. A theoretical model that considers both reflected and transmitted mixing conductances at the two interfaces of FM is developed to explain the results.

  1. Excitation of coherent propagating spin waves by pure spin currents.

    Science.gov (United States)

    Demidov, Vladislav E; Urazhdin, Sergei; Liu, Ronghua; Divinskiy, Boris; Telegin, Andrey; Demokritov, Sergej O

    2016-01-28

    Utilization of pure spin currents not accompanied by the flow of electrical charge provides unprecedented opportunities for the emerging technologies based on the electron's spin degree of freedom, such as spintronics and magnonics. It was recently shown that pure spin currents can be used to excite coherent magnetization dynamics in magnetic nanostructures. However, because of the intrinsic nonlinear self-localization effects, magnetic auto-oscillations in the demonstrated devices were spatially confined, preventing their applications as sources of propagating spin waves in magnonic circuits using these waves as signal carriers. Here, we experimentally demonstrate efficient excitation and directional propagation of coherent spin waves generated by pure spin current. We show that this can be achieved by using the nonlocal spin injection mechanism, which enables flexible design of magnetic nanosystems and allows one to efficiently control their dynamic characteristics.

  2. Step to improve neural cryptography against flipping attacks.

    Science.gov (United States)

    Zhou, Jiantao; Xu, Qinzhen; Pei, Wenjiang; He, Zhenya; Szu, Harold

    2004-12-01

    Synchronization of neural networks by mutual learning has been demonstrated to be possible for constructing key exchange protocol over public channel. However, the neural cryptography schemes presented so far are not the securest under regular flipping attack (RFA) and are completely insecure under majority flipping attack (MFA). We propose a scheme by splitting the mutual information and the training process to improve the security of neural cryptosystem against flipping attacks. Both analytical and simulation results show that the success probability of RFA on the proposed scheme can be decreased to the level of brute force attack (BFA) and the success probability of MFA still decays exponentially with the weights' level L. The synchronization time of the parties also remains polynomial with L. Moreover, we analyze the security under an advanced flipping attack.

  3. Improved Impossible Differential Attacks on Large-Block Rijndael

    DEFF Research Database (Denmark)

    Wang, Qingju; Gu, Dawu; Rijmen, Vincent

    2012-01-01

    . The improvement can lead to 10-round attack on Rijndael-256 as well. With 2198.1 chosen plaintexts, an attack is demonstrated on 9-round Rijndael-224 with 2 195.2 encryptions and 2140.4 bytes memory. Increasing the data complexity to 2216 plaintexts, the time complexity can be reduced to 2130 encryptions...... and the memory requirements to 2 93.6 bytes. For 9-round Rijndael-256, we provide an attack requiring 2229.3 chosen plaintexts, 2194 encryptions, and 2 139.6 bytes memory. Alternatively, with 2245.3 plaintexts, an attack with a reduced time of 2127.1 encryptions and a memory complexity of 290.9 bytes can...... be mounted. With 2244.2 chosen plaintexts, we can attack 10-round Rijndael-256 with 2253.9 encryptions and 2186.8 bytes of memory....

  4. Electrical detection of spin current and spin relaxation in nonmagnetic semiconductors

    International Nuclear Information System (INIS)

    Miah, M Idrish

    2008-01-01

    We report an electrical method for the detection of spin current and spin relaxation in nonmagnetic semiconductors. Optically polarized spins are dragged by an electric field in GaAs. We use the anomalous Hall effect for the detection of spin current and spin relaxation. It is found that the effect depends on the electric field and doping density as well as on temperature, but not on the excitation power. A calculation for the effect is performed using the measured spin polarization by a pump-probe experiment. The results are also discussed in comparison with a quantitative evaluation of the spin lifetimes of the photogenerated electrons under drift in GaAs

  5. Electrical detection of spin current and spin relaxation in nonmagnetic semiconductors

    Energy Technology Data Exchange (ETDEWEB)

    Miah, M Idrish [Nanoscale Science and Technology Centre and School of Biomolecular and Physical Sciences, Griffith University, Nathan, Brisbane, QLD 4111 (Australia); Department of Physics, University of Chittagong, Chittagong 4331 (Bangladesh)], E-mail: m.miah@griffith.edu.au

    2008-09-21

    We report an electrical method for the detection of spin current and spin relaxation in nonmagnetic semiconductors. Optically polarized spins are dragged by an electric field in GaAs. We use the anomalous Hall effect for the detection of spin current and spin relaxation. It is found that the effect depends on the electric field and doping density as well as on temperature, but not on the excitation power. A calculation for the effect is performed using the measured spin polarization by a pump-probe experiment. The results are also discussed in comparison with a quantitative evaluation of the spin lifetimes of the photogenerated electrons under drift in GaAs.

  6. RAPTOR: Ransomware Attack PredicTOR

    OpenAIRE

    Quinkert, Florian; Holz, Thorsten; Hossain, KSM Tozammel; Ferrara, Emilio; Lerman, Kristina

    2018-01-01

    Ransomware, a type of malicious software that encrypts a victim's files and only releases the cryptographic key once a ransom is paid, has emerged as a potentially devastating class of cybercrimes in the past few years. In this paper, we present RAPTOR, a promising line of defense against ransomware attacks. RAPTOR fingerprints attackers' operations to forecast ransomware activity. More specifically, our method learns features of malicious domains by looking at examples of domains involved in...

  7. Shark attack-related injuries: Epidemiology and implications for plastic surgeons.

    Science.gov (United States)

    Ricci, Joseph A; Vargas, Christina R; Singhal, Dhruv; Lee, Bernard T

    2016-01-01

    The increased media attention to shark attacks has led to a heightened fear and public awareness. Although few sharks are considered dangerous, attacks on humans can result in large soft tissue defects necessitating the intervention of reconstructive surgeons. This study aims to evaluate and describe the characteristics of shark-related injuries in order to improve treatment. The Global Shark Accident File, maintained by the Shark Research Institute (Princeton, NJ, USA), is a compilation of all known worldwide shark attacks. Database records since the 1900s were reviewed to identify differences between fatal and nonfatal attacks, including: geography, injury pattern, shark species, and victim activity. Since the 1900s, there have been 5034 reported shark attacks, of which 1205 (22.7%) were fatal. Although the incidence of attacks per decade has increased, the percentage of fatalities has decreased. Characteristics of fatal attacks included swimming (p = 0.001), boating (p = 0.001), three or more bite sites (p = 0.03), limb loss (p = 0.001), or tiger shark attack (p = 0.002). The most common attacks were bites to the legs (41.8%) or arms (18.4%), with limb loss occurring in 7% of attacks. Geographically, the majority of attacks occurred in North America (36.7%) and Australia (26.5%). Most attacks in the USA occurred in Florida (49.1%) and California (13.6%). Although rare, shark attacks result in devastating injuries to patients. As these injuries often involve multiple sites and limb loss, this creates a significant challenge for reconstructive surgeons. Proper identification of the characteristics of the attack can aid in providing optimal care for those affected. Copyright © 2015 British Association of Plastic, Reconstructive and Aesthetic Surgeons. Published by Elsevier Ltd. All rights reserved.

  8. Spin Transport in Nondegenerate Si with a Spin MOSFET Structure at Room Temperature

    Science.gov (United States)

    Sasaki, Tomoyuki; Ando, Yuichiro; Kameno, Makoto; Tahara, Takayuki; Koike, Hayato; Oikawa, Tohru; Suzuki, Toshio; Shiraishi, Masashi

    2014-09-01

    Spin transport in nondegenerate semiconductors is expected to pave the way to the creation of spin transistors, spin logic devices, and reconfigurable logic circuits, because room-temperature (RT) spin transport in Si has already been achieved. However, RT spin transport has been limited to degenerate Si, which makes it difficult to produce spin-based signals because a gate electric field cannot be used to manipulate such signals. Here, we report the experimental demonstration of spin transport in nondegenerate Si with a spin metal-oxide-semiconductor field-effect transistor (MOSFET) structure. We successfully observe the modulation of the Hanle-type spin-precession signals, which is a characteristic spin dynamics in nondegenerate semiconductors. We obtain long spin transport of more than 20 μm and spin rotation greater than 4π at RT. We also observe gate-induced modulation of spin-transport signals at RT. The modulation of the spin diffusion length as a function of a gate voltage is successfully observed, which we attribute to the Elliott-Yafet spin relaxation mechanism. These achievements are expected to lead to the creation of practical Si-based spin MOSFETs.

  9. Current-induced spin polarization in a spin-polarized two-dimensional electron gas with spin-orbit coupling

    International Nuclear Information System (INIS)

    Wang, C.M.; Pang, M.Q.; Liu, S.Y.; Lei, X.L.

    2010-01-01

    The current-induced spin polarization (CISP) is investigated in a combined Rashba-Dresselhaus spin-orbit-coupled two-dimensional electron gas, subjected to a homogeneous out-of-plane magnetization. It is found that, in addition to the usual collision-related in-plane parts of CISP, there are two impurity-density-free contributions, arising from intrinsic and disorder-mediated mechanisms. The intrinsic parts of spin polarization are related to the Berry curvature, analogous with the anomalous and spin Hall effects. For short-range collision, the disorder-mediated spin polarizations completely cancel the intrinsic ones and the total in-plane components of CISP equal those for systems without magnetization. However, for remote disorders, this cancellation does not occur and the total in-plane components of CISP strongly depend on the spin-orbit interaction coefficients and magnetization for both pure Rashba and combined Rashba-Dresselhaus models.

  10. Anisotropic interactions of a single spin and dark-spin spectroscopy in diamond

    Science.gov (United States)

    Epstein, R. J.; Mendoza, F. M.; Kato, Y. K.; Awschalom, D. D.

    2005-11-01

    Experiments on single nitrogen-vacancy (N-V) centres in diamond, which include electron spin resonance, Rabi oscillations, single-shot spin readout and two-qubit operations with a nearby13C nuclear spin, show the potential of this spin system for solid-state quantum information processing. Moreover, N-V centre ensembles can have spin-coherence times exceeding 50 μs at room temperature. We have developed an angle-resolved magneto-photoluminescence microscope apparatus to investigate the anisotropic electron-spin interactions of single N-V centres at room temperature. We observe negative peaks in the photoluminescence as a function of both magnetic-field magnitude and angle that are explained by coherent spin precession and anisotropic relaxation at spin-level anti-crossings. In addition, precise field alignment unmasks the resonant coupling to neighbouring `dark' nitrogen spins, otherwise undetected by photoluminescence. These results demonstrate the capability of our spectroscopic technique for measuring small numbers of dark spins by means of a single bright spin under ambient conditions.

  11. Privacy Leaks through Data Hijacking Attack on Mobile Systems

    Directory of Open Access Journals (Sweden)

    Zhang Daojuan

    2017-01-01

    Full Text Available To persistently eavesdrop on the mobile devices, attackers may obtain the elevated privilege and inject malicious modules into the user devices. Unfortunately, the attackers may not be able to obtain the privilege for a long period of time since the exploitable vulnerabilities may be fixed or the malware may be removed. In this paper, we propose a new data hijacking attack for the mobile apps. By employing the proposed method, the attackers are only required to obtain the root privilege of the user devices once, and they can persistently eavesdrop without any change to the original device. Specifically, we design a new approach to construct a shadow system by hijacking user data files. In the shadow system, attackers possess the identical abilities to the victims. For instance, if a victim has logged into the email app, the attacker can also access the email server in the shadow system without authentication in a long period of time. Without reauthentication of the app, it is difficult for victims to notice the intrusion since the whole eavesdropping is performed on other devices (rather than the user devices. In our experiments, we evaluate the effectiveness of the proposed attack and the result demonstrates that even the Android apps released by the top developers cannot resist this attack. Finally, we discuss some approaches to defend the proposed attack.

  12. Spin-resolved electron waiting times in a quantum-dot spin valve

    Science.gov (United States)

    Tang, Gaomin; Xu, Fuming; Mi, Shuo; Wang, Jian

    2018-04-01

    We study the electronic waiting-time distributions (WTDs) in a noninteracting quantum-dot spin valve by varying spin polarization and the noncollinear angle between the magnetizations of the leads using the scattering matrix approach. Since the quantum-dot spin valve involves two channels (spin up and down) in both the incoming and outgoing channels, we study three different kinds of WTDs, which are two-channel WTD, spin-resolved single-channel WTD, and cross-channel WTD. We analyze the behaviors of WTDs in short times, correlated with the current behaviors for different spin polarizations and noncollinear angles. Cross-channel WTD reflects the correlation between two spin channels and can be used to characterize the spin-transfer torque process. We study the influence of the earlier detection on the subsequent detection from the perspective of cross-channel WTD, and define the influence degree quantity as the cumulative absolute difference between cross-channel WTDs and first-passage time distributions to quantitatively characterize the spin-flip process. We observe that influence degree versus spin-transfer torque for different noncollinear angles as well as different polarizations collapse into a single curve showing universal behaviors. This demonstrates that cross-channel WTDs can be a pathway to characterize spin correlation in spintronics system.

  13. What Can We Learn?--The Algonquin Bear Attack.

    Science.gov (United States)

    Strickland, Dan

    1992-01-01

    Describes a bear attack in Algonquin Park in Lake Opeongo (Canada) in which a man and woman were killed. Hypothesizes that the bear deliberately preyed on its victims and concludes that the bear was physically normal. Despite this isolated attack, the chance of being attacked by a black bear when camping is virtually nonexistent. (KS)

  14. Combined Heuristic Attack Strategy on Complex Networks

    Directory of Open Access Journals (Sweden)

    Marek Šimon

    2017-01-01

    Full Text Available Usually, the existence of a complex network is considered an advantage feature and efforts are made to increase its robustness against an attack. However, there exist also harmful and/or malicious networks, from social ones like spreading hoax, corruption, phishing, extremist ideology, and terrorist support up to computer networks spreading computer viruses or DDoS attack software or even biological networks of carriers or transport centers spreading disease among the population. New attack strategy can be therefore used against malicious networks, as well as in a worst-case scenario test for robustness of a useful network. A common measure of robustness of networks is their disintegration level after removal of a fraction of nodes. This robustness can be calculated as a ratio of the number of nodes of the greatest remaining network component against the number of nodes in the original network. Our paper presents a combination of heuristics optimized for an attack on a complex network to achieve its greatest disintegration. Nodes are deleted sequentially based on a heuristic criterion. Efficiency of classical attack approaches is compared to the proposed approach on Barabási-Albert, scale-free with tunable power-law exponent, and Erdős-Rényi models of complex networks and on real-world networks. Our attack strategy results in a faster disintegration, which is counterbalanced by its slightly increased computational demands.

  15. Spin Filters as High-Performance Spin Polarimeters

    International Nuclear Information System (INIS)

    Rougemaille, N.; Lampel, G.; Peretti, J.; Drouhin, H.-J.; Lassailly, Y.; Filipe, A.; Wirth, T.; Schuhl, A.

