WorldWideScience

Sample records for sites prevents attack

  1. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  2. Iran the aerial defense facing a preventive attack against the nuclear sites

    International Nuclear Information System (INIS)

    Gruselle, B.; Payre, G.

    2006-01-01

    In the context of the nuclear uranium enrichment program development facing the international opinion, the author discusses the Iran policy of implementing a defense against an aerial attack. Even with the modernization of its anti-aerial defense, the Iran will cannot support an aerial american campaign, precise and long. (A.L.B.)

  3. Iran the aerial defense facing a preventive attack against the nuclear sites; Iran la defense aerienne face a une attaque preventive contre ses sites nucleaires

    Energy Technology Data Exchange (ETDEWEB)

    Gruselle, B.; Payre, G

    2006-01-15

    In the context of the nuclear uranium enrichment program development facing the international opinion, the author discusses the Iran policy of implementing a defense against an aerial attack. Even with the modernization of its anti-aerial defense, the Iran will cannot support an aerial american campaign, precise and long. (A.L.B.)

  4. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  5. Cross-site Scripting Attacks on Android WebView

    OpenAIRE

    Bhavani A B

    2013-01-01

    WebView is an essential component in Android and iOS. It enables applications to display content from on-line resources. It simplifies task of performing a network request, parsing the data and rendering it. WebView uses a number of APIs which can interact with the web contents inside WebView. In the current paper, Cross-site scripting attacks or XSS attacks specific to Android WebView are discussed. Cross site scripting (XSS) is a type of vulnerability commonly found in web applications. Thi...

  6. Understanding public confidence in government to prevent terrorist attacks.

    Energy Technology Data Exchange (ETDEWEB)

    Baldwin, T. E.; Ramaprasad, A,; Samsa, M. E.; Decision and Information Sciences; Univ. of Illinois at Chicago

    2008-04-02

    A primary goal of terrorism is to instill a sense of fear and vulnerability in a population and to erode its confidence in government and law enforcement agencies to protect citizens against future attacks. In recognition of its importance, the Department of Homeland Security includes public confidence as one of the principal metrics used to assess the consequences of terrorist attacks. Hence, a detailed understanding of the variations in public confidence among individuals, terrorist event types, and as a function of time is critical to developing this metric. In this exploratory study, a questionnaire was designed, tested, and administered to small groups of individuals to measure public confidence in the ability of federal, state, and local governments and their public safety agencies to prevent acts of terrorism. Data was collected from three groups before and after they watched mock television news broadcasts portraying a smallpox attack, a series of suicide bomber attacks, a refinery explosion attack, and cyber intrusions on financial institutions, resulting in identity theft. Our findings are: (a) although the aggregate confidence level is low, there are optimists and pessimists; (b) the subjects are discriminating in interpreting the nature of a terrorist attack, the time horizon, and its impact; (c) confidence recovery after a terrorist event has an incubation period; and (d) the patterns of recovery of confidence of the optimists and the pessimists are different. These findings can affect the strategy and policies to manage public confidence after a terrorist event.

  7. Quick Reference: Cyber Attacks Awareness and Prevention Method for Home Users

    OpenAIRE

    Haydar Teymourlouei

    2015-01-01

    It is important to take security measures to protect your computer information, reduce identify theft, and prevent from malicious cyber-attacks. With cyber-attacks on the continuous rise, people need to understand and learn ways to prevent from these attacks. Cyber-attack is an important factor to be considered if one is to be able to protect oneself from malicious attacks. Without proper security measures, most computer technology would hinder home users more than such t...

  8. A self-confirming engine for preventing man-in-the-middle attack

    OpenAIRE

    Kanamori, Masataka; Kobayashi, Takashi; Yamaguchi, Suguru

    2004-01-01

    In this paper, we focus on how to correct address mapping violation, in which an attacker rewrites the address mapping table of a victim to perform a Man-in-the-Middle (MITM) attack. We propose a technique for preventing MITM attacks in which a malicious user intercepts and possibly alters the data transmitted between two hosts. MITM attack is hard for legitimate users to notice during their normal communication, because each user believes they are communicating directly. Address mapping viol...

  9. SiC: An Agent Based Architecture for Preventing and Detecting Attacks to Ubiquitous Databases

    OpenAIRE

    Pinzón, Cristian; de Paz Santana, Yanira; Bajo Pérez, Javier; Abraham, Ajith P.; Corchado Rodríguez, Juan M.

    2009-01-01

    One of the main attacks to ubiquitous databases is the structure query language (SQL) injection attack, which causes severe damages both in the commercial aspect and in the user’s confidence. This chapter proposes the SiC architecture as a solution to the SQL injection attack problem. This is a hierarchical distributed multiagent architecture, which involves an entirely new approach with respect to existing architectures for the prevention and detection of SQL injections. SiC incorporates a k...

  10. ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention

    Energy Technology Data Exchange (ETDEWEB)

    Cui, Xiaohui [ORNL; Beaver, Justin M [ORNL; Treadwell, Jim N [ORNL

    2012-01-01

    The ShadowNet infrastructure for insider cyber attack prevention is comprised of a tiered server system that is able to dynamically redirect dangerous/suspicious network traffic away from production servers that provide web, ftp, database and other vital services to cloned virtual machines in a quarantined environment. This is done transparently from the point of view of both the attacker and normal users. Existing connections, such as SSH sessions, are not interrupted. Any malicious activity performed by the attacker on a quarantined server is not reflected on the production server. The attacker is provided services from the quarantined server, which creates the impression that the attacks performed are successful. The activities of the attacker on the quarantined system are able to be recorded much like a honeypot system for forensic analysis.

  11. A SURVEY ON DELAY AND NEIGHBOR NODE MONITORING BASED WORMHOLE ATTACK PREVENTION AND DETECTION

    Directory of Open Access Journals (Sweden)

    Sudhir T Bagade

    2016-12-01

    Full Text Available In Mobile Ad-hoc Networks (MANET, network layer attacks, for example wormhole attacks, disrupt the network routing operations and can be used for data theft. Wormhole attacks are of two types: hidden and exposed wormhole. There are various mechanisms in literature which are used to prevent and detect wormhole attacks. In this paper, we survey wormhole prevention and detection techniques and present our critical observations for each. These techniques are based on cryptographic mechanisms, monitoring of packet transmission delay and control packet forwarding behavior of neighbor nodes. We compare the techniques using the following criteria- extra resources needed applicability to different network topologies and routing protocols, prevention/detection capability, etc. We conclude the paper with potential research directions.

  12. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method.

    Science.gov (United States)

    Dhamodharan, Udaya Suriya Raj Kumar; Vayanaperumal, Rajamani

    2015-01-01

    Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method) with MAP (message authentication and passing) for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting.

  13. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method

    Directory of Open Access Journals (Sweden)

    Udaya Suriya Raj Kumar Dhamodharan

    2015-01-01

    Full Text Available Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method with MAP (message authentication and passing for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting.

  14. Review Of Prevention Techniques For Denial Of Service DOS Attacks In Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Poonam Rolla

    2015-08-01

    Full Text Available Wireless Sensor Networks comprised of several tiny sensor nodes which are densely deployed over the region to monitor the environmental conditions. These sensor nodes have certain design issues out of which security is the main predominant factor as it effects the whole lifetime of network. DDoS Distributed denial of service attack floods unnecessary packets in the sensor network. A review on DDoS attacks and their prevention techniques have been done in this paper.

  15. Executive summary, Hanford Site Pollution Prevention Plan

    International Nuclear Information System (INIS)

    1992-08-01

    A pollution prevention plan is an organized, comprehensive, and continual effort to systematically reduce waste generation. The Hanford Site Pollution Prevention Plan is designed to eliminate or minimize pollutant releases to all environmental media from all aspects of Site operations. These efforts offer increased protection of public health and the environment. This plan reflects the goals and policies for pollution prevention at the Hanford Site and represents an ongoing effort to make pollution prevention part of the Site operating philosophy. The plan encompasses hazardous waste only and excludes radioactive waste and radioactive mixed waste

  16. Improving Strategies to Prevent and Prepare for Radiological Attack

    Science.gov (United States)

    2010-03-01

    minimum 0.75% of available grant funding. Additionally, American Samoa, Guam, the Northern Mariana Islands, and the U.S. Virgin Islands each receive a...and Florida offer tax holidays on hurricane readiness supplies. The government should consider additional incentives to promote readiness. One...Taxation. “May Sales Tax Holiday : Hurricane and Emergency Preparedness Equipment.” Virginia Department of Taxation Web site http://www.tax.virginia.gov

  17. Robust Structural Analysis and Design of Distributed Control Systems to Prevent Zero Dynamics Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Weerakkody, Sean [Carnegie Mellon Univ., Pittsburgh, PA (United States); Liu, Xiaofei [Carnegie Mellon Univ., Pittsburgh, PA (United States); Sinopoli, Bruno [Carnegie Mellon Univ., Pittsburgh, PA (United States)

    2017-12-12

    We consider the design and analysis of robust distributed control systems (DCSs) to ensure the detection of integrity attacks. DCSs are often managed by independent agents and are implemented using a diverse set of sensors and controllers. However, the heterogeneous nature of DCSs along with their scale leave such systems vulnerable to adversarial behavior. To mitigate this reality, we provide tools that allow operators to prevent zero dynamics attacks when as many as p agents and sensors are corrupted. Such a design ensures attack detectability in deterministic systems while removing the threat of a class of stealthy attacks in stochastic systems. To achieve this goal, we use graph theory to obtain necessary and sufficient conditions for the presence of zero dynamics attacks in terms of the structural interactions between agents and sensors. We then formulate and solve optimization problems which minimize communication networks while also ensuring a resource limited adversary cannot perform a zero dynamics attacks. Polynomial time algorithms for design and analysis are provided.

  18. Diel activity and preferred landing sites in Culicoides biting midges attacking Fjord horses

    NARCIS (Netherlands)

    Elbers, A.R.W.; Heuvel, van den S.J.; Meiswinkel, R.

    2016-01-01

    In the summer of 2014, in the central part of The Netherlands, Culicoides spp. (Diptera: Ceratopogonidae) attack rates, biting rates, and preferred landing sites were determined for a pair of Fjord horses maintained permanently at pasture in an area devoid of cattle. Eleven body regions of the

  19. An Approach for Prevention of MitM Attack Based on Rogue AP in Wireless Network

    Directory of Open Access Journals (Sweden)

    Zhendong Wu

    2014-12-01

    Full Text Available With the rapid development of WLAN, more and more schools and businesses have begun to provide the WLAN for users. However, WLAN is considerably more susceptible to MitM (man- in-the-middle attack. To overcome it, we propose a dynamic password technology named Two-way Dynamic Authentication Technology (TDAT. It uses two-factor during the initial authentication, and uses a two-way hash chain during the cross-domain authentication. TDAT effectively protects users' authentication credentials and improves users' experience. In an actual wireless network environment, we implement a MitM attack framework based on Rogue AP. Then we effectively prevent this MitM attack by using TDAT. Moreover we analyze the security of TDAT by using BAN logic.

  20. Using Combined One-Time Password for Prevention of Phishing Attacks

    Directory of Open Access Journals (Sweden)

    S. Nasiri

    2017-12-01

    Full Text Available Αs technologies and communications develop, more sabotaging attacks occur including phishing attacks which jeopardize users' security and critical information like their passwords and credentials. Several solutions have been proposed for existing dangers. One of which is the use of one-time passwords. This issue has remained as a main challenge and requires more extensive research. In this research, we have focused on one-time password combinations and we also have proposed solutions based on behavioral patterns which lead to significant optimizations while tending the simplicity for users. Efficiency of the proposed method has been measured through defining scenarios, modeling and simulations based on a prevention rate index. In addition, complexity coefficient of the proposed method showing the probability of unpredictability of passwords for attackers has been calculated. Ultimately, a descriptive comparison has shown that the proposed method is superior to some of the existing methods.

  1. Adaptive Suspicious Prevention for Defending DoS Attacks in SDN-Based Convergent Networks.

    Science.gov (United States)

    Dao, Nhu-Ngoc; Kim, Joongheon; Park, Minho; Cho, Sungrae

    2016-01-01

    The convergent communication network will play an important role as a single platform to unify heterogeneous networks and integrate emerging technologies and existing legacy networks. Although there have been proposed many feasible solutions, they could not become convergent frameworks since they mainly focused on converting functions between various protocols and interfaces in edge networks, and handling functions for multiple services in core networks, e.g., the Multi-protocol Label Switching (MPLS) technique. Software-defined networking (SDN), on the other hand, is expected to be the ideal future for the convergent network since it can provide a controllable, dynamic, and cost-effective network. However, SDN has an original structural vulnerability behind a lot of advantages, which is the centralized control plane. As the brains of the network, a controller manages the whole network, which is attractive to attackers. In this context, we proposes a novel solution called adaptive suspicious prevention (ASP) mechanism to protect the controller from the Denial of Service (DoS) attacks that could incapacitate an SDN. The ASP is integrated with OpenFlow protocol to detect and prevent DoS attacks effectively. Our comprehensive experimental results show that the ASP enhances the resilience of an SDN network against DoS attacks by up to 38%.