    2003-01-01

    A spin-dependent transport experiment in which hot electrons pass through a ferromagnetic metal / semiconductor Schottky diode has been performed. A spin-polarized free-electron beam, emitted in vacuum from a GaAs photocathode, is injected into the thin metal layer with an energy between 5 and 1000 eV above to the Fermi level. The transmitted current collected in the semiconductor substrate increases with injection energy because of secondary - electron multiplication. The spin-dependent part of the transmitted current is first constant up to about 100 eV and then increases by 4 orders of magnitude. As an immediate application, the solid-state hybrid structure studied here leads to a very efficient and compact device for spin polarization detection

  16. Spin transport in spin filtering magnetic tunneling junctions.

    Science.gov (United States)

    Li, Yun; Lee, Eok Kyun

    2007-11-01

    Taking into account spin-orbit coupling and s-d interaction, we investigate spin transport properties of the magnetic tunneling junctions with spin filtering barrier using Landauer-Büttiker formalism implemented with the recursive algorithm to calculate the real-space Green function. We predict completely different bias dependence of negative tunnel magnetoresistance (TMR) between the systems composed of nonmagnetic electrode (NM)/ferromagnetic barrier (FB)/ferromagnet (FM) and NM/FB/FM/NM spin filtering tunnel junctions (SFTJs). Analyses of the results provide us possible ways of designing the systems which modulate the TMR in the negative magnetoresistance regime.

  17. Studies on sulfate attack: Mechanisms, test methods, and modeling

    Science.gov (United States)

    Santhanam, Manu

    The objective of this research study was to investigate various issues pertaining to the mechanism, testing methods, and modeling of sulfate attack in concrete. The study was divided into the following segments: (1) effect of gypsum formation on the expansion of mortars, (2) attack by the magnesium ion, (3) sulfate attack in the presence of chloride ions---differentiating seawater and groundwater attack, (4) use of admixtures to mitigate sulfate attack---entrained air, sodium citrate, silica fume, and metakaolin, (5) effects of temperature and concentration of the attack solution, (6) development of new test methods using concrete specimens, and (7) modeling of the sulfate attack phenomenon. Mortar specimens using portland cement (PC) and tricalcium silicate (C 3S), with or without mineral admixtures, were prepared and immersed in different sulfate solutions. In addition to this, portland cement concrete specimens were also prepared and subjected to complete and partial immersion in sulfate solutions. Physical measurements, chemical analyses and microstructural studies were performed periodically on the specimens. Gypsum formation was seen to cause expansion of the C3S mortar specimens. Statistical analyses of the data also indicated that the quantity of gypsum was the most significant factor controlling the expansion of mortar bars. The attack by magnesium ion was found to drive the reaction towards the formation of brucite. Decalcification of the C-S-H and its subsequent conversion to the non-cementitious M-S-H was identified as the mechanism of destruction in magnesium sulfate attack. Mineral admixtures were beneficial in combating sodium sulfate attack, while reducing the resistance to magnesium sulfate attack. Air entrainment did not change the measured physical properties, but reduced the visible distress of the mortars. Sodium citrate caused a substantial reduction in the rate of damage of the mortars due to its retarding effect. Temperature and

  18. Impact of Cyber Attacks on High Voltage DC Transmission Damping Control

    Directory of Open Access Journals (Sweden)

    Rui Fan

    2018-04-01

    Full Text Available Hybrid AC/HVDC (AC-HVDC grids have evolved to become huge cyber-physical systems that are vulnerable to cyber attacks because of the wide attack surface and increasing dependence on intelligent electronic devices, computing resources and communication networks. This paper, for the first time, studies the impact of cyber attacks on HVDC transmission oscillation damping control.Three kinds of cyber attack models are considered: timing attack, replay attack and false data injection attack. Followed by a brief introduction of the HVDC model and conventional oscillation damping control method, the design of three attack models is described in the paper. These attacks are tested on a modified IEEE New England 39-Bus AC-HVDC system. Simulation results have shown that all three kinds of attacks are capable of driving the AC-HVDC system into large oscillations or even unstable conditions.

  19. Spin relaxation through Kondo scattering in Cu/Py lateral spin valves

    Science.gov (United States)

    Batley, J. T.; Rosaond, M. C.; Ali, M.; Linfield, E. H.; Burnell, G.; Hickey, B. J.

    Within non-magnetic metals it is reasonable to expect the Elliot-Yafet mechanism to govern spin-relaxation and thus the temperature dependence of the spin diffusion length might be inversely proportional to resistivity. However, in lateral spin valves, measurements have found that at low temperatures the spin diffusion length unexpectedly decreases. We have fabricated lateral spin valves from Cu with different concentrations of magnetic impurities. Through temperature dependent charge and spin transport measurements we present clear evidence linking the presence of the Kondo effect within Cu to the suppression of the spin diffusion length below 30 K. We have calculated the spin-relaxation rate and isolated the contribution from magnetic impurities. At very low temperatures electron-electron interactions play a more prominent role in the Kondo effect. Well below the Kondo temperature a strong-coupling regime exists, where the moments become screened and the magnetic dephasing rate is reduced. We also investigate the effect of this low temperature regime (>1 K) on a pure spin current. This work shows the dominant role of Kondo scattering, even in low concentrations of order 1 ppm, within pure spin transport.

  20. Spin polarization of tunneling current in barriers with spin-orbit coupling

    International Nuclear Information System (INIS)

    Fujita, T; Jalil, M B A; Tan, S G

    2008-01-01

    We present a general method for evaluating the maximum transmitted spin polarization and optimal spin axis for an arbitrary spin-orbit coupling (SOC) barrier system, in which the spins lie in the azimuthal plane and finite spin polarization is achieved by wavevector filtering of electrons. Besides momentum filtering, another prerequisite for finite spin polarization is asymmetric occupation or transmission probabilities of the eigenstates of the SOC Hamiltonian. This is achieved most efficiently by resonant tunneling through multiple SOC barriers. We apply our analysis to common SOC mechanisms in semiconductors: pure bulk Dresselhaus SOC, heterostructures with mixed Dresselhaus and Rashba SOC and strain-induced SOC. In particular, we find that the interplay between Dresselhaus and Rashba SOC effects can yield several advantageous features for spin filter and spin injector functions, such as increased robustness to wavevector spread of electrons

  1. Spin polarization of tunneling current in barriers with spin-orbit coupling.

    Science.gov (United States)

    Fujita, T; Jalil, M B A; Tan, S G

    2008-03-19

    We present a general method for evaluating the maximum transmitted spin polarization and optimal spin axis for an arbitrary spin-orbit coupling (SOC) barrier system, in which the spins lie in the azimuthal plane and finite spin polarization is achieved by wavevector filtering of electrons. Besides momentum filtering, another prerequisite for finite spin polarization is asymmetric occupation or transmission probabilities of the eigenstates of the SOC Hamiltonian. This is achieved most efficiently by resonant tunneling through multiple SOC barriers. We apply our analysis to common SOC mechanisms in semiconductors: pure bulk Dresselhaus SOC, heterostructures with mixed Dresselhaus and Rashba SOC and strain-induced SOC. In particular, we find that the interplay between Dresselhaus and Rashba SOC effects can yield several advantageous features for spin filter and spin injector functions, such as increased robustness to wavevector spread of electrons.

  2. Spin pumping and inverse spin Hall effects in heavy metal/antiferromagnet/Permalloy trilayers

    Science.gov (United States)

    Saglam, Hilal; Zhang, Wei; Jungfleisch, M. Benjamin; Jiang, Wanjun; Pearson, John E.; Hoffmann, Axel

    Recent work shows efficient spin transfer via spin waves in insulating antiferromagnets (AFMs), suggesting that AFMs can play a more active role in the manipulation of ferromagnets. We use spin pumping and inverse spin Hall effect experiments on heavy metal (Pt and W)/AFMs/Py (Ni80Fe20) trilayer structures, to examine the possible spin transfer phenomenon in metallic AFMs, i . e . , FeMn and PdMn. Previous work has studied electronic effects of the spin transport in these materials, yielding short spin diffusion length on the order of 1 nm. However, the work did not examine whether besides diffusive spin transport by the conduction electrons, there are additional spin transport contributions from spin wave excitations. We clearly observe spin transport from the Py spin reservoir to the heavy metal layer through the sandwiched AFMs with thicknesses well above the previously measured spin diffusion lengths, indicating that spin transport by spin waves may lead to non-negligible contributions This work was supported by US DOE, OS, Materials Sciences and Engineering Division. Lithographic patterning was carried out at the CNM, which is supported by DOE, OS under Contract No. DE-AC02-06CH11357.

  3. Spin-photon interface and spin-controlled photon switching in a nanobeam waveguide

    DEFF Research Database (Denmark)

    Javadi, Alisa; Ding, Dapeng; Appel, Martin Hayhurst

    2018-01-01

    Access to the electron spin is at the heart of many protocols for integrated and distributed quantum-information processing [1-4]. For instance, interfacing the spin-state of an electron and a photon can be utilized to perform quantum gates between photons [2,5] or to entangle remote spin states [6......-9]. Ultimately, a quantum network of entangled spins constitutes a new paradigm in quantum optics [1]. Towards this goal, an integrated spin-photon interface would be a major leap forward. Here we demonstrate an efficient and optically programmable interface between the spin of an electron in a quantum dot...... and photons in a nanophotonic waveguide. The spin can be deterministically prepared with a fidelity of 96\\%. Subsequently the system is used to implement a "single-spin photonic switch", where the spin state of the electron directs the flow of photons through the waveguide. The spin-photon interface may...

  4. Spin symposium

    Energy Technology Data Exchange (ETDEWEB)

    Anon.

    1989-01-15

    The recent 8th International Symposium on High Energy Spin Physics at the University of Minnesota in Minneapolis, Minnesota, opened with a bang when L. Pondrom (Wisconsin), donning a hard hat borrowed from construction workers, ventured that 'spin, the notorious inessential complication of hadronic physics, is finally telling us what real QCD (quantum chromodynamics, the field theory of quarks and gluons) looks like.' He was referring to an animated discussion on the meaning of the recent spin oriented (polarized) scattering results from the European Muon Collaboration (EMC) at CERN and reported at the Symposium by R. Garnet (Liverpool) and P. Schuler (Yale) which show that the proton spin is not simply a reflection of the spins of its constituent quarks.

  5. OPERATION COBRA. Deliberate Attack, Exploitation

    Science.gov (United States)

    1984-05-25

    to attack Sens, then continue to Troyes , on the Seine River. CCA was in the north, crossing the Loing River at Souppes against light resistance and...advanced from Troyes and prepared positions close to Sens. Under strong artillery support, a task force from CCA (TF Oden) attacked the enemy frontally...movement towards the Seine River on 24 August with an advance toward Troyes . Facing the combat command were what remained of the 51st SS Brigade, light

  6. Robustness of non-interdependent and interdependent networks against dependent and adaptive attacks

    Science.gov (United States)

    Tyra, Adam; Li, Jingtao; Shang, Yilun; Jiang, Shuo; Zhao, Yanjun; Xu, Shouhuai

    2017-09-01

    Robustness of complex networks has been extensively studied via the notion of site percolation, which typically models independent and non-adaptive attacks (or disruptions). However, real-life attacks are often dependent and/or adaptive. This motivates us to characterize the robustness of complex networks, including non-interdependent and interdependent ones, against dependent and adaptive attacks. For this purpose, dependent attacks are accommodated by L-hop percolation where the nodes within some L-hop (L ≥ 0) distance of a chosen node are all deleted during one attack (with L = 0 degenerating to site percolation). Whereas, adaptive attacks are launched by attackers who can make node-selection decisions based on the network state in the beginning of each attack. The resulting characterization enriches the body of knowledge with new insights, such as: (i) the Achilles' Heel phenomenon is only valid for independent attacks, but not for dependent attacks; (ii) powerful attack strategies (e.g., targeted attacks and dependent attacks, dependent attacks and adaptive attacks) are not compatible and cannot help the attacker when used collectively. Our results shed some light on the design of robust complex networks.

  7. Inverse spin Hall effect by spin injection

    Science.gov (United States)

    Liu, S. Y.; Horing, Norman J. M.; Lei, X. L.

    2007-09-01

    Motivated by a recent experiment [S. O. Valenzuela and M. Tinkham, Nature (London) 442, 176 (2006)], the authors present a quantitative microscopic theory to investigate the inverse spin-Hall effect with spin injection into aluminum considering both intrinsic and extrinsic spin-orbit couplings using the orthogonalized-plane-wave method. Their theoretical results are in good agreement with the experimental data. It is also clear that the magnitude of the anomalous Hall resistivity is mainly due to contributions from extrinsic skew scattering.

  8. Command Disaggregation Attack and Mitigation in Industrial Internet of Things

    Directory of Open Access Journals (Sweden)

    Peng Xun

    2017-10-01

    Full Text Available A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1 the command sequence is disordered and (2 disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  9. Command Disaggregation Attack and Mitigation in Industrial Internet of Things.

    Science.gov (United States)

    Xun, Peng; Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-10-21

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  10. Counteracting Power Analysis Attacks by Masking

    Science.gov (United States)

    Oswald, Elisabeth; Mangard, Stefan

    The publication of power analysis attacks [12] has triggered a lot of research activities. On the one hand these activities have been dedicated toward the development of secure and efficient countermeasures. On the other hand also new and improved attacks have been developed. In fact, there has been a continuous arms race between designers of countermeasures and attackers. This chapter provides a brief overview of the state-of-the art in the arms race in the context of a countermeasure called masking. Masking is a popular countermeasure that has been extensively discussed in the scientific community. Numerous articles have been published that explain different types of masking and that analyze weaknesses of this countermeasure.

  11. Metrics for Assessment of Smart Grid Data Integrity Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  12. The kinematic differences between off-spin and leg-spin bowling in cricket.

    Science.gov (United States)

    Beach, Aaron J; Ferdinands, René E D; Sinclair, Peter J

    2016-09-01

    Spin bowling is generally coached using a standard technical framework, but this practice has not been based upon a comparative biomechanical analysis of leg-spin and off-spin bowling. This study analysed the three-dimensional (3D) kinematics of 23 off-spin and 20 leg-spin bowlers using a Cortex motion analysis system to identify how aspects of the respective techniques differed. A multivariate ANOVA found that certain data tended to validate some of the stated differences in the coaching literature. Off-spin bowlers had a significantly shorter stride length (p = 0.006) and spin rate (p = 0.001), but a greater release height than leg-spinners (p = 0.007). In addition, a number of other kinematic differences were identified that were not previously documented in coaching literature. These included a larger rear knee flexion (p = 0.007), faster approach speed (p < 0.001), and flexing elbow action during the arm acceleration compared with an extension action used by most of the off-spin bowlers. Off-spin and leg-spin bowlers also deviated from the standard coaching model for the shoulder alignment, front knee angle at release, and forearm mechanics. This study suggests that off-spin and leg-spin are distinct bowling techniques, supporting the development of two different coaching models in spin bowling.

  13. A taxonomy of distributed denial of service attacks

    DEFF Research Database (Denmark)

    De Donno, Michele; Giaretta, Alberto; Dragoni, Nicola

    2017-01-01

    Distributed Denial of Service (DDoS) attacks which are now even more powerful and easier to achieve than the past. Understanding how these attacks work, in all their different forms, represents a first crucial step to tackle this urgent issue. To this end, in this paper we propose a new up-to-date taxonomy...... and a comprehensive classification of current DDoS attacks....

  14. Field-controlled spin current in frustrated spin chains

    Directory of Open Access Journals (Sweden)

    A.K. Kolezhuk

    2009-01-01

    Full Text Available We study states with spontaneous spin current, emerging in frustrated antiferromagnetic spin-S chains subject to a strong external magnetic field. As a numerical tool, we use a non-Abelian symmetry realization of the density matrix renormalization group. The field dependence of the order parameter and the critical exponents are presented for zigzag chains with S=1/2, 1, 3/2, and 2.

  15. Nuclear spin content and constraints on exotic spin-dependent couplings

    International Nuclear Information System (INIS)

    Kimball, D F Jackson

    2015-01-01

    There are numerous recent and ongoing experiments employing a variety of atomic species to search for couplings of atomic spins to exotic fields. In order to meaningfully compare these experimental results, the coupling of the exotic field to the atomic spin must be interpreted in terms of the coupling to electron, proton, and neutron spins. Traditionally, constraints from atomic experiments on exotic couplings to neutron and proton spins have been derived using the single-particle Schmidt model for nuclear spin. In this model, particular atomic species are sensitive to either neutron or proton spin couplings, but not both. More recently, semi-empirical models employing nuclear magnetic moment data have been used to derive new constraints for non-valence nucleons. However, comparison of such semi-empirical models to detailed large-scale nuclear shell model calculations and analysis of known physical effects in nuclei show that existing semi-empirical models cannot reliably be used to predict the spin polarization of non-valence nucleons. The results of our re-analysis of nuclear spin content are applied to searches for exotic long-range monopole–dipole and dipole–dipole couplings of nuclei leading to significant revisions of some published constraints. (paper)

  16. Spin injection into Pt-polymers with large spin-orbit coupling

    Science.gov (United States)

    Sun, Dali; McLaughlin, Ryan; Siegel, Gene; Tiwari, Ashutosh; Vardeny, Z. Valy

    2014-03-01

    Organic spintronics has entered a new era of devices that integrate organic light-emitting diodes (OLED) in organic spin valve (OSV) geometry (dubbed bipolar organic spin valve, or spin-OLED), for actively manipulating the device electroluminescence via the spin alignment of two ferromagnetic electrodes (Science 337, 204-209, 2012; Appl. Phys. Lett. 103, 042411, 2013). Organic semiconductors that contain heavy metal elements have been widely used as phosphorescent dopants in white-OLEDs. However such active materials are detrimental for OSV operation due to their large spin-orbit coupling (SOC) that may limit the spin diffusion length and thus spin-OLED based on organics with large SOC is a challenge. We report the successful fabrication of OSVs based on pi-conjugated polymers which contain intrachain Platinum atoms (dubbed Pt-polymers). Spin injection into the Pt-polymers is investigated by the giant magnetoresistance (GMR) effect as a function of bias voltage, temperature and polymer layer thickness. From the GMR bias voltage dependence we infer that the ``impendence mismatch'' between ferromagnetic electrodes and Pt-polymer may be suppressed due to the large SOC. Research sponsored by the NSF (Grant No. DMR-1104495) and NSF-MRSEC (DMR 1121252) at the University of Utah.

  17. An Explanation of Nakamoto's Analysis of Double-spend Attacks

    OpenAIRE

    Ozisik, A. Pinar; Levine, Brian Neil

    2017-01-01

    The fundamental attack against blockchain systems is the double-spend attack. In this tutorial, we provide a very detailed explanation of just one section of Satoshi Nakamoto's original paper where the attack's probability of success is stated. We show the derivation of the mathematics relied upon by Nakamoto to create a model of the attack. We also validate the model with a Monte Carlo simulation, and we determine which model component is not perfect.

  18. Spin-polarized light-emitting diodes based on organic bipolar spin valves

    Science.gov (United States)

    Vardeny, Zeev Valentine; Nguyen, Tho Duc; Ehrenfreund, Eitan Avraham

    2017-10-25

    Spin-polarized organic light-emitting diodes are provided. Such spin-polarized organic light-emitting diodes incorporate ferromagnetic electrodes and show considerable spin-valve magneto-electroluminescence and magneto-conductivity responses, with voltage and temperature dependencies that originate from the bipolar spin-polarized space charge limited current.

  19. QED approach to the nuclear spin-spin coupling tensor

    International Nuclear Information System (INIS)

    Romero, Rodolfo H.; Aucar, Gustavo A.

    2002-01-01

    A quantum electrodynamical approach for the calculation of the nuclear spin-spin coupling tensor of nuclear-magnetic-resonance spectroscopy is given. Quantization of radiation fields within the molecule is considered and expressions for the magnetic field in the neighborhood of a nucleus are calculated. Using a generalization of time-dependent response theory, an effective spin-spin interaction is obtained from the coupling of nuclear magnetic moments to a virtual quantized magnetic field. The energy-dependent operators obtained reduce to usual classical-field expressions at suitable limits

  20. Modeling and Analysis of Information Attack in Computer Networks

    National Research Council Canada - National Science Library

    Pepyne, David

    2003-01-01

    ... (as opposed to physical and other forms of attack) . Information based attacks are attacks that can be carried out from anywhere in the world, while sipping cappuccino at an Internet cafe' or while enjoying the comfort of a living room armchair...

  1. Realization of tunable spin-dependent splitting in intrinsic photonic spin Hall effect

    Energy Technology Data Exchange (ETDEWEB)

    Ling, Xiaohui [SZU-NUS Collaborative Innovation Center for Optoelectronic Science and Technology, and Key Laboratory of Optoelectronic Devices and Systems of Ministry of Education and Guangdong Province, College of Optoelectronic Engineering, Shenzhen University, Shenzhen 518060 (China); Laboratory for spin photonics, College of Physics and Microelectronic Science, Hunan University, Changsha 410082 (China); Department of Physics and Electronic Information Science, Hengyang Normal University, Hengyang 421002 (China); Yi, Xunong [SZU-NUS Collaborative Innovation Center for Optoelectronic Science and Technology, and Key Laboratory of Optoelectronic Devices and Systems of Ministry of Education and Guangdong Province, College of Optoelectronic Engineering, Shenzhen University, Shenzhen 518060 (China); Zhou, Xinxing; Liu, Yachao; Shu, Weixing; Wen, Shuangchun [Laboratory for spin photonics, College of Physics and Microelectronic Science, Hunan University, Changsha 410082 (China); Luo, Hailu, E-mail: hailuluo@hnu.edu.cn [SZU-NUS Collaborative Innovation Center for Optoelectronic Science and Technology, and Key Laboratory of Optoelectronic Devices and Systems of Ministry of Education and Guangdong Province, College of Optoelectronic Engineering, Shenzhen University, Shenzhen 518060 (China); Laboratory for spin photonics, College of Physics and Microelectronic Science, Hunan University, Changsha 410082 (China)

    2014-10-13

    We report the realization of tunable spin-dependent splitting in intrinsic photonic spin Hall effect. By breaking the rotational symmetry of a cylindrical vector beam, the intrinsic vortex phases that the two spin components of the vector beam carries, which is similar to the geometric Pancharatnam-Berry phase, are no longer continuous in the azimuthal direction, and leads to observation of spin accumulation at the opposite edge of the beam. Due to the inherent nature of the phase and independency of light-matter interaction, the observed photonic spin Hall effect is intrinsic. Modulating the topological charge of the vector beam, the spin-dependent splitting can be enhanced and the direction of spin accumulation is switchable. Our findings may provide a possible route for generation and manipulation of spin-polarized photons, and enables spin-based photonics applications.

  2. Spin-flip and spin orbit interactions in heavy ion systems

    International Nuclear Information System (INIS)

    Bybell, D.P.

    1983-01-01

    The role of spin orbit forces in heavy ion reactions is not completely understood. Experimental data is scarce for these systems but the data that does exist indicates a stronger spin orbit force than predicted by the folding models. The spin-flip probability of non-spin zero projectiles is one technique used for these measurements and is often taken as a direct indicator of a spin orbit interaction. This work measures the projectile spin-flip probability for three inelastic reactions; 13 C + 24 Mg, E/sub cm/ = 22.7 MeV; 13 C + 12 C, E/sub cm/ = 17.3 MeV; and 6 Li + 12 C, E/sub cm/ = 15.2 MeV, all leading to the first J/sup π/ = 2 + state of the target. The technique of particle-γ angular correlations was used for measuring the final state density matrix elements, of which the absolute value M = 1 magnetic substate population is equivalent to the spin-flip probability. The method was explored in detail and found to be sensitive to spin-flip probabilities smaller than 1%. The technique was also found to be a good indicator of the reaction mechanism involved. Nonzero and occasionally large spin-flip probabilities were observed in all systems, much larger than the folding model predictions. Information was obtained on the non-spin-flip density matrix elements. In the 13 C + 24 Mg reaction, these were found to agree with calculations when the finite size of the particle detector is included

  3. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within...

  4. Protecting infrastructure networks from cost-based attacks

    International Nuclear Information System (INIS)

    Wang Xingang; Guan Shuguang; Lai, Choy Heng

    2009-01-01

    It is well known that heterogeneous networks are vulnerable to the intentional removal of a small fraction of highly connected or loaded nodes, implying that to protect the network effectively, the important nodes should be allocated more defense resource than the others. However, if too much resource is allocated to the few important nodes, the numerous less-important nodes will be less protected, which if attacked together can still lead to devastating damage. A natural question is therefore how to efficiently distribute the limited defense resource among the network nodes such that the network damage is minimized against any attack strategy. In this paper, taking into account the factor of attack cost, the problem of network security is reconsidered in terms of efficient network defense against cost-based attacks. The results show that, for a general complex network, there exists an optimal distribution of the defense resource with which the network is best protected from cost-based attacks. Furthermore, it is found that the configuration of the optimal defense is dependent on the network parameters. Specifically, networks of larger size, sparser connection and more heterogeneous structure will more likely benefit from the defense optimization.

  5. Constructing APT Attack Scenarios Based on Intrusion Kill Chain and Fuzzy Clustering

    Directory of Open Access Journals (Sweden)

    Ru Zhang

    2017-01-01

    Full Text Available The APT attack on the Internet is becoming more serious, and most of intrusion detection systems can only generate alarms to some steps of APT attack and cannot identify the pattern of the APT attack. To detect APT attack, many researchers established attack models and then correlated IDS logs with the attack models. However, the accuracy of detection deeply relied on the integrity of models. In this paper, we propose a new method to construct APT attack scenarios by mining IDS security logs. These APT attack scenarios can be further used for the APT detection. First, we classify all the attack events by purpose of phase of the intrusion kill chain. Then we add the attack event dimension to fuzzy clustering, correlate IDS alarm logs with fuzzy clustering, and generate the attack sequence set. Next, we delete the bug attack sequences to clean the set. Finally, we use the nonaftereffect property of probability transfer matrix to construct attack scenarios by mining the attack sequence set. Experiments show that the proposed method can construct the APT attack scenarios by mining IDS alarm logs, and the constructed scenarios match the actual situation so that they can be used for APT attack detection.

  6. On node replication attack in wireless sensor networks

    International Nuclear Information System (INIS)

    Qabulio, M.; Malkani, Y.A.

    2015-01-01

    WSNs (Wireless Sensor Networks) comprise a large number of small, inexpensive, low power and memory constrained sensing devices (called sensor nodes) that are densely deployed to measure a given physical phenomenon. Since WSNs are commonly deployed in a hostile and unattended environment, it is easy for an adversary to physically capture one or more legitimate sensor nodes, re-program and redeploy them in the network. As a result, the adversary becomes able to deploy several identical copies of physically captured nodes in the network in order to perform illegitimate activities. This type of attack is referred to as Node Replication Attack or Clone Node Attack. By launching node replication attack, an adversary can easily get control on the network which consequently is the biggest threat to confidentiality, integrity and availability of data and services. Thus, detection and prevention of node replication attack in WSNs has become an active area of research and to date more than two dozen schemes have been proposed, which address this issue. In this paper, we present a comprehensive review, classification and comparative analysis of twenty five of these schemes which help to detect and/or prevent node replication attack in WSNs. (author)

  7. On Node Replication Attack in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mumtaz Qabulio

    2016-04-01

    Full Text Available WSNs (Wireless Sensor Networks comprise a large number of small, inexpensive, low power and memory constrained sensing devices (called sensor nodes that are densely deployed to measure a given physical phenomenon. Since WSNs are commonly deployed in a hostile and unattended environment, it is easy for an adversary to physically capture one or more legitimate sensor nodes, re-program and redeploy them in the network. As a result, the adversary becomes able to deploy several identical copies of physically captured nodes in the network in order to perform illegitimate activities. This type of attack is referred to as Node Replication Attack or Clone Node Attack. By launching node replication attack, an adversary can easily get control on the network which consequently is the biggest threat to confidentiality, integrity and availability of data and services. Thus, detection and prevention of node replication attack in WSNs has become an active area of research and to date more than two dozen schemes have been proposed, which address this issue. In this paper, we present a comprehensive review, classification and comparative analysis of twenty five of these schemes which help to detect and/or prevent node replication attack in WSNs

  8. Attacker-defender game from a network science perspective

    Science.gov (United States)

    Li, Ya-Peng; Tan, Suo-Yi; Deng, Ye; Wu, Jun

    2018-05-01

    Dealing with the protection of critical infrastructures, many game-theoretic methods have been developed to study the strategic interactions between defenders and attackers. However, most game models ignore the interrelationship between different components within a certain system. In this paper, we propose a simultaneous-move attacker-defender game model, which is a two-player zero-sum static game with complete information. The strategies and payoffs of this game are defined on the basis of the topology structure of the infrastructure system, which is represented by a complex network. Due to the complexity of strategies, the attack and defense strategies are confined by two typical strategies, namely, targeted strategy and random strategy. The simulation results indicate that in a scale-free network, the attacker virtually always attacks randomly in the Nash equilibrium. With a small cost-sensitive parameter, representing the degree to which costs increase with the importance of a target, the defender protects the hub targets with large degrees preferentially. When the cost-sensitive parameter exceeds a threshold, the defender switches to protecting nodes randomly. Our work provides a new theoretical framework to analyze the confrontations between the attacker and the defender on critical infrastructures and deserves further study.

  9. Are the rules for the right to self-defense outdated to address current conflicts like attacks from non-state actors and cyber-attacks?

    Directory of Open Access Journals (Sweden)

    Gonzalo J. Arias

    2017-06-01

    Full Text Available The latest US-led coalition’s attacks against ISIS in Syria raised the question whether states can use defensive force against non-state actors. Two critical incidents had previously triggered the discussion on the importance and consequences of cyber-attacks as a new form armed attacks. The first one occurred in Estonia in 2007, when the country experienced extensive computer hacking attacks that lasted several weeks. The second incident happened in 2008, during the Georgia–Russia conflict over South Ossetia, when Georgia experienced cyber-attacks similar to those suffered by Estonia in the previous year. Furthermore, on June 21, 2016, the central banks of Indonesia and South Korea were hit by cyber-attacks on their public websites since activist hacking group Anonymous pledged last month to target banks across the world. The previous incidents have created, once again, public questioning if the rules on the use of force and the right of self-defense established in the United Nations Charter are sufficient and efficient to address these new forms of attacks.

  10. After-gate attack on a quantum cryptosystem

    International Nuclear Information System (INIS)

    Wiechers, C; Wittmann, C; Elser, D; Marquardt, Ch; Leuchs, G; Lydersen, L; Skaar, J; Makarov, V

    2011-01-01

    We present a method to control the detection events in quantum key distribution systems that use gated single-photon detectors. We employ bright pulses as faked states, timed to arrive at the avalanche photodiodes outside the activation time. The attack can remain unnoticed, since the faked states do not increase the error rate per se. This allows for an intercept-resend attack, where an eavesdropper transfers her detection events to the legitimate receiver without causing any errors. As a side effect, afterpulses, originating from accumulated charge carriers in the detectors, increase the error rate. We have experimentally tested detectors of the system id3110 (Clavis2) from ID Quantique. We identify the parameter regime in which the attack is feasible despite the side effect. Furthermore, we outline how simple modifications in the implementation can make the device immune to this attack.