  2. A Socio-Technical Approach to Preventing, Mitigating, and Recovering from Ransomware Attacks.

    Science.gov (United States)

    Sittig, Dean F; Singh, Hardeep

    2016-01-01

    Recently there have been several high-profile ransomware attacks involving hospitals around the world. Ransomware is intended to damage or disable a user's computer unless the user makes a payment. Once the attack has been launched, users have three options: 1) try to restore their data from backup; 2) pay the ransom; or 3) lose their data. In this manuscript, we discuss a socio-technical approach to address ransomware and outline four overarching steps that organizations can undertake to secure an electronic health record (EHR) system and the underlying computing infrastructure. First, health IT professionals need to ensure adequate system protection by correctly installing and configuring computers and networks that connect them. Next, the health care organizations need to ensure more reliable system defense by implementing user-focused strategies, including simulation and training on correct and complete use of computers and network applications. Concomitantly, the organization needs to monitor computer and application use continuously in an effort to detect suspicious activities and identify and address security problems before they cause harm. Finally, organizations need to respond adequately to and recover quickly from ransomware attacks and take actions to prevent them in future. We also elaborate on recommendations from other authoritative sources, including the National Institute of Standards and Technology (NIST). Similar to approaches to address other complex socio-technical health IT challenges, the responsibility of preventing, mitigating, and recovering from these attacks is shared between health IT professionals and end-users.

  3. Insider Threat: Preventing Direct Action Attacks Within the United States Army

    Science.gov (United States)

    2017-06-09

    Intelligence Agency, 2012. Joint Chiefs of Staff. Joint Publication (JP) 3-07.2, Antiterrorism. Washington, DC: Government Printing Office, 2010. 81...Federal Bureau of Investigation GEN General (Army rank, O-10) HIPAA Health Insurance Portability and Accountability Act of 1996 INSCOM Intelligence and...commanders, and the intelligence community to prevent insider threats from developing into direct action attacks, this study sought to answer the

  4. SiC: An Agent Based Architecture for Preventing and Detecting Attacks to Ubiquitous Databases

    Science.gov (United States)

    Pinzón, Cristian; de Paz, Yanira; Bajo, Javier; Abraham, Ajith; Corchado, Juan M.

    One of the main attacks to ubiquitous databases is the structure query language (SQL) injection attack, which causes severe damages both in the commercial aspect and in the user’s confidence. This chapter proposes the SiC architecture as a solution to the SQL injection attack problem. This is a hierarchical distributed multiagent architecture, which involves an entirely new approach with respect to existing architectures for the prevention and detection of SQL injections. SiC incorporates a kind of intelligent agent, which integrates a case-based reasoning system. This agent, which is the core of the architecture, allows the application of detection techniques based on anomalies as well as those based on patterns, providing a great degree of autonomy, flexibility, robustness and dynamic scalability. The characteristics of the multiagent system allow an architecture to detect attacks from different types of devices, regardless of the physical location. The architecture has been tested on a medical database, guaranteeing safe access from various devices such as PDAs and notebook computers.

  5. Information Security Controls against Cross-Site Request Forgery Attacks on Software Applications of Automated Systems

    Science.gov (United States)

    Barabanov, A. V.; Markov, A. S.; Tsirlov, V. L.

    2018-05-01

    This paper presents statistical results and their consolidation, which were received in the study into security of various web-application against cross-site request forgery attacks. Some of the results were received in the study carried out within the framework of certification for compliance with information security requirements. The paper provides the results of consolidating information about the attack and protection measures, which are currently used by the developers of web-applications. It specifies results of the study, which demonstrate various distribution types: distribution of identified vulnerabilities as per the developer type (Russian and foreign), distribution of the security measures used in web-applications, distribution of the identified vulnerabilities as per the programming languages, data on the number of security measures that are used in the studied web-applications. The results of the study show that in most cases the developers of web-applications do not pay due attention to protection against cross-site request forgery attacks. The authors give recommendations to the developers that are planning to undergo a certification process for their software applications.

  6. Detection of Cross Site Scripting Attack in Wireless Networks Using n-Gram and SVM

    Directory of Open Access Journals (Sweden)

    Jun-Ho Choi

    2012-01-01

    Full Text Available Large parts of attacks targeting the web are aiming at the weak point of web application. Even though SQL injection, which is the form of XSS (Cross Site Scripting attacks, is not a threat to the system to operate the web site, it is very critical to the places that deal with the important information because sensitive information can be obtained and falsified. In this paper, the method to detect themalicious SQL injection script code which is the typical XSS attack using n-Gram indexing and SVM (Support Vector Machine is proposed. In order to test the proposed method, the test was conducted after classifying each data set as normal code and malicious code, and the malicious script code was detected by applying index term generated by n-Gram and data set generated by code dictionary to SVM classifier. As a result, when the malicious script code detection was conducted using n-Gram index term and SVM, the superior performance could be identified in detecting malicious script and the more improved results than existing methods could be seen in the malicious script code detection recall.

  7. Hanford Site pollution prevention progress report 1999

    International Nuclear Information System (INIS)

    BETSCH, M.D.

    1999-01-01

    The Richland Operations Office (RL) and Office of River Protection (ORP) are pleased to issue the attached Pollution Prevention Progress Report. We have just met the most aggressive waste reduction and A recycling goals to date and are publishing this report to recognize A the site's progress, and to ensure it will sustain success beyond 1 Fiscal Year 2000. This report was designed to inform the been made by RL and ORP in Waste Minimization (WMin) and Pollution Prevention (P2). RL, ORP and their contractors are committed to protecting the environment, and we reiterate pollution prevention should continue to be at the forefront of the environmental cleanup and research efforts. As you read the attached report, we believe you will see a clear demonstration of RL and ORP's outstanding performance as it has been responsible and accountable to the nation, its employees, and the community in which we live and work. commitment that all employees have for environmental stewardship. The report provides useful information about the U.S. Department of Energy's (DOE'S) environmental policy and programs, and contains countless examples of waste minimization projects. This year was the first year our site received the White House Closing the Circle in the category of Affirmative Procurement. This Award recognizes our site for designing a comprehensive strategy for achieving 100 percent purchases of the U.S.Environmenta1 Protection Agency designated recycled items. DOE-Headquarters also acknowledged the site in 1999 for its public outreach efforts in communicating pollution prevention to Hanford Site employees and the community. Our site is truly a recognized leader in outreach as it has kept this title for two consecutive years. In previous years, we received the White House Closing the Circle Honorable Mention in Affirmative Procurement and several other National DOE Awards. Through partnership with the local community and stakeholders, the site and its contractors have a clear

  8. Hanford Site pollution prevention progress report; FINAL

    International Nuclear Information System (INIS)

    BETSCH, M.D.

    1999-01-01

    The Richland Operations Office (RL) and Office of River Protection (ORP) are pleased to issue the attached Pollution Prevention Progress Report. We have just met the most aggressive waste reduction and A recycling goals to date and are publishing this report to recognize A the site's progress, and to ensure it will sustain success beyond 1 Fiscal Year 2000. This report was designed to inform the been made by RL and ORP in Waste Minimization (WMin) and Pollution Prevention (P2). RL, ORP and their contractors are committed to protecting the environment, and we reiterate pollution prevention should continue to be at the forefront of the environmental cleanup and research efforts. As you read the attached report, we believe you will see a clear demonstration of RL and ORP's outstanding performance as it has been responsible and accountable to the nation, its employees, and the community in which we live and work. commitment that all employees have for environmental stewardship. The report provides useful information about the U.S. Department of Energy's (DOE'S) environmental policy and programs, and contains countless examples of waste minimization projects. This year was the first year our site received the White House Closing the Circle in the category of Affirmative Procurement. This Award recognizes our site for designing a comprehensive strategy for achieving 100 percent purchases of the U.S.Environmenta1 Protection Agency designated recycled items. DOE-Headquarters also acknowledged the site in 1999 for its public outreach efforts in communicating pollution prevention to Hanford Site employees and the community. Our site is truly a recognized leader in outreach as it has kept this title for two consecutive years. In previous years, we received the White House Closing the Circle Honorable Mention in Affirmative Procurement and several other National DOE Awards. Through partnership with the local community and stakeholders, the site and its contractors have a clear

  9. Shilling Attack Prevention for Recommender Systems Using Social-based Clustering

    KAUST Repository

    Lee, Tak

    2011-06-06

    A Recommender System (RS) is a system that utilizes user and item information to predict the feeling of users towards unfamiliar items. Recommender Systems have become popular tools for online stores due to their usefulness in confidently recommending items to users. A popular algorithm for recommender system is Collaborative Filtering (CF). CF uses other users\\' profiles to predict whether a user is interested in a particular object. This system, however, is vulnerable to malicious users seeking to promote items by manipulating rating predictions with fake user profiles. Profiles with behaviors similar to "victim" users alter the prediction of a Recommender System. Manipulating rating predictions through injected profiles is referred to as a shilling attack. It is important to develop shilling attack prevention frameworks for to protect the trustworthiness of Recommender Systems. In this thesis, we will demonstrate a new methodology that utilizes social information to prevent malicious users from manipulating the prediction system. The key element in our new methodology rests upon the concept of trust among real users, an element we claim absent among malicious profiles. In order to use trust information for shilling attack prevention, we first develop a weighting system which makes the system rely more on trustworthy users when making predictions. We then use this trust information to cluster out untrustworthy users to improve rating robustness. The robustness of the new and classic systems is then evaluated with data from a public commercial consumer RS, Epinions.com. Several complexity reduction procedures are also introduced to make implementing the algorithms mentioned possible for a huge commercial database.

  10. Idaho National Laboratory Site Pollution Prevention Plan

    International Nuclear Information System (INIS)

    E. D. Sellers

    2007-01-01

    It is the policy of the Department of Energy (DOE) that pollution prevention and sustainable environmental stewardship will be integrated into DOE operations as a good business practice to reduce environmental hazards, protect environmental resources, avoid pollution control costs, and improve operational efficiency and mission sustainability. In furtherance of this policy, DOE established five strategic, performance-based Pollution Prevention (P2) and Sustainable Environmental Stewardship goals and included them as an attachment to DOE O 450.1, Environmental Protection Program. These goals and accompanying strategies are to be implemented by DOE sites through the integration of Pollution Prevention into each site's Environmental Management System (EMS). This document presents a P2 and Sustainability Program and corresponding plan pursuant to DOE Order 450.1 and DOE O 435.1, Radioactive Waste Management. This plan is also required by the state of Idaho, pursuant to the Resource Conservation and Recovery Act (RCRA) partial permit. The objective of this document is to describe the Idaho National Laboratory (INL) Site P2 and Sustainability Program. The purpose of the program is to decrease the environmental footprint of the INL Site while providing enhanced support of its mission. The success of the program is dependent on financial and management support. The signatures on the previous page indicate INL, ICP, and AMWTP Contractor management support and dedication to the program. P2 requirements have been integrated into working procedures to ensure an effective EMS as part of an Integrated Safety Management System (ISMS). This plan focuses on programmatic functions which include environmentally preferable procurement, sustainable design, P2 and Sustainability awareness, waste generation and reduction, source reduction and recycling, energy management, and pollution prevention opportunity assessments. The INL Site P2 and Sustainability Program is administratively

  11. Idaho National Laboratory Site Pollution Prevention Plan

    Energy Technology Data Exchange (ETDEWEB)

    E. D. Sellers

    2007-03-01

    It is the policy of the Department of Energy (DOE) that pollution prevention and sustainable environmental stewardship will be integrated into DOE operations as a good business practice to reduce environmental hazards, protect environmental resources, avoid pollution control costs, and improve operational efficiency and mission sustainability. In furtherance of this policy, DOE established five strategic, performance-based Pollution Prevention (P2) and Sustainable Environmental Stewardship goals and included them as an attachment to DOE O 450.1, Environmental Protection Program. These goals and accompanying strategies are to be implemented by DOE sites through the integration of Pollution Prevention into each site's Environmental Management System (EMS). This document presents a P2 and Sustainability Program and corresponding plan pursuant to DOE Order 450.1 and DOE O 435.1, Radioactive Waste Management. This plan is also required by the state of Idaho, pursuant to the Resource Conservation and Recovery Act (RCRA) partial permit. The objective of this document is to describe the Idaho National Laboratory (INL) Site P2 and Sustainability Program. The purpose of the program is to decrease the environmental footprint of the INL Site while providing enhanced support of its mission. The success of the program is dependent on financial and management support. The signatures on the previous page indicate INL, ICP, and AMWTP Contractor management support and dedication to the program. P2 requirements have been integrated into working procedures to ensure an effective EMS as part of an Integrated Safety Management System (ISMS). This plan focuses on programmatic functions which include environmentally preferable procurement, sustainable design, P2 and Sustainability awareness, waste generation and reduction, source reduction and recycling, energy management, and pollution prevention opportunity assessments. The INL Site P2 and Sustainability Program is administratively