  11. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  12. Magnetic proximity control of spin currents and giant spin accumulation in graphene

    Science.gov (United States)

    Singh, Simranjeet

    Two dimensional (2D) materials provide a unique platform to explore the full potential of magnetic proximity driven phenomena. We will present the experimental study showing the strong modulation of spin currents in graphene layers by controlling the direction of the exchange field due to the ferromagnetic-insulator (FMI) magnetization in graphene/FMI heterostructures. Owing to clean interfaces, a strong magnetic exchange coupling leads to the experimental observation of complete spin modulation at low externally applied magnetic fields in short graphene channels. We also discover that the graphene spin current can be fully dephased by randomly fluctuating exchange fields. This is manifested as an unusually strong temperature dependence of the non-local spin signals in graphene, which is due to spin relaxation by thermally-induced transverse fluctuations of the FMI magnetization. Additionally, it has been a challenge to grow a smooth, robust and pin-hole free tunnel barriers on graphene, which can withstand large current densities for efficient electrical spin injection. We have experimentally demonstrated giant spin accumulation in graphene lateral spin valves employing SrO tunnel barriers. Nonlocal spin signals, as large as 2 mV, are observed in graphene lateral spin valves at room temperature. This high spin accumulations observed using SrO tunnel barriers puts graphene on the roadmap for exploring the possibility of achieving a non-local magnetization switching due to the spin torque from electrically injected spins. Financial support from ONR (No. N00014-14-1-0350), NSF (No. DMR-1310661), and C-SPIN, one of the six SRC STARnet Centers, sponsored by MARCO and DARPA.

  13. An Analysis of Cyber-Attack on NPP Considering Physical Impact

    Energy Technology Data Exchange (ETDEWEB)

    Lee, In Hyo; Kang, Hyun Gook [KAIST, Daejeon (Korea, Republic of); Son, Han Seong [Joonbu University, Geumsan (Korea, Republic of)

    2016-05-15

    Some research teams performed related works on cyber-physical system which is a system that cyber-attack can lead to serious consequences including product loss, damage, injury and death when it is attacked. They investigated the physical impact on cyber-physical system due to the cyber-attack. But it is hard to find the research about NPP cyber security considering the physical impact or safety. In this paper, to investigate the relationship between physical impact and cyber-attack, level 1 PSA results are utilized in chapter 2 and cyber-attack analysis is performed in chapter 3. The cyber security issue on NPP is inevitable issue. Unlike general cyber security, cyber-physical system like NPP can induce serious consequences such as core damage by cyber-attack. So in this paper, to find how hacker can attack the NPP, (1) PSA results were utilized to find the relationship between physical system and cyber-attack and (2) vulnerabilities on digital control systems were investigated to find how hacker can implement the possible attack. It is expected that these steps are utilized when establishing penetration test plans or cyber security drill plans.

  14. An Analysis of Cyber-Attack on NPP Considering Physical Impact

    International Nuclear Information System (INIS)

    Lee, In Hyo; Kang, Hyun Gook; Son, Han Seong

    2016-01-01

    Some research teams performed related works on cyber-physical system which is a system that cyber-attack can lead to serious consequences including product loss, damage, injury and death when it is attacked. They investigated the physical impact on cyber-physical system due to the cyber-attack. But it is hard to find the research about NPP cyber security considering the physical impact or safety. In this paper, to investigate the relationship between physical impact and cyber-attack, level 1 PSA results are utilized in chapter 2 and cyber-attack analysis is performed in chapter 3. The cyber security issue on NPP is inevitable issue. Unlike general cyber security, cyber-physical system like NPP can induce serious consequences such as core damage by cyber-attack. So in this paper, to find how hacker can attack the NPP, (1) PSA results were utilized to find the relationship between physical system and cyber-attack and (2) vulnerabilities on digital control systems were investigated to find how hacker can implement the possible attack. It is expected that these steps are utilized when establishing penetration test plans or cyber security drill plans

  15. Possible evidence for spin-transfer torque induced by spin-triplet supercurrent

    KAUST Repository

    Li, Lailai

    2017-10-04

    Cooper pairs in superconductors are normally spin singlet. Nevertheless, recent studies suggest that spin-triplet Cooper pairs can be created at carefully engineered superconductor-ferromagnet interfaces. If Cooper pairs are spin-polarized they would transport not only charge but also a net spin component, but without dissipation, and therefore minimize the heating effects associated with spintronic devices. Although it is now established that triplet supercurrents exist, their most interesting property - spin - is only inferred indirectly from transport measurements. In conventional spintronics, it is well known that spin currents generate spin-transfer torques that alter magnetization dynamics and switch magnetic moments. The observation of similar effects due to spin-triplet supercurrents would not only confirm the net spin of triplet pairs but also pave the way for applications of superconducting spintronics. Here, we present a possible evidence for spin-transfer torques induced by triplet supercurrents in superconductor/ferromagnet/superconductor (S/F/S) Josephson junctions. Below the superconducting transition temperature T_c, the ferromagnetic resonance (FMR) field at X-band (~ 9.0 GHz) shifts rapidly to a lower field with decreasing temperature due to the spin-transfer torques induced by triplet supercurrents. In contrast, this phenomenon is absent in ferromagnet/superconductor (F/S) bilayers and superconductor/insulator/ferromagnet/superconductor (S/I/F/S) multilayers where no supercurrents pass through the ferromagnetic layer. These experimental observations are discussed with theoretical predictions for ferromagnetic Josephson junctions with precessing magnetization.

  16. Spin Currents and Spin Orbit Torques in Ferromagnets and Antiferromagnets

    Science.gov (United States)

    Hung, Yu-Ming

    This thesis focuses on the interactions of spin currents and materials with magnetic order, e.g., ferromagnetic and antiferromagnetic thin films. The spin current is generated in two ways. First by spin-polarized conduction-electrons associated with the spin Hall effect in heavy metals (HMs) and, second, by exciting spin-waves in ferrimagnetic insulators using a microwave frequency magnetic field. A conduction-electron spin current can be generated by spin-orbit coupling in a heavy non-magnetic metal and transfer its spin angular momentum to a ferromagnet, providing a means of reversing the magnetization of perpendicularly magnetized ultrathin films with currents that flow in the plane of the layers. The torques on the magnetization are known as spin-orbit torques (SOT). In the first part of my thesis project I investigated and contrasted the quasistatic (slowly swept current) and pulsed current-induced switching characteristics of micrometer scale Hall crosses consisting of very thin (magnetized CoFeB layers on beta-Ta. While complete magnetization reversal occurs at a threshold current density in the quasistatic case, pulses with short duration (≤10 ns) and larger amplitude (≃10 times the quasistatic threshold current) lead to only partial magnetization reversal and domain formation. The partial reversal is associated with the limited time for reversed domain expansion during the pulse. The second part of my thesis project studies and considers applications of SOT-driven domain wall (DW) motion in a perpendicularly magnetized ultrathin ferromagnet sandwiched between a heavy metal and an oxide. My experiment results demonstrate that the DW motion can be explained by a combination of the spin Hall effect, which generates a SOT, and Dzyaloshinskii-Moriya interaction, which stabilizes chiral Neel-type DW. Based on SOT-driven DW motion and magnetic coupling between electrically isolated ferromagnetic elements, I proposed a new type of spin logic devices. I then

  17. Classification of cyber attacks in South Africa

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-05-01

    Full Text Available various ATM's throughout South Africa. Two criminals, Motsoane and Masoleng, were arrested in February 2012 and both sentenced to 15 years in jail [36, 37]. 3.10 2013: IOL DDoS Anonymous Africa claimed responsibility for launching a Distributed Denial... of Service (DDoS) attack on the Independent Newspaper web site iol.co.za. The attack was in response to claims that the IOL group supports Zimbabwean president Robert Mugabe. The following taunt was sent to boast about the attack: “IOL bad boys bad boys...

  18. Inverse spin Hall effect induced by spin pumping into semiconducting ZnO

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jung-Chuan [Institute of Physics, Academia Sinica, Taipei 11529, Taiwan (China); Huang, Leng-Wei [Graduate Institute of Applied Physics, National Chengchi University, Taipei 11605, Taiwan (China); Hung, Dung-Shing, E-mail: dshung@mail.mcu.edu.tw [Institute of Physics, Academia Sinica, Taipei 11529, Taiwan (China); Department of Information and Telecommunications Engineering, Ming Chuan University, Taipei 111, Taiwan (China); Chiang, Tung-Han [Department of Physics, National Cheng Kung University, Tainan 70101, Taiwan (China); Huang, J. C. A., E-mail: jcahuang@mail.ncku.edu.tw [Department of Physics, National Cheng Kung University, Tainan 70101, Taiwan (China); Advanced Optoelectronic Technology Center, National Cheng Kung University, Tainan 70101, Taiwan (China); Liang, Jun-Zhi [Advanced Optoelectronic Technology Center, National Cheng Kung University, Tainan 70101, Taiwan (China); Department of Physics, Fu Jen Catholic University, Taipei 242, Taiwan (China); Lee, Shang-Fan, E-mail: leesf@phys.sinica.edu.tw [Institute of Physics, Academia Sinica, Taipei 11529, Taiwan (China); Graduate Institute of Applied Physics, National Chengchi University, Taipei 11605, Taiwan (China)

    2014-02-03

    The inverse spin Hall effect (ISHE) of n-type semiconductor ZnO thin films with weak spin-orbit coupling has been observed by utilizing the spin pumping method. In the ferromagnetic resonance condition, the spin pumping driven by the dynamical exchange interaction of a permalloy film injects a pure spin current into the adjacent ZnO layer. This spin current gives rise to a DC voltage through the ISHE in the ZnO layer, and the DC voltage is proportional to the microwave excitation power. The effect is sizeable even when the spin backflow is considered.

  19. Inverse spin Hall effect induced by spin pumping into semiconducting ZnO

    International Nuclear Information System (INIS)

    Lee, Jung-Chuan; Huang, Leng-Wei; Hung, Dung-Shing; Chiang, Tung-Han; Huang, J. C. A.; Liang, Jun-Zhi; Lee, Shang-Fan

    2014-01-01

    The inverse spin Hall effect (ISHE) of n-type semiconductor ZnO thin films with weak spin-orbit coupling has been observed by utilizing the spin pumping method. In the ferromagnetic resonance condition, the spin pumping driven by the dynamical exchange interaction of a permalloy film injects a pure spin current into the adjacent ZnO layer. This spin current gives rise to a DC voltage through the ISHE in the ZnO layer, and the DC voltage is proportional to the microwave excitation power. The effect is sizeable even when the spin backflow is considered

  20. A Review Of Recent Cyber-Attacks In Fiji

    Directory of Open Access Journals (Sweden)

    Neeraj A. Sharma

    2015-08-01

    Full Text Available Computing technology has evolved in such dramatic ways that a child can use such technology and their features. Internet is one such technology which allows peripheral devices to be connected to each other creating a network to share information. In the same way information can be attacked. In this paper we will be discussing the different types of cyber-attack that recently took place in Fiji. Common attacks discussed in this review paper are phishing email scams website defacement and skimming. Apart from common preventative methods some novel recommendations have been made. We believe the Fiji experiences and recommendations will assist technology users prepare better against such attacks.

  1. Research on high power intra-channel crosstalk attack in optical networks

    Science.gov (United States)

    Ren, Shuai; Zhang, Yinfa; Wang, Jingyu; Zhang, Jumei; Rao, Xuejun; Fang, Yuanyuan

    2017-02-01

    The mechanism of high power intra-channel crosstalk attack is analyzed theoretically and the conclusion that power of attack signal and crosstalk coefficient of optical switch are the main factors for which high power intra-channel have destructive effect on quality of legitimate signals is drawn. Effects of high power intra-channel crosstalk attack on quality of legitimate signals and its capability of attack propagation are investigated quantitatively by building the simulation system in VPI software. The results show that legitimate signals through the first and the second stage optical switch are affected by attack and legitimate signal through the third stage optical switch is almost unaffected by attack when power of original attack signal (OAS) is above 20dB more than that of legitimate signals and crosstalk coefficient of optical switch is -20dB at optical cross connect 1 (OXC1). High power intra-channel crosstalk attack has a certain capability of attack propagation. Attack capability of OAS can be propagated to OXC3 when power of OAS is 27dB more than that of legitimate signals and crosstalk coefficient of optical switch is -20dB. We also find that the secondary attack signal (SAS) does not have capability of attack propagation.

  2. The Department of Defense Press Pool: Did in Work in Panama?

    Science.gov (United States)

    1990-01-01

    who would physically attack a paper and its printer that did not reflect their opinion (Tebbel, 5). Politicians rarely brought the papers to task...Rico single-handedly and James Creelman , a reporter for Hearst, leading a bayonet charge outside Santiago. Military and press relations were good. The

  3. Ending the "War against Youth": Social Media and Hip-Hop Culture as Sites of Resistance, Transformation and (Re) Conceptualization

    Science.gov (United States)

    Porfilio, Brad J.; Roychoudhury, Debangshu; Gardner, Lauren

    2013-01-01

    The purpose of this essay is to ameliorate the virulent discursive and material attack against today's "border" youth launched by large-scale corporations and Western politicians. Specifically, the authors problematize the dominant tropes of youth being mindless, obedient objects who passively accept the stark social reality they…

  4. Induction-detection electron spin resonance with spin sensitivity of a few tens of spins

    Energy Technology Data Exchange (ETDEWEB)

    Artzi, Yaron; Twig, Ygal; Blank, Aharon [Schulich Faculty of Chemistry Technion—Israel Institute of Technology, Haifa 32000 (Israel)

    2015-02-23

    Electron spin resonance (ESR) is a spectroscopic method that addresses electrons in paramagnetic materials directly through their spin properties. ESR has many applications, ranging from semiconductor characterization to structural biology and even quantum computing. Although it is very powerful and informative, ESR traditionally suffers from low sensitivity, requiring many millions of spins to get a measureable signal with commercial systems using the Faraday induction-detection principle. In view of this disadvantage, significant efforts were made recently to develop alternative detection schemes based, for example, on force, optical, or electrical detection of spins, all of which can reach single electron spin sensitivity. This sensitivity, however, comes at the price of limited applicability and usefulness with regard to real scientific and technological issues facing modern ESR which are currently dealt with conventional induction-detection ESR on a daily basis. Here, we present the most sensitive experimental induction-detection ESR setup and results ever recorded that can detect the signal from just a few tens of spins. They were achieved thanks to the development of an ultra-miniature micrometer-sized microwave resonator that was operated at ∼34 GHz at cryogenic temperatures in conjunction with a unique cryogenically cooled low noise amplifier. The test sample used was isotopically enriched phosphorus-doped silicon, which is of significant relevance to spin-based quantum computing. The sensitivity was experimentally verified with the aid of a unique high-resolution ESR imaging approach. These results represent a paradigm shift with respect to the capabilities and possible applications of induction-detection-based ESR spectroscopy and imaging.

  5. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  6. Nuclear spin-lattice relaxation in nitroxide spin-label EPR.

    Science.gov (United States)

    Marsh, Derek

    2016-11-01

    Nuclear relaxation is a sensitive monitor of rotational dynamics in spin-label EPR. It also contributes competing saturation transfer pathways in T 1 -exchange spectroscopy, and the determination of paramagnetic relaxation enhancement in site-directed spin labelling. A survey shows that the definition of nitrogen nuclear relaxation rate W n commonly used in the CW-EPR literature for 14 N-nitroxyl spin labels is inconsistent with that currently adopted in time-resolved EPR measurements of saturation recovery. Redefinition of the normalised 14 N spin-lattice relaxation rate, b=W n /(2W e ), preserves the expressions used for CW-EPR, whilst rendering them consistent with expressions for saturation recovery rates in pulsed EPR. Furthermore, values routinely quoted for nuclear relaxation times that are deduced from EPR spectral diffusion rates in 14 N-nitroxyl spin labels do not accord with conventional analysis of spin-lattice relaxation in this three-level system. Expressions for CW-saturation EPR with the revised definitions are summarised. Data on nitrogen nuclear spin-lattice relaxation times are compiled according to the three-level scheme for 14 N-relaxation: T 1 n =1/W n . Results are compared and contrasted with those for the two-level 15 N-nitroxide system. Copyright © 2016 Elsevier Inc. All rights reserved.

  7. Spin injection and detection in lateral spin valves with hybrid interfaces

    Science.gov (United States)

    Wang, Le; Liu, Wenyu; Ying, Hao; Chen, Luchen; Lu, Zhanjie; Han, Shuo; Chen, Shanshan; Zhao, Bing; Xu, Xiaoguang; Jiang, Yong

    2018-06-01

    Spin injection and detection in lateral spin valves with hybrid interfaces comprising a Co/Ag transparent contact and a Co/MgO/Ag junction (III) are investigated at room temperature in comparison with pure Co/Ag transparent contacts (I) and Co/MgO/Ag junctions (II). The measured spin-accumulation signals of a type III device are five times higher than those for type I. The extracted spin diffusion length in Ag is 180 nm for all three types of devices. The enhancement of the spin signal of the hybrid structure is mainly attributed to the increase of the interfacial spin polarization from the Co/MgO/Ag junction.

  8. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    We analyze a simple dynamic model of the interaction between terrorists and authorities. Our primary aim is to study optimal counterterrorism and its consequences when large terrorist attacks lead to a temporary increase in terrorist recruitment. First, we show that an increase in counterterrorism...... makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore......, in periods following large attacks a new attack is more likely to be small compared to other periods. Finally, we analyze the long-run consequences of the recruitment effect. We show that it leads to more counterterrorism, more small attacks, and a higher sum of terrorism damage and counterterrorism costs...

  9. Large spin accumulation due to spin-charge coupling across a break-junction

    Science.gov (United States)

    Chen, Shuhan; Zou, Han; Chui, Siu-Tat; Ji, Yi

    2013-03-01

    We investigate large spin signals in break-junction nonlocal spin valves (NLSV). The break-junction is a nanometer-sized vacuum tunneling gap between the spin detector and the nonmagnetic channel, formed by electro-static discharge. The spin signals can be either inverted or non-inverted and the magnitudes are much larger than those of standard NLSV. Spin signals with high percentage values (10% - 0%) have been observed. When the frequency of the a.c. modulation is varied, the absolute magnitudes of signals remain the same although the percentage values change. These observations affirm the nonlocal nature of the measurements and rule out local magnetoresistive effects. Owing to the spin-charge coupling across the break-junction, the spin accumulation in a ferromagnet splits into two terms. One term decays on the charge screening length (0.1 nm) and the other decays on the spin diffusion length (10 nm nm). The magnitude of the former is proportional to the resistance of the junction. Therefore a highly resistive break-junction leads to a large spin accumulation and thereby a large spin signal. The signs of the spin signal are determined by the relationship between spin-dependent conductivities, diffusion constants, and density of states of the ferromagnet. This work was supported by US DOE grant No. DE-FG02-07ER46374.

  10. Spin dynamics under local gauge fields in chiral spin-orbit coupling systems

    International Nuclear Information System (INIS)

    Tan, S.G.; Jalil, M.B.A.; Fujita, T.; Liu, X.J.

    2011-01-01

    Research highlights: → We derive a modified LLG equation in magnetic systems with spin-orbit coupling (SOC). → Our results are applied to magnetic multilayers, and DMS and magnetic Rashba systems. → SOC mediated magnetization switching is predicted in rare earth metals (large SOC). → The magnetization trajectory and frequency can be modulated by applied voltage. → This facilitates potential application as tunable microwave oscillators. - Abstract: We present a theoretical description of local spin dynamics in magnetic systems with a chiral spin texture and finite spin-orbit coupling (SOC). Spin precession about the relativistic effective magnetic field in a SOC system gives rise to a non-Abelian SU(2) gauge field reminiscent of the Yang-Mills field. In addition, the adiabatic relaxation of electron spin along the local spin yields an U(1) x U(1) topological gauge (Berry) field. We derive the corresponding equation of motion i.e. modified Landau-Lifshitz-Gilbert (LLG) equation, for the local spin under the influence of these effects. Focusing on the SU(2) gauge, we obtain the spin torque magnitude, and the amplitude and frequency of spin oscillations in this system. Our theoretical estimates indicate significant spin torque and oscillations in systems with large spin-orbit coupling, which may be utilized in technological applications such as current-induced magnetization-switching and tunable microwave oscillators.

  11. Quantitative Verification and Synthesis of Attack-Defence Scenarios Conference

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They represent in an intuitive, graphical way the interaction between an attacker and a defender who compete in order to achieve conflicting objectives. We propose a novel framework for the formal

  12. Spin correlations and spin-wave excitations in Dirac-Weyl semimetals

    Science.gov (United States)

    Araki, Yasufumi; Nomura, Kentaro

    We study correlations among magnetic dopants in three-dimensional Dirac and Weyl semimetals. Effective field theory for localized magnetic moments is derived by integrating out the itinerant electron degrees of freedom. We find that spin correlation in the spatial direction parallel to local magnetization is more rigid than that in the perpendicular direction, reflecting spin-momentum locking nature of the Dirac Hamiltonian. Such an anisotropy becomes stronger for Fermi level close to the Dirac points, due to Van Vleck paramagnetism triggered by spin-orbit coupling. One can expect topologically nontrivial spin textures under this anisotropy, such as a hedgehog around a single point, or a radial vortex around an axis, as well as a uniform ferromagnetic order. We further investigate the characteristics of spin waves in the ferromagnetic state. Spin-wave dispersion also shows a spatial anisotropy, which is less dispersed in the direction transverse to the magnetization than that in the longitudinal direction. The spin-wave dispersion anisotropy can be traced back to the rigidity and flexibility of spin correlations discussed above. This work was supported by Grant-in-Aid for Scientific Research (Grants No.15H05854, No.26107505, and No.26400308) from the Ministry of Education, Culture, Sports, Science and Technology (MEXT), Japan.

  13. Spin-spin cross relaxation and spin-Hamiltonian spectroscopy by optical pumping of Pr/sup 3+/:LaF3

    International Nuclear Information System (INIS)

    Lukac, M.; Otto, F.W.; Hahn, E.L.

    1989-01-01

    We report the observation of an anticrossing in solid-state laser spectroscopy produced by cross relaxation. Spin-spin cross relaxation between the /sup 141/Pr- and /sup 19/F-spin reservoirs in Pr/sup 3+/:LaF 3 and its influence on the /sup 141/Pr NMR spectrum is detected by means of optical pumping. The technique employed combines optical pumping and hole burning with either external magnetic field sweep or rf resonance saturation in order to produce slow transient changes in resonant laser transmission. At a certain value of the external Zeeman field, where the energy-level splittings of Pr and F spins match, a level repulsion and discontinuity of the Pr/sup 3+/ NMR lines is observed. This effect is interpreted as the ''anticrossing'' of the combined Pr-F spin-spin reservoir energy states. The Zeeman-quadrupole-Hamiltonian spectrum of the hyperfine optical ground states of Pr/sup 3+/:LaF 3 is mapped out over a wide range of Zeeman magnetic fields. A new scheme is proposed for dynamic polarization of nuclei by means of optical pumping, based on resonant cross relaxation between rare spins and spin reservoirs

  14. 'Cryptogenic Drop Attacks' revisited: evidence of overlap with functional neurological disorder.

    Science.gov (United States)

    Hoeritzauer, Ingrid; Carson, Alan J; Stone, Jon

    2018-02-07

    In their 1973 BMJ paper 'Cryptogenic Drop Attacks', Stevens and Matthews described 40, mostly middle-aged, female patients with drop attacks of unknown cause. Although clinically common, there has been little on this topic since. We aimed to determine clinical features, comorbidity and outcome of patients with drop attacks. We carried out a retrospective review of patients with cryptogenic drop attacks seen consecutively by one clinician (JS) between 2006 and 2016. Demographics, phenomenology, duration and frequency of attacks, attack description and comorbid diagnoses were recorded. Patients were followed up with a notes review. 83 patients with cryptogenic drop attacks were predominantly female (89%, n=79), mean age 44  years. The majority (93%, n=77) could not remember the fall itself and almost half (43%, n=36) experienced prodromal dissociative symptoms. Mechanical trips or syncope preceded drop attacks, historically, in 24% (n=20) of cases. Persistent fatigue (73%, n=61), chronic pain (40%, n=33), functional limb weakness (31%,n=26) and dissociative (non-epileptic) attacks 28% (n=23) were common, with the latter usually preceding or emerging from drop attacks. At follow-up (88%, mean 38 months), 28% (n=23) had resolution of their drop attacks. Predisposing (but non-causative) disease comorbidity was found at baseline (n=12) and follow-up (n=5). Cryptogenic drop attacks are associated with high frequency of comorbid functional somatic and functional neurological disorders. Patients commonly have prodromal dissociative symptoms and in some there was a clear relationship with prior or subsequent dissociative (non-epileptic) attacks. Some cryptogenic drop attacks may be best understood as phenomena on the spectrum of dissociative attacks. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  15. Optimal Patrol to Detect Attacks at Dispersed Heterogeneous Locations

    Science.gov (United States)

    2013-12-01

    solution RALP Random-attacker linear program SALP Strategic-attacker linear program SMDP Semi-Markov decision process SP Shortest path SPR1 Shortest...average cost per attack among all vertices, which we refer to as the strategic-attacker linear program ( SALP ): min x zOPT (3.1a) subject to ∑ (k,l)∈A c...the SALP is indicated by zOPT. The lower bound that is obtained from using the LBLP is indicated by zLB. Solutions obtained from using a heuristic

  16. Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment

    Science.gov (United States)

    Kebert, Alan; Barnejee, Bikramjit; Solano, Juan; Solano, Wanda

    2013-01-01

    The cloud computing environment offers malicious users the ability to spawn multiple instances of cloud nodes that are similar to virtual machines, except that they can have separate external IP addresses. In this paper we demonstrate how this ability can be exploited by an attacker to distribute his/her attack, in particular SQL injection attacks, in such a way that an intrusion detection system (IDS) could fail to identify this attack. To demonstrate this, we set up a small private cloud, established a vulnerable website in one instance, and placed an IDS within the cloud to monitor the network traffic. We found that an attacker could quite easily defeat the IDS by periodically altering its IP address. To detect such an attacker, we propose to use multi-agent plan recognition, where the multiple source IPs are considered as different agents who are mounting a collaborative attack. We show that such a formulation of this problem yields a more sophisticated approach to detecting SQL injection attacks within a cloud computing environment.

  17. Can a Copycat Effect be Observed in Terrorist Suicide Attacks?

    Directory of Open Access Journals (Sweden)

    Nicholas Farnham

    2017-03-01

    Full Text Available The purpose of this paper is to explore how a copycat effect – established within the field of suicide studies – may manifest itself in terrorist suicide attacks, and takes an exploratory approach in evaluating the prospect of incorporating open-data resources in future counter-terrorism research. This paper explores a possible ‘copycat effect’ in cases of suicide terrorism, which entails a perpetrator being inspired by a preceding attack to carry out a similar attack not long after the original. In the wake of mounting risks of lone wolf terrorist attacks today and due to the general difficulties faced in preventing such attacks, in this paper we explore a potential area of future prevention in media reporting, security and anti-terrorism policies today. Using the START Global Terrorism Database (GTD, this paper investigates terrorist suicide-attack clusters and analyses the relationship between attacks found within the same cluster. Using a mixed-method approach, our analyses did not uncover clear evidence supporting a copycat effect among the studied attacks. These and other findings have numerous policy and future research implications.

  18. Bipolar spintronics: from spin injection to spin-controlled logic

    International Nuclear Information System (INIS)

    Zutic, Igor; Fabian, Jaroslav; Erwin, Steven C

    2007-01-01

    An impressive success of spintronic applications has been typically realized in metal-based structures which utilize magnetoresistive effects for substantial improvements in the performance of computer hard drives and magnetic random access memories. Correspondingly, the theoretical understanding of spin-polarized transport is usually limited to a metallic regime in a linear response, which, while providing a good description for data storage and magnetic memory devices, is not sufficient for signal processing and digital logic. In contrast, much less is known about possible applications of semiconductor-based spintronics and spin-polarized transport in related structures which could utilize strong intrinsic nonlinearities in current-voltage characteristics to implement spin-based logic. Here we discuss the challenges for realizing a particular class of structures in semiconductor spintronics: our proposal for bipolar spintronic devices in which carriers of both polarities (electrons and holes) contribute to spin-charge coupling. We formulate the theoretical framework for bipolar spin-polarized transport, and describe several novel effects in two- and three-terminal structures which arise from the interplay between nonequilibrium spin and equilibrium magnetization

  19. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... major stroke. It's important to call 9-1-1 immediately for any stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. The content in this ...

  20. Inverse spin-valve effect in nanoscale Si-based spin-valve devices

    Science.gov (United States)

    Hiep, Duong Dinh; Tanaka, Masaaki; Hai, Pham Nam

    2017-12-01

    We investigated the spin-valve effect in nano-scale silicon (Si)-based spin-valve devices using a Fe/MgO/Ge spin injector/detector deposited on Si by molecular beam epitaxy. For a device with a 20 nm Si channel, we observed clear magnetoresistance up to 3% at low temperature when a magnetic field was applied in the film plane along the Si channel transport direction. A large spin-dependent output voltage of 20 mV was observed at a bias voltage of 0.9 V at 15 K, which is among the highest values in lateral spin-valve devices reported so far. Furthermore, we observed that the sign of the spin-valve effect is reversed at low temperatures, suggesting the possibility of a spin-blockade effect of defect states in the MgO/Ge tunneling barrier.

  1. THE REPRISAL ATTACKS BY AL-SHABAAB AGAINST KENYA

    Directory of Open Access Journals (Sweden)

    E.O.S.ODHIAMBO

    2013-10-01

    Full Text Available The incursion of Kenya Defence Forces (KDF into Somalia was met by a series of threats from the Al-Shabaab that it would increase the attacks against Kenya if the troops were not withdrawn. The capture of Kismayu by KDF has weakened the nerve of Al-Shabaab but has not eliminated the imminent danger of a substantive terror attack. Since the incursion by KDF, Kenya has succumbed to a sequence of grenade and Improvised Explosive Devices attacks, roadside bombs, landmines and raids by fighters using small arms and light weapons and Rocket Propelled Grenades against Kenyans mostly in North Eastern, Coastal and Nairobi counties, marking the resurgence of terrorism in the country. We argue that Kenya is more vulnerable to Al-Shabaab terrorists attack than before the KDF incursion by citing the frequencies of reprisal attacks from October 2011 to January 2013. Hence, our troops should be withdrawn and deployed within our boundary.

  2. Thwarting Nonintrusive Occupancy Detection Attacks from Smart Meters

    Directory of Open Access Journals (Sweden)

    Dapeng Man

    2017-01-01

    Full Text Available Occupancy information is one of the most important privacy issues of a home. Unfortunately, an attacker is able to detect occupancy from smart meter data. The current battery-based load hiding (BLH methods cannot solve this problem. To thwart occupancy detection attacks, we propose a framework of battery-based schemes to prevent occupancy detection (BPOD. BPOD monitors the power consumption of a home and detects the occupancy in real time. According to the detection result, BPOD modifies those statistical metrics of power consumption, which highly correlate with the occupancy by charging or discharging a battery, creating a delusion that the home is always occupied. We evaluate BPOD in a simulation using several real-world smart meter datasets. Our experiment results show that BPOD effectively prevents the threshold-based and classifier-based occupancy detection attacks. Furthermore, BPOD is also able to prevent nonintrusive appliance load monitoring attacks (NILM as a side-effect of thwarting detection attacks.