  12. Preventing DoS attacks in peer-to-peer media streaming systems

    Science.gov (United States)

    Conner, William; Nahrstedt, Klara; Gupta, Indranil

    2006-01-01

    This paper presents a framework for preventing both selfishness and denial-of-service attacks in peer-to-peer media streaming systems. Our framework, called Oversight, achieves prevention of these undesirable activities by running a separate peer-to-peer download rate enforcement protocol along with the underlying peer-to-peer media streaming protocol. This separate Oversight protocol enforces download rate limitations on each participating peer. These limitations prevent selfish or malicious nodes from downloading an overwhelming amount of media stream data that could potentially exhaust the entire system. Since Oversight is based on a peer-to-peer architecture, it can accomplish this enforcement functionality in a scalable, efficient, and decentralized way that fits better with peer-to-peer media streaming systems compared to other solutions based on central server architectures. As peer-to-peer media streaming systems continue to grow in popularity, the threat of selfish and malicious peers participating in such large peer-to-peer networks will continue to grow as well. For example, since peer-to-peer media streaming systems allow users to send small request messages that result in the streaming of large media objects, these systems provide an opportunity for malicious users to exhaust resources in the system with little effort expended on their part. However, Oversight addresses these threats associated with selfish or malicious peers who cause such disruptions with excessive download requests. We evaluated our Oversight solution through simulations and our results show that applying Oversight to peer-to-peer media streaming systems can prevent both selfishness and denial-of-service attacks by effectively limiting the download rates of all nodes in the system.

  13. An SDN-Based Fingerprint Hopping Method to Prevent Fingerprinting Attacks

    Directory of Open Access Journals (Sweden)

    Zheng Zhao

    2017-01-01

    Full Text Available Fingerprinting attacks are one of the most severe threats to the security of networks. Fingerprinting attack aims to obtain the operating system information of target hosts to make preparations for future attacks. In this paper, a fingerprint hopping method (FPH is proposed based on software-defined networks to defend against fingerprinting attacks. FPH introduces the idea of moving target defense to show a hopping fingerprint toward the fingerprinting attackers. The interaction of the fingerprinting attack and its defense is modeled as a signal game, and the equilibriums of the game are analyzed to develop an optimal defense strategy. Experiments show that FPH can resist fingerprinting attacks effectively.

  14. Preventing Wormhole Attacks on Wireless Ad Hoc Networks: A Graph Theoretic Approach

    National Research Council Canada - National Science Library

    Lazos, L; Poovendran, Radha; Meadows, C; Syverson, P; Chang, L. W

    2005-01-01

    We study the problem of characterizing the wormhole attack, an attack that can be mounted on a wide range of wireless network protocols without compromising any cryptographic quantity or network node...

  15. Engineering a horseradish peroxidase C stable to radical attacks by mutating multiple radical coupling sites.

    Science.gov (United States)

    Kim, Su Jin; Joo, Jeong Chan; Song, Bong Keun; Yoo, Young Je; Kim, Yong Hwan

    2015-04-01

    Peroxidases have great potential as industrial biocatalysts. In particular, the oxidative polymerization of phenolic compounds catalyzed by peroxidases has been extensively examined because of the advantage of this method over other conventional chemical methods. However, the industrial application of peroxidases is often limited because of their rapid inactivation by phenoxyl radicals during oxidative polymerization. In this work, we report a novel protein engineering approach to improve the radical stability of horseradish peroxidase isozyme C (HRPC). Phenylalanine residues that are vulnerable to modification by the phenoxyl radicals were identified using mass spectrometry analysis. UV-Vis and CD spectra showed that radical coupling did not change the secondary structure or the active site of HRPC. Four phenylalanine (Phe) residues (F68, F142, F143, and F179) were each mutated to alanine residues to generate single mutants to examine the role of these sites in radical coupling. Despite marginal improvement of radical stability, each single mutant still exhibited rapid radical inactivation. To further reduce inactivation by radical coupling, the four substitution mutations were combined in F68A/F142A/F143A/F179A. This mutant demonstrated dramatic enhancement of radical stability by retaining 41% of its initial activity compared to the wild-type, which was completely inactivated. Structure and sequence alignment revealed that radical-vulnerable Phe residues of HPRC are conserved in homologous peroxidases, which showed the same rapid inactivation tendency as HRPC. Based on our site-directed mutagenesis and biochemical characterization, we have shown that engineering radical-vulnerable residues to eliminate multiple radical coupling can be a good strategy to improve the stability of peroxidases against radical attack. © 2014 Wiley Periodicals, Inc.

  16. Study of DSR and AODV under Sinkhole Attack and Its Proposed Prevention Technique

    OpenAIRE

    Winnie Main; Narendra M. Shekokar

    2014-01-01

    Mobile Ad-hoc Networks (MANET) are wireless mobile nodes that communicate without any predefined infrastructure. This allows MANETs to be easily setup in geographical and terrestrial constraints. To achieve this kind of communication MANET routing protocols play an important role. Two routing protocols, DSR and AODV are studied in detail. This basic trait of a MANET makes its routing protocols very vulnerable to security attacks. One such attack is the ‘Sinkhole’ attack which ...

  17. Priming and warnings are not effective to prevent social engineering attacks

    NARCIS (Netherlands)

    Junger, Marianne; Montoya, L.; Overink, F.J.

    2017-01-01

    Humans tend to trust each other and to easily disclose personal information. This makes them vulnerable to social engineering attacks. The present study investigated the effectiveness of two interventions that aim to protect users against social engineering attacks, namely priming through cues to

  18. Migraine Trainers as Models: the effectiveness of Lay trainerswith migraine for behavioural attack prevention

    NARCIS (Netherlands)

    S.Y.M. Mérelle (Saskia)

    2008-01-01

    textabstractMigraine is a chronic brain disorder, characterized by attacks of severe headache accompanied by nausea, vomiting and sensitivity to light, sound and smell. Attacks can be preceded by premonitory symptoms such as fatigue, muscular stiff ness or negative aff ect. It has been shown that

  19. Hanford Site waste minimization and pollution prevention awareness program plan

    International Nuclear Information System (INIS)

    Place, B.G.

    1998-01-01

    This plan, which is required by US Department of Energy (DOE) Order 5400. 1, provides waste minimization and pollution prevention guidance for all Hanford Site contractors. The plan is primary in a hierarchical series that includes the Hanford Site Waste Minimization and Pollution Prevention Awareness Program Plan, Prime contractor implementation plans, and the Hanford Site Guide for Preparing and Maintaining Generator Group Pollution Prevention Program Documentation (DOE-RL, 1997a) describing programs required by Resource Conservation and Recovery Act of 1976 (RCRA) 3002(b) and 3005(h) (RCRA and EPA, 1994). Items discussed include the pollution prevention policy and regulatory background, organizational structure, the major objectives and goals of Hanford Site's pollution prevention program, and an itemized description of the Hanford Site pollution prevention program. The document also includes US Department of Energy, Richland Operations Office's (RL's) statement of policy on pollution prevention as well as a listing of regulatory drivers that require a pollution prevention program

  20. Lifestyle interventions to prevent cardiovascular events after stroke and transient ischemic attack

    NARCIS (Netherlands)

    Deijle, Inger A.; Van Schaik, Sander M.; Van Wegen, Erwin E.H.; Weinstein, Henry C.; Kwakkel, Gert; Van Den Berg-Vos, Renske M.

    2017-01-01

    Background and Purpose - Patients with a transient ischemic attack or ischemic stroke have an increased risk of subsequent cardiovascular events. The purpose of this systematic review and meta-analysis was to determine whether lifestyle interventions focusing on behaviorally modifiable risk factors

  1. An Approach for Prevention of MitM Attack Based on Rogue AP in Wireless Network

    OpenAIRE

    Zhendong Wu; Mengru Cai; Siyu Liang

    2014-01-01

    With the rapid development of WLAN, more and more schools and businesses have begun to provide the WLAN for users. However, WLAN is considerably more susceptible to MitM (man- in-the-middle) attack. To overcome it, we propose a dynamic password technology named Two-way Dynamic Authentication Technology (TDAT). It uses two-factor during the initial authentication, and uses a two-way hash chain during the cross-domain authentication. TDAT effectively protects users' authentication credentials a...

  2. Preventing surgical site infections: a surgeon's perspective.

    OpenAIRE

    Nichols, R. L.

    2001-01-01

    Wound site infections are a major source of postoperative illness, accounting for approximately a quarter of all nosocomial infections. National studies have defined the patients at highest risk for infection in general and in many specific operative procedures. Advances in risk assessment comparison may involve use of the standardized infection ratio, procedure-specific risk factor collection, and logistic regression models. Adherence to recommendations in the 1999 Centers for Disease Contro...

  3. Applying Magneto-rheology to Reduce Blood Viscosity and Suppress Turbulence to Prevent Heart Attacks

    Science.gov (United States)

    Tao, R.

    Heart attacks are the leading causes of death in USA. Research indicates one common thread, high blood viscosity, linking all cardiovascular diseases. Turbulence in blood circulation makes different regions of the vasculature vulnerable to development of atherosclerotic plaque. Turbulence is also responsible for systolic ejection murmurs and places heavier workload on heart, a possible trigger of heart attacks. Presently, neither medicine nor method is available to suppress turbulence. The only method to reduce the blood viscosity is to take medicine, such as aspirin. However, using medicine to reduce the blood viscosity does not help suppressing turbulence. In fact, the turbulence gets worse as the Reynolds number goes up with the viscosity reduction by the medicine. Here we report our new discovery: application of a strong magnetic field to blood along its flow direction, red blood cells are polarized in the magnetic field and aggregated into short chains along the flow direction. The blood viscosity becomes anisotropic: Along the flow direction the viscosity is significantly reduced, but in the directions perpendicular to the flow the viscosity is considerably increased. In this way, the blood flow becomes laminar, turbulence is suppressed, the blood circulation is greatly improved, and the risk for heart attacks is reduced. While these effects are not permanent, they last for about 24 hours after one magnetic therapy treatment.

  4. Preventing surgical site infection. Where now?

    LENUS (Irish Health Repository)

    Humphreys, H

    2009-12-01

    Surgical site infection (SSI) is increasingly recognised as a measure of the quality of patient care by surgeons, infection control practitioners, health planners and the public. There is increasing pressure to compare SSI rates between surgeons, institutions and countries. For this to be meaningful, data must be standardised and must include post-discharge surveillance (PDS) as many superficial SSIs do not present to the original institution. Further work is required to determine the best method of conducting PDS. In 2008 two important documents on SSI were published from the Society for Healthcare Epidemiology of America\\/The Infectious Disease Society of America and the National Institute for Health and Clincal Excellence, UK. Both emphasise key aspects during the preoperative, operative and postoperative phases of patient care. In addition to effective interventions known to be important for some time, e.g. not shaving the surgical site until the day of the procedure, there is increasing emphasis on physiological parameters, e.g. blood glucose concentrations, oxygen tensions and body temperature. Laparoscopic procedures are increasingly associated with reduced SSI rates, and the screening and decontamination of meticillin-resistant Staphylococcus aureus carriers is effective for certain surgical procedures but has to be balanced by cost and the risk of mupirocin resistance. Finally, there is a need to convert theory into practice by the rigorous application of SSI healthcare bundles. Recent studies suggest that, with a multidisciplinary approach, simple measures can be effective in reducing SSI rates.