  3. Detecting peripheral-based attacks on the host memory

    CERN Document Server

    Stewin, Patrick

    2015-01-01

    This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals generally communicate with the host via the host’s main memory, storing cryptographic keys, passwords, opened files and other sensitive data in the process – an aspect attackers are quick to exploit.  Here, stealthy malicious software based on isolated micro-controllers is implemented to conduct an attack analysis, the results of which provide the basis for developing a novel runtime detector. The detector reveals stealthy peripheral-based attacks on the host’s main memory by exploiting certain hardware properties, while a permanent and resource-efficient measurement strategy ensures that the detector is also capable of detecting transient attacks, which can otherwise succeed when the applied strategy only me...

  4. Spin waves and spin instabilities in quantum plasmas

    OpenAIRE

    Andreev, P. A.; Kuz'menkov, L. S.

    2014-01-01

    We describe main ideas of method of many-particle quantum hydrodynamics allows to derive equations for description of quantum plasma evolution. We also present definitions of collective quantum variables suitable for quantum plasmas. We show that evolution of magnetic moments (spins) in quantum plasmas leads to several new branches of wave dispersion: spin-electromagnetic plasma waves and self-consistent spin waves. Propagation of neutron beams through quantum plasmas is also considered. Inst...

  5. Why cryptography should not rely on physical attack complexity

    CERN Document Server

    Krämer, Juliane

    2015-01-01

    This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two indepe...

  6. Multi-Layer Approach for the Detection of Selective Forwarding Attacks.

    Science.gov (United States)

    Alajmi, Naser; Elleithy, Khaled

    2015-11-19

    Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable.

  7. Multi-Layer Approach for the Detection of Selective Forwarding Attacks

    Directory of Open Access Journals (Sweden)

    Naser Alajmi

    2015-11-01

    Full Text Available Security breaches are a major threat in wireless sensor networks (WSNs. WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD. The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable.

  8. Spin transfer torque with spin diffusion in magnetic tunnel junctions

    KAUST Repository

    Manchon, Aurelien; Matsumoto, R.; Jaffres, H.; Grollier, J.

    2012-01-01

    in the metallic layers. We show that spin diffusion mixes the transverse spin current components and dramatically modifies the bias dependence of the effective spin transfer torque. This leads to a significant linear bias dependence of the out-of-plane torque

  9. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  10. Trojan-horse attacks on quantum-key-distribution systems

    International Nuclear Information System (INIS)

    Gisin, N.; Fasel, S.; Kraus, B.; Zbinden, H.; Ribordy, G.

    2006-01-01

    General Trojan-horse attacks on quantum-key-distribution systems, i.e., attacks on Alice or Bob's system via the quantum channel, are analyzed. We illustrate the power of such attacks with today's technology and conclude that all systems must implement active counter measures. In particular, all systems must include an auxiliary detector that monitors any incoming light. We show that such counter measures can be efficient, provided that enough additional privacy amplification is applied to the data. We present a practical way to reduce the maximal information gain that an adversary can gain using Trojan-horse attacks. This does reduce the security analysis of the two-way plug-and-play implementation to those of the standard one-way systems

  11. Spin transport in nanowires

    OpenAIRE

    Pramanik, S.; bandyopadhyay, S.; Cahay, M.

    2003-01-01

    We study high-field spin transport of electrons in a quasi one-dimensional channel of a $GaAs$ gate controlled spin interferometer (SPINFET) using a semiclassical formalism (spin density matrix evolution coupled with Boltzmann transport equation). Spin dephasing (or depolarization) is predominantly caused by D'yakonov-Perel' relaxation associated with momentum dependent spin orbit coupling effects that arise due to bulk inversion asymmetry (Dresselhaus spin orbit coupling) and structural inve...

  12. 12 CFR 308.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... PRACTICE RULES OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 308.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any...

  13. 12 CFR 19.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 19.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all...

  14. Nuclear spin-lattice relaxation in nitroxide spin-label EPR

    DEFF Research Database (Denmark)

    Marsh, Derek

    2016-01-01

    that the definition of nitrogen nuclear relaxation rate Wn commonly used in the CW-EPR literature for 14N-nitroxyl spin labels is inconsistent with that currently adopted in time-resolved EPR measurements of saturation recovery. Redefinition of the normalised 14N spin-lattice relaxation rate, b = Wn/(2We), preserves...... of spin-lattice relaxation in this three-level system. Expressions for CW-saturation EPR with the revised definitions are summarised. Data on nitrogen nuclear spin-lattice relaxation times are compiled according to the three-level scheme for 14N-relaxation: T1 n = 1/Wn. Results are compared and contrasted...

  15. Drammer : Deterministic Rowhammer attacks on mobile platforms

    NARCIS (Netherlands)

    Van Der Veen, Victor; Fratantonio, Yanick; Lindorfer, Martina; Gruss, Daniel; Maurice, Clémentine; Vigna, Giovanni; Bos, Herbert; Razavi, Kaveh; Giuffrida, Cristiano

    2016-01-01

    Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and completely subvert a system. However, existing efforts either describe probabilistic (and thus unreliable) attacks or rely on special (and often unavailable) memory management features to place victim objects

  16. A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks

    Directory of Open Access Journals (Sweden)

    Yasmin M. Amin

    2016-01-01

    Full Text Available The IEEE 802.15.4 standard has been established as the dominant enabling technology for Wireless Sensor Networks (WSNs. With the proliferation of security-sensitive applications involving WSNs, WSN security has become a topic of great significance. In comparison with traditional wired and wireless networks, WSNs possess additional vulnerabilities which present opportunities for attackers to launch novel and more complicated attacks against such networks. For this reason, a thorough investigation of attacks against WSNs is required. This paper provides a single unified survey that dissects all IEEE 802.15.4 PHY and MAC layer attacks known to date. While the majority of existing references investigate the motive and behavior of each attack separately, this survey classifies the attacks according to clear metrics within the paper and addresses the interrelationships and differences between the attacks following their classification. The authors’ opinions and comments regarding the placement of the attacks within the defined classifications are also provided. A comparative analysis between the classified attacks is then performed with respect to a set of defined evaluation criteria. The first half of this paper addresses attacks on the IEEE 802.15.4 PHY layer, whereas the second half of the paper addresses IEEE 802.15.4 MAC layer attacks.

  17. The accountability problem of flooding attacks in service-oriented architectures

    DEFF Research Database (Denmark)

    Jensen, Meiko; Schwenk, Jörg

    2009-01-01

    The threat of Denial of Service attacks poses a serious problem to the security of network-based services in general. For flooding attacks against service-oriented applications, this threat is dramatically amplified with potentially much higher impact and very little effort on the attacker's side....... Additionally, due to the high distribution of a SOA application's components, fending such attacks becomes a far more complex task. In this paper, we present the problem of accountability, referring to the issue of resolving the attacker in a highly distributed service-oriented application. Using a general...

  18. Application of dynamical systems theory to the high angle of attack dynamics of the F-14

    Science.gov (United States)

    Jahnke, Craig C.; Culick, Fred E. C.

    1990-01-01

    Dynamical systems theory has been used to study the nonlinear dynamics of the F-14. An eight degree of freedom model that does not include the control system present in operational F-14s has been analyzed. The aerodynamic model, supplied by NASA, includes nonlinearities as functions of the angles of attack and sideslip, the rotation rate, and the elevator deflection. A continuation method has been used to calculate the steady states of the F-14 as continuous functions of the control surface deflections. Bifurcations of these steady states have been used to predict the onset of wing rock, spiral divergence, and jump phenomena which cause the aircraft to enter a spin. A simple feedback control system was designed to eliminate the wing rock and spiral divergence instabilities. The predictions were verified with numerical simulations.

  19. Attack Helicopter Operations: Art or Science

    Science.gov (United States)

    1991-05-13

    ATTACK HELICOPTER OPERATIONS: ART OR SCIENCE ? BY LIEUTENANT COLONEL JAN CALLEN United States Army DISTRIBUTION STATEMENT A: Approved for public release...TASK IWORK UNIT ELEMENT NO. NO. NO. ACCESSION NC 11. TITLE (Include Socurity Classification) Attack Helicopter Operations: Art or Science ? 12. PERSONAL...OPERATIONS: ART OR SCIENCE ? AN INDIVIDUAL STUDY PROJECT by Lieutenant Colonel Jan Callen United States Army Colonel Greg Snelgrove Project Adviser U.S

  20. Spin squeezing of atomic ensembles via nuclear-electronic spin entanglement

    DEFF Research Database (Denmark)

    Fernholz, Thomas; Krauter, Hanna; Jensen, Kasper

    2008-01-01

    quantum limit for quantum memory experiments and applications in quantum metrology and is thus a complementary alternative to spin squeezing obtained via inter-atom entanglement. Squeezing of the collective spin is verified by quantum state tomography.......We demonstrate spin squeezing in a room temperature ensemble of 1012 Cesium atoms using their internal structure, where the necessary entanglement is created between nuclear and electronic spins of each individual atom. This state provides improvement in measurement sensitivity beyond the standard...

  1. Attacker Model Lab

    OpenAIRE

    2006-01-01

    tut quiz present Tutorial Quiz Presentation Interactive Media Element This interactive tutorial the two sub-classes of computer attackers: amateurs and professionals. It provides valuable insight into the nature of necessary protection measure for information assets. CS3600 Information Assurance: Introduction to Computer Security Course

  2. Phase transitions and thermal entanglement of the distorted Ising-Heisenberg spin chain: topology of multiple-spin exchange interactions in spin ladders

    Science.gov (United States)

    Arian Zad, Hamid; Ananikian, Nerses

    2017-11-01

    We consider a symmetric spin-1/2 Ising-XXZ double sawtooth spin ladder obtained from distorting a spin chain, with the XXZ interaction between the interstitial Heisenberg dimers (which are connected to the spins based on the legs via an Ising-type interaction), the Ising coupling between nearest-neighbor spins of the legs and rungs spins, respectively, and additional cyclic four-spin exchange (ring exchange) in the square plaquette of each block. The presented analysis supplemented by results of the exact solution of the model with infinite periodic boundary implies a rich ground state phase diagram. As well as the quantum phase transitions, the characteristics of some of the thermodynamic parameters such as heat capacity, magnetization and magnetic susceptibility are investigated. We prove here that among the considered thermodynamic and thermal parameters, solely heat capacity is sensitive versus the changes of the cyclic four-spin exchange interaction. By using the heat capacity function, we obtain a singularity relation between the cyclic four-spin exchange interaction and the exchange coupling between pair spins on each rung of the spin ladder. All thermal and thermodynamic quantities under consideration should be investigated by regarding those points which satisfy the singularity relation. The thermal entanglement within the Heisenberg spin dimers is investigated by using the concurrence, which is calculated from a relevant reduced density operator in the thermodynamic limit.

  3. Evidence for power-law spin-correlation decay from muon spin relaxation in AgMn spin-glass

    International Nuclear Information System (INIS)

    MacLaughlin, D.E.; Gupta, L.C.; Cooke, D.W.; Heffner, R.H.; Leon, M.; Schillaci, M.E.

    1983-01-01

    Muon spin relaxation measurements have been carried out below the ''glass'' temperature T/sub g/ in AgMn spin-glasses. The muon spin-lattice relaxation rate varies with field H as H/sup -0.46plus-or-minus0.05/ for 0.30< or =T/T/sub g/< or =0.66. This suggests that impurity-spin correlations decay with time as t/sup -nu/, νapprox. =0.54 +- 0.05, in contrast to the more usual exponential decay. The present data therefore agree quantitatively with the prediction νapprox. =(1/2) of mean-field dynamic theories

  4. A Secure Localization Approach against Wormhole Attacks Using Distance Consistency

    Directory of Open Access Journals (Sweden)

    Lou Wei

    2010-01-01

    Full Text Available Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or wireless link to another point, and the other relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization and propose a novel distance-consistency-based secure localization scheme against wormhole attacks, which includes three phases of wormhole attack detection, valid locators identification and self-localization. The theoretical model is further formulated to analyze the proposed secure localization scheme. The simulation results validate the theoretical results and also demonstrate the effectiveness of our proposed scheme.

  5. Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication

    Science.gov (United States)

    Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru

    In this paper, we propose password recovery attacks against challenge-response authentication protocols. Our attacks use a message difference for a MD5 collision attack proposed in IEICE 2008. First, we show how to efficiently find a message pair that collides with the above message difference. Second, we show that a password used in authenticated post office protocol (APOP) can be recovered practically. We also show that the password recovery attack can be applied to a session initiation protocol (SIP) and digest authentication. Our attack can recover up to the first 31 password characters in a short time and up to the first 60 characters faster than the naive search method. We have implemented our attack and confirmed that 31 characters can be successfully recovered.

  6. 12 CFR 747.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... INVESTIGATIONS Uniform Rules of Practice and Procedure § 747.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all or any part of an...

  7. Phase-remapping attack in practical quantum-key-distribution systems

    International Nuclear Information System (INIS)

    Fung, Chi-Hang Fred; Qi, Bing; Lo, Hoi-Kwong; Tamaki, Kiyoshi

    2007-01-01

    Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain loopholes that may lead to the generated secret keys being compromised. In this paper, we propose a phase-remapping attack targeting two practical bidirectional QKD systems (the 'plug-and-play' system and the Sagnac system). We showed that if the users of the systems are unaware of our attack, the final key shared between them can be compromised in some situations. Specifically, we showed that, in the case of the Bennett-Brassard 1984 (BB84) protocol with ideal single-photon sources, when the quantum bit error rate (QBER) is between 14.6% and 20%, our attack renders the final key insecure, whereas the same range of QBER values has been proved secure if the two users are unaware of our attack; also, we demonstrated three situations with realistic devices where positive key rates are obtained without the consideration of Trojan horse attacks but in fact no key can be distilled. We remark that our attack is feasible with only current technology. Therefore, it is very important to be aware of our attack in order to ensure absolute security. In finding our attack, we minimize the QBER over individual measurements described by a general POVM, which has some similarity with the standard quantum state discrimination problem

  8. Effectiveness of the Call in Beach Volleyball Attacking Play

    Directory of Open Access Journals (Sweden)

    Künzell Stefan

    2014-12-01

    Full Text Available In beach volleyball the setter has the opportunity to give her or his hitter a “call”. The call intends that the setter suggests to her or his partner where to place the attack in the opponent’s court. The effectiveness of a call is still unknown. We investigated the women’s and men’s Swiss National Beach Volleyball Championships in 2011 and analyzed 2185 attacks. We found large differences between female and male players. While men called in only 38.4% of attacks, women used calls in 85.5% of attacks. If the male players followed a given call, 63% of the attacks were successful. The success rate of attacks without any call was 55.8% and 47.6% when the call was ignored. These differences were not significant (χ2(2 = 4.55, p = 0.103. In women’s beach volleyball, the rate of successful attacks was 61.5% when a call was followed, 35% for attacks without a call, and 42.6% when a call was ignored. The differences were highly significant (χ2(2 = 23.42, p < 0.0005. Taking into account the findings of the present study, we suggested that the call was effective in women’s beach volleyball, while its effect in men’s game was unclear. Considering the quality of calls we indicate that there is a significant potential to increase the effectiveness of a call.

  9. Spin-transfer torque in spin filter tunnel junctions

    KAUST Repository

    Ortiz Pauyac, Christian

    2014-12-08

    Spin-transfer torque in a class of magnetic tunnel junctions with noncollinear magnetizations, referred to as spin filter tunnel junctions, is studied within the tight-binding model using the nonequilibrium Green\\'s function technique within Keldysh formalism. These junctions consist of one ferromagnet (FM) adjacent to a magnetic insulator (MI) or two FM separated by a MI. We find that the presence of the magnetic insulator dramatically enhances the magnitude of the spin-torque components compared to conventional magnetic tunnel junctions. The fieldlike torque is driven by the spin-dependent reflection at the MI/FM interface, which results in a small reduction of its amplitude when an insulating spacer (S) is inserted to decouple MI and FM layers. Meanwhile, the dampinglike torque is dominated by the tunneling electrons that experience the lowest barrier height. We propose a device of the form FM/(S)/MI/(S)/FM that takes advantage of these characteristics and allows for tuning the spin-torque magnitudes over a wide range just by rotation of the magnetization of the insulating layer.

  10. Spin-transfer torque in spin filter tunnel junctions

    KAUST Repository

    Ortiz Pauyac, Christian; Kalitsov, Alan; Manchon, Aurelien; Chshiev, Mairbek

    2014-01-01

    Spin-transfer torque in a class of magnetic tunnel junctions with noncollinear magnetizations, referred to as spin filter tunnel junctions, is studied within the tight-binding model using the nonequilibrium Green's function technique within Keldysh formalism. These junctions consist of one ferromagnet (FM) adjacent to a magnetic insulator (MI) or two FM separated by a MI. We find that the presence of the magnetic insulator dramatically enhances the magnitude of the spin-torque components compared to conventional magnetic tunnel junctions. The fieldlike torque is driven by the spin-dependent reflection at the MI/FM interface, which results in a small reduction of its amplitude when an insulating spacer (S) is inserted to decouple MI and FM layers. Meanwhile, the dampinglike torque is dominated by the tunneling electrons that experience the lowest barrier height. We propose a device of the form FM/(S)/MI/(S)/FM that takes advantage of these characteristics and allows for tuning the spin-torque magnitudes over a wide range just by rotation of the magnetization of the insulating layer.

  11. Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis.

    Science.gov (United States)

    Zhou, Wei; Wen, Junhao; Koh, Yun Sing; Xiong, Qingyu; Gao, Min; Dobbie, Gillian; Alam, Shafiq

    2015-01-01

    Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim' based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks.

  12. Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis

    Science.gov (United States)

    Zhou, Wei; Wen, Junhao; Koh, Yun Sing; Xiong, Qingyu; Gao, Min; Dobbie, Gillian; Alam, Shafiq

    2015-01-01

    Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim’ based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks. PMID:26222882

  13. Max Auwaerter symposium: spin mapping and spin manipulation on the atomic scale

    International Nuclear Information System (INIS)

    Wiesendanger, R.

    2008-01-01

    Full text: A fundamental understanding of magnetic and spin-dependent phenomena requires the determination of spin structures and spin excitations down to the atomic scale. The direct visualization of atomic-scale spin structures has first been accomplished for magnetic metals by combining the atomic resolution capability of Scanning Tunnelling Microscopy (STM) with spin sensitivity, based on vacuum tunnelling of spin-polarized electrons. The resulting technique, Spin-Polarized Scanning Tunnelling Microscopy (SP-STM), nowadays provides unprecedented insight into collinear and non-collinear spin structures at surfaces of magnetic nanostructures and has already led to the discovery of new types of magnetic order at the nanoscale. More recently, the development of subkelvin SP-STM has allowed studies of ground-state magnetic properties of individual magnetic adatoms on non-magnetic substrates as well as the magnetic interactions between them. Based on SP-STM experiments performed at temperatures of 300 mK, indirect magnetic exchange interactions at the sub-milli-electronvolt energy scale between individual paramagnetic adatoms as well as between adatoms and nearby magnetic nanostructures could directly be revealed in real space up to distances of several nanometers. In both cases we have observed an oscillatory behavior of the magnetic exchange coupling, alternating between ferromagnetic and antiferromagnetic, as a function of distance. Moreover, the detection of spin-dependent exchange and correlation forces has allowed a first direct real-space observation of spin structures at surfaces of antiferromagnetic insulators. This new type of scanning probe microscopy, called Magnetic Exchange Force Microscopy (MExFM), offers a powerful new tool to investigate different types of spin-spin interactions based on direct-, super-, or RKKY-type exchange down to the atomic level. By combining MExFM with high-precision measurements of damping forces, localized or confined spin

  14. Collaborative Attack Mitigation and Response: A survey

    NARCIS (Netherlands)

    Steinberger, Jessica; Sperotto, Anna; Baier, Harald; Pras, Aiko

    2015-01-01

    Over recent years, network-based attacks have become to one of the top causes of network infrastructure and service outages. To counteract a network-based attack, an approach is to move mitigation from the target network to the networks of Internet Service Providers (ISP). However, it remains

  15. A Unique Fatal Moose Attack Mimicking Homicide.

    Science.gov (United States)

    Gudmannsson, Petur; Berge, Johan; Druid, Henrik; Ericsson, Göran; Eriksson, Anders

    2018-03-01

    Fatalities caused by animal attacks are rare, but have the potential to mimic homicide. We present a case in which a moose attacked and killed a woman who was walking her dog in a forest. Autopsy showed widespread blunt trauma with a large laceration on one leg in which blades of grass were embedded. Flail chest was the cause of death. The case was initially conceived as homicide by means of a riding lawn mower. A review of the case by moose experts and analyses of biological trace material that proved to originate from moose, established the true source of injury. The dog probably provoked a moose, which, in response, stomped and gored the victim to death. The injuries resembled those previously reported from attacks by cattle and water buffalo. Fatal moose attacks constitute an extremely rare threat in boreal areas, but can be considered in traumatic deaths of unknown cause. © 2017 American Academy of Forensic Sciences.

  16. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  17. Role of spin mixing conductance in spin pumping: Enhancement of spin pumping efficiency in Ta/Cu/Py structures

    Energy Technology Data Exchange (ETDEWEB)

    Deorani, Praveen; Yang, Hyunsoo, E-mail: eleyang@nus.edu.sg [Department of Electrical and Computer Engineering, National University of Singapore, 117576 Singapore (Singapore)

    2013-12-02

    From spin pumping measurements in Ta/Py devices for different thicknesses of Ta, we determine the spin Hall angle to be 0.021–0.033 and spin diffusion length to be 8 nm in Ta. We have also studied the effect of changing the properties of non-magnet/ferromagnet interface by adding a Cu interlayer. The experimental results show that the effective spin mixing conductance increases in the presence of Cu interlayer for Ta/Cu/Py devices whereas it decreases in Pt/Cu/Py devices. Our findings allow the tunability of the spin pumping efficiency by adding a thin interlayer at the non-magnet/ferromagnet interface.

  18. PREFACE: Spin Electronics

    Science.gov (United States)

    Dieny, B.; Sousa, R.; Prejbeanu, L.

    2007-04-01

    Conventional electronics has in the past ignored the spin on the electron, however things began to change in 1988 with the discovery of giant magnetoresistance in metallic thin film stacks which led to the development of a new research area, so called spin-electronics. In the last 10 years, spin-electronics has achieved a number of breakthroughs from the point of view of both basic science and application. Materials research has led to several major discoveries: very large tunnel magnetoresistance effects in tunnel junctions with crystalline barriers due to a new spin-filtering mechanism associated with the spin-dependent symmetry of the electron wave functions new magnetic tunnelling barriers leading to spin-dependent tunnelling barrier heights and acting as spin-filters magnetic semiconductors with increasingly high ordering temperature. New phenomena have been predicted and observed: the possibility of acting on the magnetization of a magnetic nanostructure with a spin-polarized current. This effect, due to a transfer of angular momentum between the spin polarized conduction electrons and the local magnetization, can be viewed as the reciprocal of giant or tunnel magnetoresistance. It can be used to switch the magnetization of a magnetic nanostructure or to generate steady magnetic excitations in the system. the possibility of generating and manipulating spin current without charge current by creating non-equilibrium local accumulation of spin up or spin down electrons. The range of applications of spin electronics materials and phenomena is expanding: the first devices based on giant magnetoresistance were the magnetoresistive read-heads for computer disk drives. These heads, introduced in 1998 with current-in plane spin-valves, have evolved towards low resistance tunnel magnetoresistice heads in 2005. Besides magnetic recording technology, these very sensitive magnetoresistive sensors are finding applications in other areas, in particular in biology. magnetic

  19. Changes in vestibular evoked myogenic potentials after Meniere attacks.

    Science.gov (United States)

    Kuo, Shih-Wei; Yang, Ting-Hua; Young, Yi-Ho

    2005-09-01

    The aim of this study was to apply videonystagmography (VNG) and vestibular evoked myogenic potential (VEMP) tests to patients with Meniere attacks, to explore the mechanics of where saccular disorders may affect the semicircular canals. From January 2001 to December 2003, 12 consecutive patients with unilateral definite Meniere's disease with vertiginous attacks underwent VNG for recording spontaneous nystagmus, as well as VEMP tests. At the very beginning of the Meniere attack, the spontaneous nystagmus beat toward the lesion side in 5 patients (42%) and toward the healthy side in 7 patients (58%). Twenty-four hours later, only 6 patients (50%) showed spontaneous nystagmus beating toward the healthy side. Nevertheless, spontaneous nystagmus subsided in all patients within 48 hours. The VEMP test was performed within 24 hours of a Meniere attack; the VEMPs were normal in 4 patients and abnormal in 8 patients (67%). After 48 hours, 4 patients with initially abnormal VEMPs had resolution and return to normal VEMPs, and the other 4 patients still had absent VEMPs. Most patients (67%) with Meniere attacks revealed abnormal VEMPs, indicating that the saccule participates in a Meniere attack. This is an important idea that stimulates consideration of the mechanism of Meniere attacks.

  20. Possible evidence for spin-transfer torque induced by spin-triplet supercurrent

    KAUST Repository

    Li, Lailai; Zhao, Yuelei; Zhang, Xixiang; Sun, Young

    2017-01-01

    Cooper pairs in superconductors are normally spin singlet. Nevertheless, recent studies suggest that spin-triplet Cooper pairs can be created at carefully engineered superconductor-ferromagnet interfaces. If Cooper pairs are spin

  1. Spin Coherence in Semiconductor Nanostructures

    National Research Council Canada - National Science Library

    Flatte, Michael E

    2006-01-01

    ... dots, tuning of spin coherence times for electron spin, tuning of dipolar magnetic fields for nuclear spin, spontaneous spin polarization generation and new designs for spin-based teleportation and spin transistors...

  2. Spin-orbit torques from interfacial spin-orbit coupling for various interfaces

    Science.gov (United States)

    Kim, Kyoung-Whan; Lee, Kyung-Jin; Sinova, Jairo; Lee, Hyun-Woo; Stiles, M. D.

    2017-09-01

    We use a perturbative approach to study the effects of interfacial spin-orbit coupling in magnetic multilayers by treating the two-dimensional Rashba model in a fully three-dimensional description of electron transport near an interface. This formalism provides a compact analytic expression for current-induced spin-orbit torques in terms of unperturbed scattering coefficients, allowing computation of spin-orbit torques for various contexts, by simply substituting scattering coefficients into the formulas. It applies to calculations of spin-orbit torques for magnetic bilayers with bulk magnetism, those with interface magnetism, a normal-metal/ferromagnetic insulator junction, and a topological insulator/ferromagnet junction. It predicts a dampinglike component of spin-orbit torque that is distinct from any intrinsic contribution or those that arise from particular spin relaxation mechanisms. We discuss the effects of proximity-induced magnetism and insertion of an additional layer and provide formulas for in-plane current, which is induced by a perpendicular bias, anisotropic magnetoresistance, and spin memory loss in the same formalism.

  3. High frequency spin torque oscillators with composite free layer spin valve

    International Nuclear Information System (INIS)

    Natarajan, Kanimozhi; Arumugam, Brinda; Rajamani, Amuda

    2016-01-01

    We report the oscillations of magnetic spin components in a composite free layer spin valve. The associated Landau–Lifshitz–Gilbert–Slonczewski (LLGS) equation is studied by stereographically projecting the spin on to a complex plane and the spin components were found. A fourth order Runge–Kutta numerical integration on LLGS equation also confirms the similar trajectories of the spin components. This study establishes the possibility of a Spin Torque Oscillator in a composite free layer spin valve, where the exchange coupling is ferromagnetic in nature. In-plane and out-of-plane precessional modes of magnetization oscillations were found in zero applied magnetic field and the frequencies of the oscillations were calculated from Fast Fourier Transform of the components of magnetization. Behavior of Power Spectral Density for a range of current density is studied. Finally our analysis shows the occurrence of highest frequency 150 GHz, which is in the second harmonics for the specific choice of system parameters.

  4. High frequency spin torque oscillators with composite free layer spin valve

    Energy Technology Data Exchange (ETDEWEB)

    Natarajan, Kanimozhi; Arumugam, Brinda; Rajamani, Amuda

    2016-07-15

    We report the oscillations of magnetic spin components in a composite free layer spin valve. The associated Landau–Lifshitz–Gilbert–Slonczewski (LLGS) equation is studied by stereographically projecting the spin on to a complex plane and the spin components were found. A fourth order Runge–Kutta numerical integration on LLGS equation also confirms the similar trajectories of the spin components. This study establishes the possibility of a Spin Torque Oscillator in a composite free layer spin valve, where the exchange coupling is ferromagnetic in nature. In-plane and out-of-plane precessional modes of magnetization oscillations were found in zero applied magnetic field and the frequencies of the oscillations were calculated from Fast Fourier Transform of the components of magnetization. Behavior of Power Spectral Density for a range of current density is studied. Finally our analysis shows the occurrence of highest frequency 150 GHz, which is in the second harmonics for the specific choice of system parameters.

  5. Messaging Attacks on Android: Vulnerabilities and Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Khodor Hamandi

    2015-01-01

    Full Text Available Currently, Android is the leading mobile operating system in number of users worldwide. On the security side, Android has had significant challenges despite the efforts of the Android designers to provide a secure environment for apps. In this paper, we present numerous attacks targeting the messaging framework of the Android system. Our focus is on SMS, USSD, and the evolution of their associated security in Android and accordingly the development of related attacks. Also, we shed light on the Android elements that are responsible for these attacks. Furthermore, we present the architecture of an intrusion detection system (IDS that promises to thwart SMS messaging attacks. Our IDS shows a detection rate of 87.50% with zero false positives.

  6. Spin glasses

    CERN Document Server

    Bovier, Anton

    2007-01-01

    Spin glass theory is going through a stunning period of progress while finding exciting new applications in areas beyond theoretical physics, in particular in combinatorics and computer science. This collection of state-of-the-art review papers written by leading experts in the field covers the topic from a wide variety of angles. The topics covered are mean field spin glasses, including a pedagogical account of Talagrand's proof of the Parisi solution, short range spin glasses, emphasizing the open problem of the relevance of the mean-field theory for lattice models, and the dynamics of spin glasses, in particular the problem of ageing in mean field models. The book will serve as a concise introduction to the state of the art of spin glass theory, usefull to both graduate students and young researchers, as well as to anyone curious to know what is going on in this exciting area of mathematical physics.