  5. Hanford Site waste minimization and pollution prevention awareness program plan

    International Nuclear Information System (INIS)

    1994-05-01

    The Hanford Site WMin/P2 program is an organized, comprehensive, and continual effort to systematically reduce the quantity and toxicity of hazardous, radioactive, mixed, and sanitary wastes; conserve resources; and prevent or minimize pollutant releases to all environmental media from all Site activities. The Hanford Site WMin/P2 program plan reflects national and DOE waste minimization and pollution prevention goals and policies, and represents an ongoing effort to make WMin/P2 part of the Site operating philosophy. In accordance with these policies, a hierarchical approach to environmental management has been adopted and is applied to all types of polluting and waste generating activities. Pollution prevention and waste minimization through source reduction are first priority in the Hanford WMin/P2 program, followed by environmentally safe recycling. Treatment to reduce the quantity, toxicity, and/or mobility will be considered only when prevention or recycling are not possible or practical. Environmentally safe disposal is the last option

  6. Abstraction of methyl from neutral Fischer-type carbene complexes: A new site for nucleophilic attack

    Energy Technology Data Exchange (ETDEWEB)

    Toomey, L.M.; Atwood, J.D. [State Univ. of New York, Buffalo, NY (United States)

    1997-02-04

    Reactions of Fischer-type carbene complexes, M(CO){sub 5}(C(OMe)pH) (M = Cr, W), with metal carbonyl anions (M`{sup -} = CpFe(CO){sub 2}{sup -@}, Re(CO){sub 5}{sup -}, Mn(CO){sub 4}PPh{sub 3}{sup -}, Co(CO){sub 3}PPh{sub 3}{sup -}, Cp{sup *}Cr(CO){sub 3}{sup -}, CpMo(CO){sub 3}{sup -}) result in demethylation of the carbene complexes. The products are M(CO){sub 5}C(O)Ph{sup -} and M`-Me, characterized by infrared and NMR spectroscopy. A slower rate for reaction with W(CO){sub 5}(C(OEt)Ph) in comparison to the methyl analogue is consistent with nucleophilic attack of the metal carbonyl anion on the methyl of the methoxy group of the carbene. This is a new type of nucleophilic attack of a Fischer-type carbene. 22 refs., 1 fig., 1 tab.

  7. Can the Pelargonium sidoides root extract EPs® 7630 prevent asthma attacks during viral infections of the upper respiratory tract in children?

    Science.gov (United States)

    Tahan, Fulya; Yaman, Melih

    2013-01-15

    Asthma is a chronic disease characterized by airway inflammation. Viral infection initiates an immune inflammatory response that may produce asthma attacks. There is no effective preventing therapy for asthma attack during upper respiratory tract viral infections. To investigate the efficacy of 5 days of Pelargonium sidoides therapy for preventing asthma attack during upper respiratory tract viral infections. Sixty one asthmatic children with upper respiratory tract viral infection were enrolled in the study. The patients were randomized to receive Pelargonium sidoides daily for 5 days (n=30) or not (n=31). Before and after treatment, they all were examined and symptom scores were determined. Following five days treatment, children were evaluated whether or not they had an asthma attack. Treatment with Pelargonium sidoides was not associated with a statistically significant differences in fever and muscle aches (p>0.05, Chi-square test). There were significant differences in cough frequency and nasal congestion between the groups (pasthma attack between the groups (pasthma attack. Our study shows that Pelargonium sidoides may prevent asthma attacks during upper respiratory tract viral infections. Copyright © 2012 Elsevier GmbH. All rights reserved.

  8. Air pollution prevention at the Hanford Site: Status and recommendations

    International Nuclear Information System (INIS)

    Engel, J.A.

    1995-08-01

    With the introduction of the Clean Air Act Amendments of 1990 and other air and pollution prevention regulations, there has been increased focus on both pollution prevention and air emissions at US DOE sites. The Pollution Prevention (P2) Group of WHC reviewed the status of air pollution prevention with the goal of making recommendations on how to address air emissions at Hanford through pollution prevention. Using the air emissions inventory from Hanford's Title V permit, the P2 Group was able to identify major and significant air sources. By reviewing the literature and benchmarking two other DOE Sites, two major activities were recommended to reduce air pollution and reduce costs at the Hanford Site. First, a pollution prevention opportunity assessment (P2OA) should be conducted on the significant painting sources in the Maintenance group and credit should be taken for reducing the burning of tumbleweeds, another significant source of air pollution. Since they are significant sources, reducing these emissions will reduce air emission fees, as well as have the potential to reduce material and labor costs, and increase worker safety. Second, a P2OA should be conducted on alternatives to the three coal-fired powerhouses (steam plants) on-site, including a significant costs analysis of alternatives. This analysis could be of significant value to other DOE sites. Overall, these two activities would reduce pollution, ease regulatory requirements and fees, save money, and help Hanford take a leadership role in air pollution prevention

  9. Livermore Site Spill Prevention, Control, and Countermeasures Plan, May 2017

    Energy Technology Data Exchange (ETDEWEB)

    Griffin, D. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Mertesdorf, E. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-05-01

    This Spill Prevention, Control, and Countermeasure (SPCC) Plan describes the measures that are taken at Lawrence Livermore National Laboratory’s (LLNL) Livermore Site in Livermore, California, to prevent, control, and handle potential spills from aboveground containers that can contain 55 gallons or more of oil.

  10. Comprehensive cardiac rehabilitation for secondary prevention after transient ischemic attack or mild stroke: I: feasibility and risk factors.

    Science.gov (United States)

    Prior, Peter L; Hachinski, Vladimir; Unsworth, Karen; Chan, Richard; Mytka, Sharon; O'Callaghan, Christina; Suskin, Neville

    2011-11-01

    Comprehensive cardiac rehabilitation (CCR), which integrates structured lifestyle interventions and medications, reduces morbidity and mortality among cardiac patients. CCR has not typically been used with cerebrovascular populations, despite important commonalities with heart patients. We tested feasibility and effectiveness of 6-month outpatient CCR for secondary prevention after transient ischemic attack or mild, nondisabling stroke. This article presents risk factors. A future article will discuss psychological outcomes. Consecutive consenting subjects having sustained a transient ischemic attack or mild, nondisabling stroke within the previous 12 months (mean, 11.5 weeks; event-to-CCR entry) with ≥1 vascular risk factor, were recruited from a stroke prevention clinic providing usual care. We measured 6-month CCR outcomes following a prospective cohort design. Of 110 subjects recruited from January 2005 to April 2006, 100 subjects (mean age, 64.9 years; 46 women) entered and 80 subjects completed CCR. We obtained favorable, significant intake-to-exit changes in: aerobic capacity (+31.4%; Pstroke, offering a promising model for vascular protection across chronic disease entities. We know of no similar previous investigation, and are now conducting a randomized trial.

  11. Health-Related Quality of Life with Subcutaneous C1-Inhibitor for Prevention of Attacks of Hereditary Angioedema.

    Science.gov (United States)

    Lumry, William R; Craig, Timothy; Zuraw, Bruce; Longhurst, Hilary; Baker, James; Li, H Henry; Bernstein, Jonathan A; Anderson, John; Riedl, Marc A; Manning, Michael E; Keith, Paul K; Levy, Donald S; Caballero, Teresa; Banerji, Aleena; Gower, Richard G; Farkas, Henriette; Lawo, John-Philip; Pragst, Ingo; Machnig, Thomas; Watson, Douglas J

    2018-01-31

    Hereditary angioedema with C1-inhibitor deficiency (C1-INH-HAE) impairs health-related quality of life (HRQoL). The objective of this study was to assess HRQoL outcomes in patients self-administering subcutaneous C1-INH (C1-INH[SC]; HAEGARDA) for routine prevention of HAE attacks. Post hoc analysis of data from the placebo-controlled, crossover phase III COMPACT study (Clinical Studies for Optimal Management of Preventing Angioedema with Low-Volume Subcutaneous C1-Inhibitor Replacement Therapy). Ninety patients with C1-INH-HAE were randomized to 1 of 4 treatment sequences: C1-INH(SC) 40 or 60 IU/kg twice weekly for 16 weeks, preceded or followed by 16 weeks of twice weekly placebo injections. All HAE attacks were treated with open-label on-demand treatment as necessary. HRQoL assessments at week 14 (last visit) included the European Quality of Life-5 Dimensions Questionnaire (EQ-5D-3L), the Hospital Anxiety and Depression Scale (HADS), the Work Productivity and Activity Impairment Questionnaire (WPAI), and the Treatment Satisfaction Questionnaire for Medication (TSQM). Compared with placebo (on-demand treatment alone), treatment with twice weekly C1-INH(SC) (both doses combined) was associated with better EQ-5D visual analog scale general health, less HADS anxiety, less WPAI presenteeism, work productivity loss, and activity impairment, and greater TSQM effectiveness and overall treatment satisfaction. More patients self-reported a "good/excellent" response during routine prevention with C1-INH(SC) compared with on-demand only (placebo prophylaxis) management. For each HRQoL measure, a greater proportion of patients had a clinically meaningful improvement during C1-INH(SC) treatment compared with placebo. In patients with frequent HAE attacks, a treatment strategy of routine prevention with self-administered twice weekly C1-INH(SC) had a greater impact on improving multiple HAE-related HRQoL impairments, most notably anxiety and work productivity, compared with on

  12. Evolving issues in the prevention of surgical site infections.

    LENUS (Irish Health Repository)

    Quinn, A

    2009-06-01

    Surgical site infection is one of the more common causes of post-operative morbidity. Such infections contribute to prolonged recovery, delayed discharge and increasing costs to both patients and the health service. In the current climate increased emphasis is being placed on minimising the risks of acquiring or transmitting these nosocomial infections. This article reviews the current literature obtained from a Pubmed database search in relation to three specific aspects of surgical site infection: compliance with prophylactic antibiotics, post-discharge surveillance and novel methods for preventing surgical site infections. These topics represent areas where many institutions will find room for improvement in the prevention of surgical site infections. Tight adherence to prophylactic antibiotic guidelines, close followup of surgical wounds during and after hospital discharge, and attention to oxygenation status and the body temperature of patients may all prove to be useful adjuncts in significantly decreasing surgical site infections.

  13. Site 300 Spill Prevention, Control, and Countermeasures (SPCC) Plan

    Energy Technology Data Exchange (ETDEWEB)

    Griffin, D. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Mertesdorf, E. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2016-12-01

    This Spill Prevention, Control, and Countermeasure (SPCC) Plan describes the measures that are taken at Lawrence Livermore National Laboratory’s (LLNL) Experimental Test Site (Site 300) near Tracy, California, to prevent, control, and handle potential spills from aboveground containers that can contain 55 gallons or more of oil. This SPCC Plan complies with the Oil Pollution Prevention regulation in Title 40 of the Code of Federal Regulations, Part 112 (40 CFR 112) and with 40 CFR 761.65(b) and (c), which regulates the temporary storage of polychlorinated biphenyls (PCBs). This Plan has also been prepared in accordance with Division 20, Chapter 6.67 of the California Health and Safety Code (HSC 6.67) requirements for oil pollution prevention (referred to as the Aboveground Petroleum Storage Act [APSA]), and the United States Department of Energy (DOE) Order No. 436.1. This SPCC Plan establishes procedures, methods, equipment, and other requirements to prevent the discharge of oil into or upon the navigable waters of the United States or adjoining shorelines for aboveground oil storage and use at Site 300. This SPCC Plan has been prepared for the entire Site 300 facility and replaces the three previous plans prepared for Site 300: LLNL SPCC for Electrical Substations Near Buildings 846 and 865 (LLNL 2015), LLNL SPCC for Building 883 (LLNL 2015), and LLNL SPCC for Building 801 (LLNL 2014).

  14. Performance analysis and implementation of proposed mechanism for detection and prevention of security attacks in routing protocols of vehicular ad-hoc network (VANET

    Directory of Open Access Journals (Sweden)

    Parul Tyagi

    2017-07-01

    Full Text Available Next-generation communication networks have become widely popular as ad-hoc networks, broadly categorized as the mobile nodes based on mobile ad-hoc networks (MANET and the vehicular nodes based vehicular ad-hoc networks (VANET. VANET is aimed at maintaining safety to vehicle drivers by begin autonomous communication with the nearby vehicles. Each vehicle in the ad-hoc network performs as an intelligent mobile node characterized by high mobility and formation of dynamic networks. The ad-hoc networks are decentralized dynamic networks that need efficient and secure communication requirements due to the vehicles being persistently in motion. These networks are more susceptible to various attacks like Warm Hole attacks, denial of service attacks and Black Hole Attacks. The paper is a novel attempt to examine and investigate the security features of the routing protocols in VANET, applicability of AODV (Ad hoc On Demand protocol to detect and tackle a particular category of network attacks, known as the Black Hole Attacks. A new algorithm is proposed to enhance the security mechanism of AODV protocol and to introduce a mechanism to detect Black Hole Attacks and to prevent the network from such attacks in which source node stores all route replies in a look up table. This table stores the sequences of all route reply, arranged in ascending order using PUSH and POP operations. The priority is calculated based on sequence number and discard the RREP having presumably very high destination sequence number. The result show that proposed algorithm for detection and prevention of Black Hole Attack increases security in Intelligent Transportation System (ITS and reduces the effect of malicious node in the VANET. NCTUNs simulator is used in this research work.

  15. Do bark beetle sprays prevent Phloeosinus species from attacking cypress and juniper?

    Science.gov (United States)

    Chris Hayes; Tom DeGomez; Karen Clancy; Joel McMillin; John Anhold

    2008-01-01

    (Please note, this is an abstract only) Phloeosinus-caused mortality of Arizona cypress, (Cupressus arizonica), oneseed juniper, (Juniperus monosperma) and alligator juniper, (J. deppeana) has been observed at high levels in Arizona during the past 3 years. Currently, there are limited preventative measures to protect high-value cypress and juniper trees against...

  16. Livermore Site Spill Prevention, Control, and Countermeasures (SPCC) Plan

    Energy Technology Data Exchange (ETDEWEB)

    Bellah, W. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Griffin, D. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Mertesdorf, E. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2016-09-21

    This Spill Prevention, Control, and Countermeasure (SPCC) Plan describes the measures that are taken at Lawrence Livermore National Laboratory’s (LLNL) Livermore Site in Livermore, California, to prevent, control, and handle potential spills from aboveground containers that can contain 55 gallons or more of oil. This SPCC Plan complies with the Oil Pollution Prevention regulation in Title 40 of the Code of Federal Regulations (40 CFR), Part 112 (40 CFR 112) and with 40 CFR 761.65(b) and (c), which regulates the temporary storage of polychlorinated biphenyls (PCBs). This Plan has also been prepared in accordance with Division 20, Chapter 6.67 of the California Health and Safety Code (HSC 6.67) requirements for oil pollution prevention (referred to as the Aboveground Petroleum Storage Act [APSA]), and the United States Department of Energy (DOE) Order No. 436.1. This SPCC Plan establishes procedures, methods, equipment, and other requirements to prevent the discharge of oil into or upon the navigable waters of the United States or adjoining shorelines for aboveground oil storage and use at the Livermore Site.

  17. Research on the technology of detecting the SQL injection attack and non-intrusive prevention in WEB system

    Science.gov (United States)

    Hu, Haibin

    2017-05-01

    Among numerous WEB security issues, SQL injection is the most notable and dangerous. In this study, characteristics and procedures of SQL injection are analyzed, and the method for detecting the SQL injection attack is illustrated. The defense resistance and remedy model of SQL injection attack is established from the perspective of non-intrusive SQL injection attack and defense. Moreover, the ability of resisting the SQL injection attack of the server has been comprehensively improved through the security strategies on operation system, IIS and database, etc.. Corresponding codes are realized. The method is well applied in the actual projects.

  18. Pollution prevention opportunity assessments. Guidance for the Hanford Site

    International Nuclear Information System (INIS)

    Engel, J.A.

    1994-10-01

    The purpose of this document is to provide help to you, Hanford waste generators, in finding ways to reduce waste through Pollution Prevention (P2) and Pollution Prevention Opportunity Assessments (P2OAs). It is based on guidance from other sites, and serves to compliment the Hanford-specific training on P2OAs offered by the Pollution Prevention group at Westinghouse Hanford Company (WHC). The chapters of this document include help on how to choose major waste generating activities, how to conduct a P2OA, how to get results, and how to show progress. There is also a chapter on special situations and problems your facility may encounter. This first chapter tells you why you should consider conducting P2OAs and why they may be required

  19. Preventing childhood obesity: the sentinel site for obesity prevention in Victoria, Australia.

    Science.gov (United States)

    Bell, A Colin; Simmons, Anne; Sanigorski, Andrea M; Kremer, Peter J; Swinburn, Boyd A

    2008-12-01

    In spite of greater awareness of the need for action to reduce obesity, the evidence on sustainable community approaches to prevent childhood and adolescent obesity is surprisingly sparse. This paper describes the design and methodological components of the Sentinel Site for Obesity Prevention, a demonstration site in the Barwon-South West region of Victoria, Australia, that aims to build the programs, skills and evidence necessary to attenuate and eventually reverse the obesity epidemic in children and adolescents. The Sentinel Site for Obesity Prevention is based on a partnership between the region's university (Deakin University) and its health, education and local government agencies. The three basic foundations of the Sentinel Site are: multi-strategy, multi-setting interventions; building community capacity; and undertaking program evaluations and population monitoring. Three intervention projects have been supported that cover different age groups (preschool: 2-5 years, primary school: 5-12 years, secondary school: 13-17 years), but that have many characteristics in common including: community participation and ownership of the project; an intervention duration of at least 3 years; and full evaluations with impact (behaviours) and outcome measures (anthropometry) compared with regionally representative comparison populations. We recommend the Sentinel Site approach to others for successfully building evidence for childhood obesity prevention and stimulating action on reducing the epidemic.

  20. A UNIFIED APPROACH FOR DETECTION AND PREVENTION OF DDOS ATTACKS USING ENHANCED SUPPORT VECTOR MACHINES AND FILTERING MECHANISMS

    Directory of Open Access Journals (Sweden)

    T. Subbulakshmi

    2014-10-01

    Full Text Available Distributed Denial of Service (DDoS attacks were considered to be a tremendous threat to the current information security infrastructure. During DDoS attack, multiple malicious hosts that are recruited by the attackers launch a coordinated attack against one host or a network victim, which cause denial of service to legitimate users. The existing techniques suffer from more number of false alarms and more human intervention for attack detection. The objective of this paper is to monitor the network online which automatically initiates detection mechanism if there is any suspicious activity and also defense the hosts from being arrived at the network. Both spoofed and non spoofed IP’s are detected in this approach. Non spoofed IP’s are detected using Enhanced Support Vector Machines (ESVM and spoofed IP’s are detected using Hop Count Filtering (HCF mechanism. The detected IP’s are maintained separately to initiate the defense process. The attack strength is calculated using Lanchester Law which initiates the defense mechanism. Based on the calculated attack strength any of the defense schemes such as Rate based limiting or History based IP filtering is automatically initiated to drop the packets from the suspected IP. The integrated online monitoring approach for detection and defense of DDoS attacks is deployed in an experimental testbed. The online approach is found to be obvious in the field of integrated DDoS detection and defense.

  1. Hanford Site Pollution Prevention Plan progress report, 1994. Revision 1

    International Nuclear Information System (INIS)

    1995-09-01

    This report tracks progress made during 1994 against the goals stated in DOE/RL-92-62, Executive Summary, Hanford Site Pollution Prevention Plan. The Executive Summary of the plan was submitted to the Washington State Department of Ecology (Ecology) in September 1992. The plan, Executive Summary, and the progress reports are elements of a pollution prevention planning program that is required by WAC 173-307, ''Plans,'' for all hazardous substance users and/or all hazardous waste generators regulated by Ecology. These regulations implement RCW 70.95C, ''Waste Reduction,'' an act relating to hazardous waste reduction. The act encourages voluntary efforts to redesign industrial processes to help reduce or eliminate hazardous substances and hazardous waste byproducts, and to maximize the in-process reuse or reclamation of valuable spent material. The Hanford Site is voluntarily complying with this state regulatory-mandated program. All treatment, storage, or disposal (TSD) facilities are exempt from participating; the Hanford Site is classified as a TSD

  2. Hanford Site Pollution Prevention Plan progress report, 1994. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-09-01

    This report tracks progress made during 1994 against the goals stated in DOE/RL-92-62, Executive Summary, Hanford Site Pollution Prevention Plan. The Executive Summary of the plan was submitted to the Washington State Department of Ecology (Ecology) in September 1992. The plan, Executive Summary, and the progress reports are elements of a pollution prevention planning program that is required by WAC 173-307, ``Plans,`` for all hazardous substance users and/or all hazardous waste generators regulated by Ecology. These regulations implement RCW 70.95C, ``Waste Reduction,`` an act relating to hazardous waste reduction. The act encourages voluntary efforts to redesign industrial processes to help reduce or eliminate hazardous substances and hazardous waste byproducts, and to maximize the in-process reuse or reclamation of valuable spent material. The Hanford Site is voluntarily complying with this state regulatory-mandated program. All treatment, storage, or disposal (TSD) facilities are exempt from participating; the Hanford Site is classified as a TSD.

  3. Hanford site pollution prevention plan progress report, 1993

    Energy Technology Data Exchange (ETDEWEB)

    Kirkendall, J.R.

    1996-08-26

    This report tracks progress made during 1995 against the goals stated in DOE/RL-92-62, Executive Summary, Hanford Site Pollution Prevention Plan. The Executive Summary of the plan was submitted to the Washington State Department of Ecology (Ecology) in September 1992. The plan, Executive Summary, and the progress reports are elements of a pollution prevention planning program that is required by WAC 173-307,`Plans,` for all hazardous substance users and/or all hazardous waste generators regulated by Ecology. These regulations implement RCW 70.95C, `Waste Reduction,` an act relating to hazardous waste reduction. The act encourages voluntary efforts to redesign industrial processes to help reduce or eliminate hazardous substances and hazardous waste byproducts, and to maximize the in- process reuse or reclamation of valuable spent material.

  4. Hanford Site Pollution Prevention Plan Progress report, 1993

    Energy Technology Data Exchange (ETDEWEB)

    1994-08-01

    This report tracks progress against the goals stated in the Hanford Site 5-year Pollution Prevention Plan. The executive summary of the plan was submitted to the Washington State Department of Ecology (Ecology) in September 1992. The plan, executive summary, and the progress reports are elements of a pollution prevention planning program that is required by Washington Administrative Code (WAC) 173-307 for all hazardous substance users and/or all hazardous waste generators regulated by Ecology. These regulations implement Chapter 70.95C, Revised Code of Washington, an act relating to hazardous waste reduction. The act encourages voluntary efforts to redesign industrial processes to help reduce or eliminate hazardous substances and hazardous waste byproducts, and to maximize the inprocess reuse or reclamation of valuable spent material. Although the Hanford Site is exempt, it is voluntarily complying with this state regulatory-mandated program. This is the first year the Hanford Site is submitting a progress report. It covers calendar year 1993 plus the last quarter of 1992. What is reported, in accordance with WAC 173-307, are reductions in hazardous substance use and hazardous waste generated. A system of Process Waste Assessments (PWA) was chosen to meet the requirements of the program. The PWAs were organized by a physical facility or company organization. Each waste-generating facility/organization performed PWAs to identify, screen, and analyze their own reduction options. Each completed PWA identified any number of reduction opportunities, that are listed individually in the plan and summarized by category in the executive summary. These opportunities were to be implemented or evaluated further over the duration of the 5-year plan. The basis of this progress report is to track action taken on these PWA reduction opportunities in relationship to achieving the goals stated in the Pollution Prevention Plan.

  5. Hanford Site Pollution Prevention Plan Progress report, 1993

    International Nuclear Information System (INIS)

    1994-08-01

    This report tracks progress against the goals stated in the Hanford Site 5-year Pollution Prevention Plan. The executive summary of the plan was submitted to the Washington State Department of Ecology (Ecology) in September 1992. The plan, executive summary, and the progress reports are elements of a pollution prevention planning program that is required by Washington Administrative Code (WAC) 173-307 for all hazardous substance users and/or all hazardous waste generators regulated by Ecology. These regulations implement Chapter 70.95C, Revised Code of Washington, an act relating to hazardous waste reduction. The act encourages voluntary efforts to redesign industrial processes to help reduce or eliminate hazardous substances and hazardous waste byproducts, and to maximize the inprocess reuse or reclamation of valuable spent material. Although the Hanford Site is exempt, it is voluntarily complying with this state regulatory-mandated program. This is the first year the Hanford Site is submitting a progress report. It covers calendar year 1993 plus the last quarter of 1992. What is reported, in accordance with WAC 173-307, are reductions in hazardous substance use and hazardous waste generated. A system of Process Waste Assessments (PWA) was chosen to meet the requirements of the program. The PWAs were organized by a physical facility or company organization. Each waste-generating facility/organization performed PWAs to identify, screen, and analyze their own reduction options. Each completed PWA identified any number of reduction opportunities, that are listed individually in the plan and summarized by category in the executive summary. These opportunities were to be implemented or evaluated further over the duration of the 5-year plan. The basis of this progress report is to track action taken on these PWA reduction opportunities in relationship to achieving the goals stated in the Pollution Prevention Plan

  6. Program of rehabilitative exercise and education to avert vascular events after non-disabling stroke or transient ischemic attack (PREVENT Trial: a multi-centred, randomised controlled trial

    Directory of Open Access Journals (Sweden)

    Thompson Kara

    2010-12-01

    Full Text Available Abstract Background Despite lack of outward signs, most individuals after non-disabling stroke (NDS and transient ischemic attack (TIA have significant cardiovascular and cerebrovascular disease and are at high risk of a major stroke, hospitalization for other vascular events, or death. Most have multiple modifiable risk factors (e.g., hypertension, physical inactivity, hyperlipidaemia, diabetes, tobacco consumption, psychological stress. In addition, accelerated rates of depression, cognitive decline, and poor quality of sleep have been reported following TIA, which correlate with poor functional outcomes and reduced quality of life. Thus, NSD and TIA are important warning signs that should not be overlooked. The challenge is not unlike that facing other 'silent' conditions - to identify a model of care that is effective in changing people's current behaviors in order to avert further morbidity. Methods/Design A single blind, randomized controlled trial will be conducted at two sites to compare the effectiveness of a program of rehabilitative exercise and education versus usual care in modifying vascular risk factors in adults after NDS/TIA. 250 adults within 90 days of being diagnosed with NDS/TIA will be randomly allocated to a 12-week program of exercise and education (PREVENT or to an outpatient clinic assessment and discussion of secondary prevention recommendations with return clinic visits as indicated (USUAL CARE. Primary outcome measures will include blood pressure, waist circumference, 12-hour fasting lipid profile, and 12-hour fasting glucose/hemoglobin A1c. Secondary measures will include exercise capacity, walking endurance, physical activity, cognitive function, depression, goal attainment and health-related quality of life. Outcome assessment will be conducted at baseline, post-intervention, and 6- and 12-month follow-ups. Direct health care costs incurred over one year by PREVENT versus USUAL CARE participants will also be

  7. Involvement of individual subsites and secondary substrate binding sites in multiple attack on amylose by barley alpha-amylase

    DEFF Research Database (Denmark)

    Kramhøft, Birte; Bak-Jensen, Kristian Sass; Mori, Haruhide

    2005-01-01

    Barley alpha-amylase 1 (AMY1) hydrolyzed amylose with a degree of multiple attack (DMA) of 1.9; that is, on average, 2.9 glycoside bonds are cleaved per productive enzyme-substrate encounter. Six AMY1 mutants, spanning the substrate binding cleft from subsites -6 to +4, and a fusion protein, AMY1...... translocation of substrate in the binding cleft upon the initial cleavage to produce G6-G10, essentially independent of subsite mutations, and short-distance moves resulting in individually very different rates of release of G1-G4. Accordingly, the degree of multiple attack as well as the profile of products...