  7. Calculation of nuclear spin-spin coupling constants using frozen density embedding

    Energy Technology Data Exchange (ETDEWEB)

    Götz, Andreas W., E-mail: agoetz@sdsc.edu [San Diego Supercomputer Center, University of California San Diego, 9500 Gilman Dr MC 0505, La Jolla, California 92093-0505 (United States); Autschbach, Jochen [Department of Chemistry, University at Buffalo, State University of New York, Buffalo, New York 14260-3000 (United States); Visscher, Lucas, E-mail: visscher@chem.vu.nl [Amsterdam Center for Multiscale Modeling (ACMM), VU University Amsterdam, Theoretical Chemistry, De Boelelaan 1083, 1081 HV Amsterdam (Netherlands)

    2014-03-14

    We present a method for a subsystem-based calculation of indirect nuclear spin-spin coupling tensors within the framework of current-spin-density-functional theory. Our approach is based on the frozen-density embedding scheme within density-functional theory and extends a previously reported subsystem-based approach for the calculation of nuclear magnetic resonance shielding tensors to magnetic fields which couple not only to orbital but also spin degrees of freedom. This leads to a formulation in which the electron density, the induced paramagnetic current, and the induced spin-magnetization density are calculated separately for the individual subsystems. This is particularly useful for the inclusion of environmental effects in the calculation of nuclear spin-spin coupling constants. Neglecting the induced paramagnetic current and spin-magnetization density in the environment due to the magnetic moments of the coupled nuclei leads to a very efficient method in which the computationally expensive response calculation has to be performed only for the subsystem of interest. We show that this approach leads to very good results for the calculation of solvent-induced shifts of nuclear spin-spin coupling constants in hydrogen-bonded systems. Also for systems with stronger interactions, frozen-density embedding performs remarkably well, given the approximate nature of currently available functionals for the non-additive kinetic energy. As an example we show results for methylmercury halides which exhibit an exceptionally large shift of the one-bond coupling constants between {sup 199}Hg and {sup 13}C upon coordination of dimethylsulfoxide solvent molecules.

  8. Defending networks against denial-of-service attacks

    Science.gov (United States)

    Gelenbe, Erol; Gellman, Michael; Loukas, George

    2004-11-01

    Denial of service attacks, viruses and worms are common tools for malicious adversarial behavior in networks. Experience shows that over the last few years several of these techniques have probably been used by governments to impair the Internet communications of various entities, and we can expect that these and other information warfare tools will be used increasingly as part of hostile behavior either independently, or in conjunction with other forms of attack in conventional or asymmetric warfare, as well as in other forms of malicious behavior. In this paper we concentrate on Distributed Denial of Service Attacks (DDoS) where one or more attackers generate flooding traffic and direct it from multiple sources towards a set of selected nodes or IP addresses in the Internet. We first briefly survey the literature on the subject, and discuss some examples of DDoS incidents. We then present a technique that can be used for DDoS protection based on creating islands of protection around a critical information infrastructure. This technique, that we call the CPN-DoS-DT (Cognitive Packet Networks DoS Defence Technique), creates a self-monitoring sub-network surrounding each critical infrastructure node. CPN-DoS-DT is triggered by a DDoS detection scheme, and generates control traffic from the objects of the DDoS attack to the islands of protection where DDOS packet flows are destroyed before they reach the critical infrastructure. We use mathematical modelling, simulation and experiments on our test-bed to show the positive and negative outcomes that may result from both the attack, and the CPN-DoS-DT protection mechanism, due to imperfect detection and false alarms.

  9. Rotary balance data for a typical single-engine general aviation design for an angle-of-attack range of 8 deg to 90 deg. 2: High-wing model A

    Science.gov (United States)

    Mulcay, W.; Rose, R.

    1979-01-01

    Aerodynamic characteristics obtained in a rotational flow environment utilizing a rotary balance located in the Langley spin tunnel are presented in plotted form for a 1/5-scale, single-engine, high-wing, general aviation airplane model. The configurations tested included various tail designs and fuselage shapes. Data are presented without analysis for an angle of attack range of 8 to 90 degrees and clockwise and counter-clockwise rotations covering an Omega b/2 v range from 0 to 0.85.

  10. Quantum spin correction scheme based on spin-correlation functional for Kohn-Sham spin density functional theory

    International Nuclear Information System (INIS)

    Yamanaka, Shusuke; Takeda, Ryo; Nakata, Kazuto; Takada, Toshikazu; Shoji, Mitsuo; Kitagawa, Yasutaka; Yamaguchi, Kizashi

    2007-01-01

    We present a simple quantum correction scheme for ab initio Kohn-Sham spin density functional theory (KS-SDFT). This scheme is based on a mapping from ab initio results to a Heisenberg model Hamiltonian. The effective exchange integral is estimated by using energies and spin correlation functionals calculated by ab initio KS-SDFT. The quantum-corrected spin-correlation functional is open to be designed to cover specific quantum spin fluctuations. In this article, we present a simple correction for dinuclear compounds having multiple bonds. The computational results are discussed in relation to multireference (MR) DFT, by which we treat the quantum many-body effects explicitly

  11. Charge and Spin Transport in Spin-orbit Coupled and Topological Systems

    KAUST Repository

    Ndiaye, Papa Birame

    2017-10-31

    In the search for low power operation of microelectronic devices, spin-based solutions have attracted undeniable increasing interest due to their intrinsic magnetic nonvolatility. The ability to electrically manipulate the magnetic order using spin-orbit interaction, associated with the recent emergence of topological spintronics with its promise of highly efficient charge-to-spin conversion in solid state, offer alluring opportunities in terms of system design. Although the related technology is still at its infancy, this thesis intends to contribute to this engaging field by investigating the nature of the charge and spin transport in spin-orbit coupled and topological systems using quantum transport methods. We identified three promising building blocks for next-generation technology, three classes of systems that possibly enhance the spin and charge transport efficiency: (i)- topological insulators, (ii)- spin-orbit coupled magnonic systems, (iii)- topological magnetic textures (skyrmions and 3Q magnetic state). Chapter 2 reviews the basics and essential concepts used throughout the thesis: the spin-orbit coupling, the mathematical notion of topology and its importance in condensed matter physics, then topological magnetism and a zest of magnonics. In Chapter 3, we study the spin-orbit torques at the magnetized interfaces of 3D topological insulators. We demonstrated that their peculiar form, compared to other spin-orbit torques, have important repercussions in terms of magnetization reversal, charge pumping and anisotropic damping. In Chapter 4, we showed that the interplay between magnon current jm and magnetization m in homogeneous ferromagnets with Dzyaloshinskii-Moriya (DM) interaction, produces a field-like torque as well as a damping-like torque. These DM torques mediated by spin wave can tilt the imeaveraged magnetization direction and are similar to Rashba torques for electronic systems. Moreover, the DM torque is more efficient when magnons are

  12. Dynamic nuclear spin polarization

    Energy Technology Data Exchange (ETDEWEB)

    Stuhrmann, H B [GKSS-Forschungszentrum Geesthacht GmbH (Germany)

    1996-11-01

    Polarized neutron scattering from dynamic polarized targets has been applied to various hydrogenous materials at different laboratories. In situ structures of macromolecular components have been determined by nuclear spin contrast variation with an unprecedented precision. The experiments of selective nuclear spin depolarisation not only opened a new dimension to structural studies but also revealed phenomena related to propagation of nuclear spin polarization and the interplay of nuclear polarisation with the electronic spin system. The observation of electron spin label dependent nuclear spin polarisation domains by NMR and polarized neutron scattering opens a way to generalize the method of nuclear spin contrast variation and most importantly it avoids precontrasting by specific deuteration. It also likely might tell us more about the mechanism of dynamic nuclear spin polarisation. (author) 4 figs., refs.

  13. Nuclear spin polarized H and D by means of spin-exchange optical pumping

    Science.gov (United States)

    Stenger, Jörn; Grosshauser, Carsten; Kilian, Wolfgang; Nagengast, Wolfgang; Ranzenberger, Bernd; Rith, Klaus; Schmidt, Frank

    1998-01-01

    Optically pumped spin-exchange sources for polarized hydrogen and deuterium atoms have been demonstrated to yield high atomic flow and high electron spin polarization. For maximum nuclear polarization the source has to be operated in spin temperature equilibrium, which has already been demonstrated for hydrogen. In spin temperature equilibrium the nuclear spin polarization PI equals the electron spin polarization PS for hydrogen and is even larger than PS for deuterium. We discuss the general properties of spin temperature equilibrium for a sample of deuterium atoms. One result are the equations PI=4PS/(3+PS2) and Pzz=PSṡPI, where Pzz is the nuclear tensor polarization. Furthermore we demonstrate that the deuterium atoms from our source are in spin temperature equilibrium within the experimental accuracy.

  14. Spin-Dependent Transport through Chiral Molecules Studied by Spin-Dependent Electrochemistry

    Science.gov (United States)

    2016-01-01

    Conspectus Molecular spintronics (spin + electronics), which aims to exploit both the spin degree of freedom and the electron charge in molecular devices, has recently received massive attention. Our recent experiments on molecular spintronics employ chiral molecules which have the unexpected property of acting as spin filters, by way of an effect we call “chiral-induced spin selectivity” (CISS). In this Account, we discuss new types of spin-dependent electrochemistry measurements and their use to probe the spin-dependent charge transport properties of nonmagnetic chiral conductive polymers and biomolecules, such as oligopeptides, L/D cysteine, cytochrome c, bacteriorhodopsin (bR), and oligopeptide-CdSe nanoparticles (NPs) hybrid structures. Spin-dependent electrochemical measurements were carried out by employing ferromagnetic electrodes modified with chiral molecules used as the working electrode. Redox probes were used either in solution or when directly attached to the ferromagnetic electrodes. During the electrochemical measurements, the ferromagnetic electrode was magnetized either with its magnetic moment pointing “UP” or “DOWN” using a permanent magnet (H = 0.5 T), placed underneath the chemically modified ferromagnetic electrodes. The spin polarization of the current was found to be in the range of 5–30%, even in the case of small chiral molecules. Chiral films of the l- and d-cysteine tethered with a redox-active dye, toludin blue O, show spin polarizarion that depends on the chirality. Because the nickel electrodes are susceptible to corrosion, we explored the effect of coating them with a thin gold overlayer. The effect of the gold layer on the spin polarization of the electrons ejected from the electrode was investigated. In addition, the role of the structure of the protein on the spin selective transport was also studied as a function of bias voltage and the effect of protein denaturation was revealed. In addition to

  15. Performance Improvement of Power Analysis Attacks on AES with Encryption-Related Signals

    Science.gov (United States)

    Lee, You-Seok; Lee, Young-Jun; Han, Dong-Guk; Kim, Ho-Won; Kim, Hyoung-Nam

    A power analysis attack is a well-known side-channel attack but the efficiency of the attack is frequently degraded by the existence of power components, irrelative to the encryption included in signals used for the attack. To enhance the performance of the power analysis attack, we propose a preprocessing method based on extracting encryption-related parts from the measured power signals. Experimental results show that the attacks with the preprocessed signals detect correct keys with much fewer signals, compared to the conventional power analysis attacks.

  16. Spin relaxation in quantum dots: Role of the phonon modulated spin-orbit interaction

    Science.gov (United States)

    Alcalde, A. M.; Romano, C. L.; Sanz, L.; Marques, G. E.

    2010-01-01

    We calculate the spin relaxation rates in a parabolic InSb quantum dots due to the spin interaction with acoustical phonons. We considered the deformation potential mechanism as the dominant electron-phonon coupling in the Pavlov-Firsov spin-phonon Hamiltonian. We analyze the behavior of the spin relaxation rates as a function of an external magnetic field and mean quantum dot radius. Effects of the spin admixture due to Dresselhaus contribution to spin-orbit interaction are also discussed.

  17. Mass casualty response in the 2008 Mumbai terrorist attacks.

    Science.gov (United States)

    Roy, Nobhojit; Kapil, Vikas; Subbarao, Italo; Ashkenazi, Isaac

    2011-12-01

    The November 26-29, 2008, terrorist attacks on Mumbai were unique in its international media attention, multiple strategies of attack, and the disproportionate national fear they triggered. Everyone was a target: random members of the general population, iconic targets, and foreigners alike were under attack by the terrorists. A retrospective, descriptive study of the distribution of terror victims to various city hospitals, critical radius, surge capacity, and the nature of specialized medical interventions was gathered through police, legal reports, and interviews with key informants. Among the 172 killed and 304 injured people, about four-fifths were men (average age, 33 years) and 12% were foreign nationals. The case-fatality ratio for this event was 2.75:1, and the mortality rate among those who were critically injured was 12%. A total of 38.5% of patients arriving at the hospitals required major surgical intervention. Emergency surgical operations were mainly orthopedic (external fixation for compound fractures) and general surgical interventions (abdominal explorations for penetrating bullet/shrapnel injuries). The use of heavy-duty automatic weapons, explosives, hostages, and arson in these terrorist attacks alerts us to new challenges to medical counterterrorism response. The need for building central medical control for a coordinated response and for strengthening public hospital capacity are lessons learned for future attacks. These particular terrorist attacks had global consequences, in terms of increased security checks and alerts for and fears of further similar "Mumbai-style" attacks. The resilience of the citizens of Mumbai is a critical measure of the long-term effects of terror attacks.

  18. 1994 Attack Team Workshop: Phase II - Full-Scale Offensive Fog Attack Tests

    National Research Council Canada - National Science Library

    Scheffey, Joseph

    1997-01-01

    .... This report demonstrates the benefits of using a medium angle fog stream to control the overhead fire threat when conducting a direct attack on a growing/steady state fire where the sea of the fire is obstructed...

  19. Network overload due to massive attacks

    Science.gov (United States)

    Kornbluth, Yosef; Barach, Gilad; Tuchman, Yaakov; Kadish, Benjamin; Cwilich, Gabriel; Buldyrev, Sergey V.

    2018-05-01

    We study the cascading failure of networks due to overload, using the betweenness centrality of a node as the measure of its load following the Motter and Lai model. We study the fraction of survived nodes at the end of the cascade pf as a function of the strength of the initial attack, measured by the fraction of nodes p that survive the initial attack for different values of tolerance α in random regular and Erdös-Renyi graphs. We find the existence of a first-order phase-transition line pt(α ) on a p -α plane, such that if p pt , pf is large and the giant component of the network is still present. Exactly at pt, the function pf(p ) undergoes a first-order discontinuity. We find that the line pt(α ) ends at a critical point (pc,αc) , in which the cascading failures are replaced by a second-order percolation transition. We find analytically the average betweenness of nodes with different degrees before and after the initial attack, we investigate their roles in the cascading failures, and we find a lower bound for pt(α ) . We also study the difference between localized and random attacks.

  20. Novel mechanism of network protection against the new generation of cyber attacks

    Science.gov (United States)

    Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit

    2012-06-01

    A new intelligent mechanism is presented to protect networks against the new generation of cyber attacks. This mechanism integrates TCP/UDP/IP protocol stack protection and attacker/intruder deception to eliminate existing TCP/UDP/IP protocol stack vulnerabilities. It allows to detect currently undetectable, highly distributed, low-frequency attacks such as distributed denial-of-service (DDoS) attacks, coordinated attacks, botnet, and stealth network reconnaissance. The mechanism also allows insulating attacker/intruder from the network and redirecting the attack to a simulated network acting as a decoy. As a result, network security personnel gain sufficient time to defend the network and collect the attack information. The presented approach can be incorporated into wireless or wired networks that require protection against known and the new generation of cyber attacks.