  8. Detection and Prevention of Denial of Service (DoS Attacks in Mobile Ad Hoc Networks using Reputation-based Incentive Schemes

    Directory of Open Access Journals (Sweden)

    Mieso, K Denko

    2005-08-01

    Full Text Available Mobile ad hoc networks (MANETs are dynamic mobile networks that can be formed in the absence of any pre-existing communication infrastructure. In addition to node mobility, a MANET is characterized by limited resources such as bandwidth, battery power, and storage space. The underlying assumption in MANETs is that the intermediate nodes cooperate in forwarding packets. However, this assumption does not hold in commercial and emerging civilian applications. MANETs are vulnerable to Denial of Service (DoS due to their salient characteristics. There is a need to provide an incentive mechanism that can provide cooperation among nodes in the network and improve overall network performance by reducing DoS attacks. In this paper, we propose a reputation-based incentive mechanism for detecting and preventing DoS attacks. DoS attacks committed by selfish and malicious nodes were investigated. Our scheme motivates nodes to cooperate and excludes them from the network only if they fail to do so. We evaluated the performance of our scheme using the packet delivery ratio, the routing and communication overhead, and misbehaving node detection in a discrete event-simulation environment. The results indicate that a reputation-based incentive mechanism can significantly reduce the effect of DoS attacks and improve performance in MANETs.

  9. 76 FR 81959 - Notice of Proposed Information Collection: Comment Request; Homelessness Prevention Study Site...

    Science.gov (United States)

    2011-12-29

    ... Information Collection: Comment Request; Homelessness Prevention Study Site Visits AGENCY: Office of the Chief.... This Notice also lists the following information: Title of Proposal: Homelessness Prevention Study Site... of the Paperwork Reduction Act requirements associated with HUD's Homelessness Prevention Study Site...

  10. Blocking of Brute Force Attack

    OpenAIRE

    M.Venkata Krishna Reddy

    2012-01-01

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it co...

  11. The Violence Prevention Community Meeting: A Multi-Site Study.

    Science.gov (United States)

    Lanza, Marilyn; Ridenour, Marilyn; Hendricks, Scott; Rierdan, Jill; Zeiss, Robert; Schmidt, Satu; Lovelace, Jeff; Amandus, Harlan

    2016-06-01

    The Violence Prevention Community Meeting (VPCM) is a specialized form of community meeting in which avoiding violence and promoting non-violent problem solving and interpersonal civility are focal points. A nationwide study to assess the VPCM as an effective intervention to reduce workplace violence was undertaken. Seven acute locked psychiatric units of the Veterans Health Administration (VHA) throughout the United States participated in the study. All patients and all staff on the seven in-patient locked psychiatry units participated in the intervention (VPCM) or as a control (treatment as usual). The study was 21weeks at each site. The three time periods were pre-treatment weeks 1-3, treatment weeks 4-18, and post-treatment weeks 19-21. The VPCM was conducted during the treatment weeks. Overall rates of aggression declined by 0.6% (95% CI: -5.6%, 6.5%; nonsignificant) per week in the intervention hospitals and by 5.1% (95% CI: 0.4%, 9.6%; significant) per week for the control hospitals. Aggression decreased for both the intervention and control hospitals which could be due to enrollment in a research study and thus being more aware of their ability to address workplace violence at their site. Published by Elsevier Inc.

  12. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  13. Distribution of nuclease attack sites and complexity of DNA in the products of post-irradiation degradiation of rat thymus chromatin

    International Nuclear Information System (INIS)

    Zvonareva, N.B.; Zhivotovsky, B.D.; Hanson, K.P.

    1983-01-01

    The distribution of nuclease attack sites in chromatin has been studied on the basis of the quantitative relationship of the single- and double-stranded fragments of various lengths in the products of post-irradiation degradation of chromatin (PDN). It has been shown that in irradiated thymocytes internucleosome degradation of chromatin occurs and the products of the enzymic digestion of chromatin derive from randomly distributed genome areas accumulate. Analysis of the reassociation curves has not shown any differences in the complexity of the PDN fractions and total DNA. (author)

  14. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  15. Stroke Care 1 Medical treatment in acute and long-term secondary prevention after transient ischaemic attack and ischaemic stroke

    NARCIS (Netherlands)

    Rothwell, Peter M.; Algra, Ale; Amarenco, Pierre

    2011-01-01

    Stroke is a major cause of death and disability worldwide. Without improvements in prevention, the burden will increase during the next 20 years because of the ageing population, especially in developing countries. Major advances have occurred in secondary prevention during the past three decades,

  16. Heart Attack

    Science.gov (United States)

    ... properly causes your body's blood sugar levels to rise, increasing your risk of heart attack. Metabolic syndrome. This occurs when you have obesity, high blood pressure and high blood sugar. Having metabolic ...

  17. Heart Attack

    Science.gov (United States)

    ... family history of heart attack race – African Americans, Mexican Americans, Native Americans, and native Hawaiians are at ... Your doctor will prescribe the medicines that are right for you. If you have had a heart ...

  18. Securing public transportation systems an integrated decision analysis framework for the prevention of terrorist attacks as example

    CERN Document Server

    Brauner, Florian

    2017-01-01

    Florian Brauner addresses the risk reduction effects of security measures (SecMe) as well as economic and social effects using terrorist threats in public transportation as use case. SecMe increase the level of security but cause interferences and restrictions for customers (e.g. privacy). This study identifies the interferences and analyzes the acceptance with an empirical survey of customers. A composite indicator for the acceptance of different SecMe is developed and integrated into a risk management framework for multi-criteria decision analysis achieving the right balance of risk reduction, costs, and social acceptance. Contents Assessment of Security Measures for Risk Management Measurement of Objective Effectiveness of Security Measures Against Terrorist Attacks Determination of Subjective Effects of Security Measures (Customer Acceptance Analysis) Cost Analysis of Security Measures Multi-Criteria Decision Support Systems Target Groups Scientists with Interest in Civil Security Research Providers and S...

  19. Multi-constituent cardiovascular pills (MCCP)--challenges and promises of population-based prophylactic drug therapy for prevention of heart attack.

    Science.gov (United States)

    Jamieson, Michael J; Naghavi, Morteza

    2007-01-01

    Risk factors for atherosclerotic cardiovascular disease (CVD) are highly co-prevalent but poorly identified and treated. The Screening for Heart Attack Prevention and Education (SHAPE) Task Force from the Association for Eradication of Heart Attack (AEHA) has recently proposed a new strategy that recommends screening for subclinical atherosclerosis and implementing aggressive treatment of "vulnerable patients". The Task Force has also envisioned future developments that may shift mass screening strategies to mass prophylactic therapy. The "Polypill" concept, introduced by Wald and Law suggests a combination of statin, low-dose antihypertensives, aspirin and folic acid, in a single pill, taken prophylactically by high risk population can cut CVD event rates by as much as 80%. In this communication, we review the challenges and promises of such a strategy. "Polypill" is but one of an astronomical number of possible multiconstituent pills (MCCP). Attractive as the MCCP concept is, it lacks evidence from randomized controlled trials, and begs numerous questions about the credibility of the concept, the design and synthesis of such complex pills, pharmacokinetics, pharmacodynamics, bioequivalence, "class" vs. unique properties, interactions, evidence of clinical efficacy and safety, regulatory approval, post-marketing surveillance, prescription vs. over-the-counter use, responsibility for initiating and monitoring therapy, patient education, counterfeiting and importation, reimbursement, advertisement, patent protection, commercial viability, etc. If these issues are favorably addressed, MCCP stand to dramatically change the manner in which CVD is prevented particularly in developing societies. Notwithstanding, assuming low commercial interests, realizing the promises of MCCP will demand serious attention from national public health policymakers. The clinical and regulatory implications of population-based secondary prevention (which rely on a different evidence base

  20. When Sinuses Attack! (For Kids)

    Science.gov (United States)

    ... First Aid & Safety Doctors & Hospitals Videos Recipes for Kids Kids site Sitio para niños How the Body Works ... Search English Español When Sinuses Attack! KidsHealth / For Kids / When Sinuses Attack! What's in this article? What ...

  1. Implementation of Telephone-Based Secondary Preventive Intervention after Stroke and Transient Ischemic Attack - Participation Rate, Reasons for Nonparticipation and One-Year Mortality

    Directory of Open Access Journals (Sweden)

    Anna-Lotta Irewall

    2014-02-01

    Full Text Available Background and Purpose: Patients who experience a stroke or transient ischemic attack (TIA are known to be at high risk of subsequent vascular events, underscoring the need for secondary preventive intervention. However, previous studies have indicated insufficiency in the implementation of secondary prevention, emphasizing the need to develop effective methods of follow-up. In the present study, we examined the potential of implementing a telephone-based, nurse-led, secondary preventive follow-up in stroke and TIA patients on a population level by analyzing the participation rate, reasons for nonparticipation, and one-year mortality. Methods: Between January 1, 2010 and December 31, 2011, all patients admitted to Östersund hospital, Sweden, and diagnosed with either stroke or TIA were considered for inclusion into the secondary preventive follow-up. Baseline data were collected at the hospital, and reasons for nonparticipation were documented. Multivariate logistic regression was performed to identify predictors of the patient decision not to participate and to explore independent associations between baseline characteristics and exclusion. A one-year follow-up of mortality was also performed; the survival functions of the three groups (included, excluded, declining participation was calculated using the Kaplan-Meier estimator. Results: From a total of 810 identified patients, 430 (53.1% were included in the secondary preventive follow-up, 289 (35.7% were excluded mainly due to physical or cognitive disability, and 91 (11.2% declined participation. Age ≥85 years, ischemic and hemorrhagic stroke, modified Rankin scale score >3, body mass index ≥25, congestive heart failure, and lower education level were independently associated with exclusion, whereas lower education level was the only factor independently associated with the patient decision not to participate. Exclusion was associated with a more than 12 times higher risk of mortality

  2. Teamwork and Collaboration for Prevention of Surgical Site Infections.

    Science.gov (United States)

    Dellinger, E Patchen

    2016-04-01

    The surgeon has been regarded as the "captain of the ship" in the operating room (OR) for many years, but cannot accomplish successful operative intervention without the rest of the team. Review of the pertinent English-language literature. Many reports demonstrate very different impressions of teamwork and communication in the OR held by different members of the surgical team. Objective measures of teamwork and communication demonstrate a reduction in complications including surgical site infections with improved teamwork and communication, with fewer distractions such as noise, and with effective use of checklists. Efforts to improve teamwork and communication and promote the effective use of checklists promote patient safety and improved outcomes for patients with reduction in surgical site infections.

  3. Risk of stroke and cardiovascular events after ischemic stroke or transient ischemic attack in patients with type 2 diabetes or metabolic syndrome: secondary analysis of the Stroke Prevention by Aggressive Reduction in Cholesterol Levels (SPARCL) trial

    DEFF Research Database (Denmark)

    Callahan, Alfred; Amarenco, Pierre; Goldstein, Larry B

    2011-01-01

    To perform a secondary analysis of the Stroke Prevention by Aggressive Reduction in Cholesterol Levels (SPARCL) trial, which tested the effect of treatment with atorvastatin in reducing stroke in subjects with a recent stroke or transient ischemic attack, to explore the effects of treatment...

  4. Frequency and prevention of laparoscopic port site infection.

    Science.gov (United States)

    Taj, Muhammad Naeem; Iqbal, Yasmeen; Akbar, Zakia

    2012-01-01

    The present study was conducted to evaluate the usefulness and safety of the nonpowder surgical glove for extraction of the gallbladder in laparoscopic cholecystectomy. The study was carried out in Capital Hospital Islamabad and in a private hospital. The duration of study was from March 2009 to March 2012. This was an observational study carried out in 492 patients who underwent laparoscopic cholecystectomy using the surgical glove for extraction of the gallbladder and compared with the conventional method of gall bladder removal in two hospitals were analyzed. The operative findings, port site infection and co morbid conditions were evaluated. Postoperative wound infection was found in 27 (5.48%) of 492 cases. Umbilical port infection was found in 26 (5.28%) of cases in which gall bladder was removed without endogloves and only one case (0.2%) had infection when gall bladder was removed with the endogloves. Wound infection was more in acute cholecystitis (25.9%) and empyema of Gall Bladder (44.4%). Among the co morbid conditions, diabetes mellitus has got higher frequency of wound infection (44%). The use of the surgical glove for extraction of the gallbladder is safe, cheap, simple and potentially reduces significant morbidity. Its routine use at laparoscopic cholecystectomy is mandatory in all cases.

  5. On-site and off-site forensic analysis capabilities for proliferation and terrorism prevention

    International Nuclear Information System (INIS)

    Whipple, R.E.; Nunes, P.J.; Reynolds, J.G.; Alcaraz, A.; Hart, B.R.

    2004-01-01

    Full text: We will present current on-site technologies that can be utilized for the screening of explosives, chemical agents, and environmental contaminants. These techniques must have the capability to detect various hazardous materials at very low levels, since they pose a major challenge for first responders. Specifically, the technology must detect concealed explosives or chemical agents on-site rapidly. Lawrence Livermore National Laboratory (LLNL) is currently developing several different high explosive screening and detection technologies for field use. Two technologies that have demonstrated an ability to screen for explosives at low levels are colorimetric spot tests and thin layer chromatography (TLC). Another technology that has demonstrated usefulness for the on-site analysis of unknowns is portable gas chromatography-mass spectrometry (GC-MS) with solid phase micro-extraction (SPME) sampling. Several examples utilizing these technologies and their usefulness will be presented. In addition to developing on-site screening methods, LLNL is an Organization for the Prohibition of Chemical Weapons (OPCW) designated laboratory and is certified to accept CW suspect samples. Currently, LLNL is expanding its ISO-17025 certification to include nuclear forensics and explosives. These off-site forensic analysis capabilities and certified procedures will support the needs for homeland security. We will highlight some of the ISO-17025 requirements to accredit procedures, handle samples, and reports. Work performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory under contract W-7405-ENG-48

  6. On-site and off-site forensic analysis capabilities for proliferation and terrorism prevention

    International Nuclear Information System (INIS)

    Hart, B.R.; Whipple, R.E.; Nunes, P.J.; Reynolds, J.G.; Alcaraz, A.

    2004-01-01

    We present current on-site technologies that can be utilized for the screening of explosives, chemical agents, and environmental contaminants. These techniques must have the capability to detect various hazardous materials at very low levels, since they pose a major challenge for first responders. Specifically, the technology must detect concealed explosives or chemical agents on-site rapidly. Lawrence Livermore National Laboratory (LLNL) is currently developing several different high explosive screening and detection technologies for field use. Two technologies that have demonstrated an ability to screen for explosives at low levels are colorimetric spot tests and thin layer chromatography (TLC). Another technology that has demonstrated usefulness for the on-site analysis of unknowns is portable gas chromatography-mass spectrometry (GC-MS) with solid phase micro-extraction (SPME) sampling. Several examples utilizing these technologies and their usefulness will be presented. In addition to developing on-site screening methods, LLNL is an Organization for the Prohibition of Chemical Weapons (OPCW) designated laboratory and is certified to accept CW suspect samples. Currently, LLNL is expanding its ISO-17025 certification to include nuclear forensics and explosives. These off-site forensic analysis capabilities and certified procedures will support the needs for homeland security. We will highlight some of the ISO-17025 requirements to accredit procedures, handle samples, and reports. Work performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory under contract W-7405-ENG-48. (author)

  7. Coronary heart disease risk in patients with stroke or transient ischemic attack and no known coronary heart disease: findings from the Stroke Prevention by Aggressive Reduction in Cholesterol Levels (SPARCL) trial

    DEFF Research Database (Denmark)

    Amarenco, Pierre; Goldstein, Larry B; Sillesen, Henrik

    2010-01-01

    Noncoronary forms of atherosclerosis (including transient ischemic attacks or stroke of carotid origin or >50% stenosis of the carotid artery) are associated with a 10-year vascular risk of >20% and are considered as a coronary heart disease (CHD) -risk equivalent from the standpoint of lipid...... management. The Stroke Prevention by Aggressive Reduction in Cholesterol Levels (SPARCL) trial included patients with stroke or transient ischemic attack and no known CHD regardless of the presence of carotid atherosclerosis. We evaluated the risk of developing clinically recognized CHD in SPARCL patients....

  8. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Ahmed, Z.; Nazir, B.; Zafar, M.F.; Anwar, M.M.; Azam, K.; Asar, A.U.

    2007-01-01

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  9. Identifying diabetes knowledge network nodes as sites for a diabetes prevention program.

    Science.gov (United States)

    Gesler, Wilbert M; Arcury, Thomas A; Skelly, Anne H; Nash, Sally; Soward, April; Dougherty, Molly

    2006-12-01

    This paper reports on the methods used and results of a study that identified specific places within a community that have the potential to be sites for a diabetes prevention program. These sites, termed diabetes knowledge network nodes (DKNNs), are based on the concept of socio-spatial knowledge networks (SSKNs), the web of social relationships within which people obtain knowledge about type 2 diabetes. The target population for the study was working poor African Americans, Latinos, and European Americans of both sexes in a small rural southern town who had not been diagnosed with diabetes. Information was collected from a sample of 121 respondents on the places they visited in carrying out their daily activities. Data on number of visits to specific sites, degree of familiarity with these sites, and ratings of sites as places to receive diabetes information were used to develop three categories of DKNNs for six subgroups based on ethnicity and sex. Primary potential sites of importance to one or more subgroups included churches, grocery stores, drugstores, the local library, a beauty salon, laundromats, a community service agency, and a branch of the County Health Department. Secondary potential sites included gas stations, restaurants, banks, and post offices. Latent potential sites included three medical facilities. Most of the DKNNs were located either in the downtown area or in one of two shopping areas along the most used highway that passed through the town. The procedures used in this study can be generalized to other communities and prevention programs for other chronic diseases.

  10. Hanford Site guide for preparing and maintaining generator group pollution prevention program documentation

    International Nuclear Information System (INIS)

    Place, B.G.

    1998-01-01

    This document provides guidance to generator groups for preparing and maintaining documentation of Pollution Prevention Waste Minimization (P2/WMin) Program activities. The guidance is one of a hierarchical series that includes the Hanford Site Waste Minimization and Pollution Prevention Awareness Program Plan (DOE-RL, 1998a) and Prime contractor implementation plans describing programs required by Resource Conservation and Recovery Act of 1976 (RCRA) 3002(b) and 3005(h) (RCRA and EPA, 1994). Documentation guidance for the following five P2/WMin elements are discussed: Fiscal Year (FY) Goals; Budget and Staffing; Waste Minimization (WMin) Assessments (WMAs); Quarterly Pollution Prevention (P2) Reporting WMin Certification

  11. Hanford Site Guide for Preparing and Maintaining Fenerator Group Pollution Prevention Program Documentation

    International Nuclear Information System (INIS)

    PLACE, B.G.

    1999-01-01

    This document provides guidance to generator groups for preparing and maintaining documentation of Pollution Prevention/Waste Minimization (P2/WMin) Program activities. The guidance is one of a hierarchical series that includes the Hanford Site Waste Minimization and Pollution Prevention Awareness Program Plan (DOE-RL, 1998a) and Prime Contractor implementation plans describing programs required by Resource Conservation and Recovery Act of 1976 (RCRA) 3002(b) and (300501) (RCRA and EPA, 1994). Documentation guidance for the following five P2/WMin elements are discussed: Fiscal Year (FY) Goals; Budget and Staffing; Waste Minimization (WMinn ) Assessments (WMAs); Pollution Prevention (P2) Reporting; WMin Certification

  12. Siting criteria based on the prevention of deterministic effects from plutonium inhalation exposures

    International Nuclear Information System (INIS)

    Sorensen, S.A.; Low, J.O.

    1998-01-01

    Siting criteria are established by regulatory authorities to evaluate potential accident scenarios associated with proposed nuclear facilities. The 0.25 Sv (25 rem) siting criteria adopted in the United States has been historically based on the prevention of deterministic effects from acute, whole-body exposures. The Department of Energy has extended the applicability of this criterion to radionuclides that deliver chronic, organ-specific irradiation through the specification of a 0.25 Sv (25 rem) committed effective dose equivalent siting criterion. A methodology is developed to determine siting criteria based on the prevention of deterministic effects from inhalation intakes of radionuclides which deliver chronic, organ-specific irradiation. Revised siting criteria, expressed in terms of committed effective dose equivalent, are proposed for nuclear facilities that handle primarily plutonium compounds. The analysis determined that a siting criterion of 1.2 Sv (120 rem) committed effective dose equivalent for inhalation exposures to weapons-grade plutonium meets the historical goal of preventing deterministic effects during a facility accident scenario. The criterion also meets the Nuclear Regulatory Commission and Department of Energy Nuclear Safety Goals provided that the frequency of the accident is sufficiently low

  13. Oak Ridge K-25 Site chlorinated solvent pollution prevention opportunity assessment

    International Nuclear Information System (INIS)

    1994-08-01

    A pollution prevention opportunity assessment (PPOA) was conducted at the Oak Ridge K-25 Site to identify opportunities to reduce and better manage the use of chlorinated solvents. At the K-25 Site, 67 control areas were examined for their potential use of chlorinated solvents. Of these areas, 27 were found to be using (1) chlorinated solvents for cleaning, degreasing, and lubricating; (2) laboratory standards and solvents; and (3) test medium. Current management practices encourage the identification and use of nonhazardous chemicals, including the use of chlorinated solvents. The main pollution prevention principles are source reduction and recycling, and a number of pollution prevention options based on these principles were identified and evaluated as part of this chlorinated solvent PPOA. Source reduction options evaluated for the K-25 Site include the substitution of chlorinated solvents with nonchlorinated solvents. Recycling was identified for those areas that would benefit most from the reuse of the chlorinated solvents in use. The pollution prevention options that offer the greatest opportunity for success at the K-25 Site are the implementation of substitutes at the 10 control areas using chlorinated solvents for cleaning, degreasing, and lubrication. A change in the process may be all that is needed to eliminate the use of a chlorinated solvent. Once a decision is made to implement a substitution, the information should be communicated to all shops and laboratories. Another option to consider is the installation of recycling units to recycle the large amounts of methylene chloride used in the analytical sampling procedure

  14. Oak Ridge K-25 Site chlorinated solvent pollution prevention opportunity assessment

    Energy Technology Data Exchange (ETDEWEB)

    1994-08-01

    A pollution prevention opportunity assessment (PPOA) was conducted at the Oak Ridge K-25 Site to identify opportunities to reduce and better manage the use of chlorinated solvents. At the K-25 Site, 67 control areas were examined for their potential use of chlorinated solvents. Of these areas, 27 were found to be using (1) chlorinated solvents for cleaning, degreasing, and lubricating; (2) laboratory standards and solvents; and (3) test medium. Current management practices encourage the identification and use of nonhazardous chemicals, including the use of chlorinated solvents. The main pollution prevention principles are source reduction and recycling, and a number of pollution prevention options based on these principles were identified and evaluated as part of this chlorinated solvent PPOA. Source reduction options evaluated for the K-25 Site include the substitution of chlorinated solvents with nonchlorinated solvents. Recycling was identified for those areas that would benefit most from the reuse of the chlorinated solvents in use. The pollution prevention options that offer the greatest opportunity for success at the K-25 Site are the implementation of substitutes at the 10 control areas using chlorinated solvents for cleaning, degreasing, and lubrication. A change in the process may be all that is needed to eliminate the use of a chlorinated solvent. Once a decision is made to implement a substitution, the information should be communicated to all shops and laboratories. Another option to consider is the installation of recycling units to recycle the large amounts of methylene chloride used in the analytical sampling procedure.

  15. Randomized clinical trial comparing two options for postoperative incisional care to prevent poststernotomy surgical site infections

    NARCIS (Netherlands)

    Segers, Patrique; de Jong, Antonius P.; Spanjaard, Lodewijk; Ubbink, Dirk T.; de Mol, Bas A. J. M.

    2007-01-01

    Surgical site infection (SSI) remains an important complication of cardiac surgery. Prevention is important, as SSI is associated with high mortality and morbidity rates. Incisional care is an important daily issue for surgeons. However, there is still scant scientific evidence on which guidelines

  16. Strategies to Prevent Surgical Site Infections in Acute Care Hospitals: 2014 Update

    Science.gov (United States)

    Anderson, Deverick J.; Podgorny, Kelly; Berríos-Torres, Sandra I.; Bratzler, Dale W.; Dellinger, E. Patchen; Greene, Linda; Nyquist, Ann-Christine; Saiman, Lisa; Yokoe, Deborah S.; Maragakis, Lisa L.; Kaye, Keith S.

    2014-01-01

    PURPOSE Previously published guidelines are available that provide comprehensive recommendations for detecting and preventing healthcare-associated infections (HAIs). The intent of this document is to highlight practical recommendations in a concise format designed to assist acute care hospitals in implementing and prioritizing their surgical site infection (SSI) prevention efforts. This document updates “Strategies to Prevent Surgical Site Infections in Acute Care Hospitals,”1 published in 2008. This expert guidance document is sponsored by the Society for Healthcare Epidemiology of America (SHEA) and is the product of a collaborative effort led by SHEA, the Infectious Diseases Society of America (IDSA), the American Hospital Association (AHA), the Association for Professionals in Infection Control and Epidemiology (APIC), and The Joint Commission, with major contributions from representatives of a number of organizations and societies with content expertise. The list of endorsing and supporting organizations is presented in the introduction to the 2014 updates.2 PMID:24799638

  17. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  18. Improving Surveillance and Prevention of Surgical Site Infection in Pediatric Cardiac Surgery.

    Science.gov (United States)

    Cannon, Melissa; Hersey, Diane; Harrison, Sheilah; Joy, Brian; Naguib, Aymen; Galantowicz, Mark; Simsic, Janet

    2016-03-01

    Postoperative cardiovascular surgical site infections are preventable events that may lead to increased morbidity, mortality, and health care costs. To improve surgical wound surveillance and reduce the incidence of surgical site infections. An institutional review of surgical site infections led to implementation of 8 surveillance and process measures: appropriate preparation the night before surgery and the day of surgery, use of appropriate preparation solution in the operating room, appropriate timing of preoperative antibiotic administration, placement of a photograph of the surgical site in the patient's chart at discharge, sending a photograph of the surgical site to the patient's primary care physician, 30-day follow-up of the surgical site by an advanced nurse practitioner, and placing a photograph of the surgical site obtained on postoperative day 30 in the patient's chart. Mean overall compliance with the 8 measures from March 2013 through February 2014 was 88%. Infections occurred in 10 of 417 total operative cases (2%) in 2012, in 8 of 437 total operative cases (2%) in 2013, and in 7 of 452 total operative cases (1.5%) in 2014. Institution of the surveillance process has resulted in improved identification of suspected surgical site infections via direct rather than indirect measures, accurate identification of all surgical site infections based on definitions of the National Healthcare Safety Network, collaboration with all persons involved, and enhanced communication with patients' family members and referring physicians. ©2016 American Association of Critical-Care Nurses.

  19. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  20. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  1. Site-Specific Antioxidative Therapy for Prevention of Atherosclerosis and Cardiovascular Disease

    Directory of Open Access Journals (Sweden)

    Hajime Otani

    2013-01-01

    Full Text Available Oxidative stress has been implicated in pathophysiology of aging and age-associated disease. Antioxidative medicine has become a practice for prevention of atherosclerosis. However, limited success in preventing cardiovascular disease (CVD in individuals with atherosclerosis using general antioxidants has prompted us to develop a novel antioxidative strategy to prevent atherosclerosis. Reducing visceral adipose tissue by calorie restriction (CR and regular endurance exercise represents a causative therapy for ameliorating oxidative stress. Some of the recently emerging drugs used for the treatment of CVD may be assigned as site-specific antioxidants. CR and exercise mimetic agents are the choice for individuals who are difficult to continue CR and exercise. Better understanding of molecular and cellular biology of redox signaling will pave the way for more effective antioxidative medicine for prevention of CVD and prolongation of healthy life span.

  2. Improving surgical site infection prevention practices through a multifaceted educational intervention.

    LENUS (Irish Health Repository)

    Owens, P

    2015-03-01

    As part of the National Clinical Programme on healthcare-associated infection prevention, a Royal College of Surgeons in Ireland (RCSI) and Royal College of Physicians of Ireland (RCPI) working group developed a quality improvement tool for prevention of surgical site infection (SS). We aimed to validate the effectiveness of an educational campaign, which utilises this quality improvement tool to prevent SSI in a tertiary hospital. Prior to the SSI educational campaign, surgical patients were prospectively audited and details of antibiotic administration recorded. Prophylactic antibiotic administration recommendations were delivered via poster and educational presentations. Post-intervention, the audit was repeated. 50 patients were audited pre-intervention, 45 post-intervention. Post-intervention, prophylaxis within 60 minutes prior to incision increased from 54% to 68% (p = 0.266). Appropriate postoperative prescribing improved from 71% to 92% (p = 0.075). A multifaceted educational program may be effective in changing SSI prevention practices.

  3. Baseline Quality of Life and Risk of Stroke in the ALLHAT Study (Antihypertensive and Lipid-Lowering Treatment to Prevent Heart Attack Trial).

    Science.gov (United States)

    Shams, Tanzila; Auchus, Alexander P; Oparil, Suzanne; Wright, Clinton B; Wright, Jackson; Furlan, Anthony J; Sila, Cathy A; Davis, Barry R; Pressel, Sara; Yamal, Jose-Miguel; Einhorn, Paula T; Lerner, Alan J

    2017-11-01

    The visual analogue scale is a self-reported, validated tool to measure quality of life (QoL). Our purpose was to determine whether baseline QoL predicted strokes in the ALLHAT study (Antihypertensive and Lipid Lowering Treatment to Prevent Heart Attack Trial) and evaluate determinants of poststroke change in QoL. In the ALLHAT study, among the 33 357 patients randomized to treatment arms, 1525 experienced strokes; 1202 (79%) strokes were nonfatal. This study cohort includes 32 318 (97%) subjects who completed the baseline visual analogue scale QoL estimate. QoL was measured on a visual analogue scale and adjusted using a Torrance transformation (transformed QoL [TQoL]). Kaplan-Meier curves and adjusted proportional hazards analyses were used to estimate the effect of TQoL on the risk of stroke, on a continuous scale (0-1) and by quartiles (≤0.81, >0.81≤0.89, >0.89≤0.95, >0.95). We analyzed the change from baseline to first poststroke TQoL using adjusted linear regression. After adjusting for multiple stroke risk factors, the hazard ratio for stroke events for baseline TQoL was 0.93 (95% confidence interval, 0.89-0.98) per 0.1 U increase. The lowest baseline TQoL quartile had a 20% increased stroke risk (hazard ratio=1.20 [95% confidence interval, 1.00-1.44]) compared with the reference highest quartile TQoL. Poststroke TQoL change was significant within all treatment groups ( P ≤0.001). Multivariate regression analysis revealed that baseline TQoL was the strongest predictor of poststroke TQoL with similar results for the untransformed QoL. The lowest baseline TQoL quartile had a 20% higher stroke risk than the highest quartile. Baseline TQoL was the only factor that predicted poststroke change in TQoL. URL: http://www.clinicaltrials.gov. Unique identifier: NCT00000542. © 2017 American Heart Association, Inc.

  4. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  5. Wrong-site nerve blocks: A systematic literature review to guide principles for prevention.

    Science.gov (United States)

    Deutsch, Ellen S; Yonash, Robert A; Martin, Donald E; Atkins, Joshua H; Arnold, Theresa V; Hunt, Christina M

    2018-05-01

    Wrong-site nerve blocks (WSBs) are a significant, though rare, source of perioperative morbidity. WSBs constitute the most common type of perioperative wrong-site procedure reported to the Pennsylvania Patient Safety Authority. This systematic literature review aggregates information about the incidence, patient consequences, and conditions that contribute to WSBs, as well as evidence-based methods to prevent them. A systematic search of English-language publications was performed, using the PRISMA process. Seventy English-language publications were identified. Analysis of four publications reporting on at least 10,000 blocks provides a rate of 0.52 to 5.07 WSB per 10,000 blocks, unilateral blocks, or "at risk" procedures. The most commonly mentioned potential consequence was local anesthetic toxicity. The most commonly mentioned contributory factors were time pressure, personnel factors, and lack of site-mark visibility (including no site mark placed). Components of the block process that were addressed include preoperative nerve-block verification, nerve-block site marking, time-outs, and the healthcare facility's structure and culture of safety. A lack of uniform reporting criteria and divergence in the data and theories presented may reflect the variety of circumstances affecting when and how nerve blocks are performed, as well as the infrequency of a WSB. However, multiple authors suggest three procedural steps that may help to prevent WSBs: (1) verify the nerve-block procedure using multiple sources of information, including the patient; (2) identify the nerve-block site with a visible mark; and (3) perform time-outs immediately prior to injection or instillation of the anesthetic. Hospitals, ambulatory surgical centers, and anesthesiology practices should consider creating site-verification processes with clinician input and support to develop sustainable WSB-prevention practices. Copyright © 2017 Elsevier Inc. All rights reserved.

  6. Quality improvement initiative: Preventative Surgical Site Infection Protocol in Vascular Surgery.

    Science.gov (United States)

    Parizh, David; Ascher, Enrico; Raza Rizvi, Syed Ali; Hingorani, Anil; Amaturo, Michael; Johnson, Eric

    2018-02-01

    Objective A quality improvement initiative was employed to decrease single institution surgical site infection rate in open lower extremity revascularization procedures. In an attempt to lower patient morbidity, we developed and implemented the Preventative Surgical Site Infection Protocol in Vascular Surgery. Surgical site infections lead to prolonged hospital stays, adjunctive procedure, and additive costs. We employed targeted interventions to address the common risk factors that predispose patients to post-operative complications. Methods Retrospective review was performed between 2012 and 2016 for all surgical site infections after revascularization procedures of the lower extremity. A quality improvement protocol was initiated in January 2015. Primary outcome was the assessment of surgical site infection rate reduction in the pre-protocol vs. post-protocol era. Secondary outcomes evaluated patient demographics, closure method, perioperative antibiotic coverage, and management outcomes. Results Implementation of the protocol decreased the surgical site infection rate from 6.4% to 1.6% p = 0.0137). Patient demographics and comorbidities were assessed and failed to demonstrate a statistically significant difference among the infection and no-infection groups. Wound closure with monocryl suture vs. staple proved to be associated with decreased surgical site infection rate ( p site infections in the vascular surgery population are effective and necessary. Our data suggest that there may be benefit in the incorporation of MRSA and Gram-negative coverage as part of the Surgical Care Improvement Project perioperative guidelines.

  7. Strategy for Meeting the Secretary of Energy and Hanford Site FY 2001 Pollution Prevention Goals

    International Nuclear Information System (INIS)

    CLARK, D.E.

    2000-01-01

    The purpose of this strategy is to identify the Fiscal Year (FY) 2001 Hanford Site waste reduction, sanitary recycling and affirmative procurement goals and identify the action required to ensure that the Secretary of Energy's FY 2005 pollution prevention and the FY 2001 Hanford Site goals are met. The strategy and plan to ensure that the Secretary of Energy's routine waste reduction, recycling, cleanup/stabilization waste and affirmative procurement goals are met consists of four phases. The first phase is to ensure that the infrastructure is in place to support planning and organization. This phase involves ensuring that roles and responsibilities are identified; requirement documents are current; goals and successes are communicated; and accurate and current waste information is available. Roles and responsibilities are identified and the RL requirement documents (i.e., the Hanford Site Waste Minimization and Pollution Prevention Awareness Program Plan and Hanford Site Guide for Preparing and Maintaining Generator Group Pollution Prevention Program Documentation) will specify the Secretary of Energy's goals. Goals will be communicated formally and informally via the Hanford Reach, training sessions, meetings and correspondence. Sharing of pollution prevention successes and goal progress are encouraged at the Pollution Prevention/Waste Minimization (PZ/WMin) quarterly meetings. Existing site waste generation databases will be utilized to provide current waste generation data. The second phase of the strategy and plan is to establish and allocate goals by prime contractor (i.e. Fluor Hanford, Inc. (FH), Pacific Northwest National Laboratory (PNNL), Bechtel Hanford Inc. (BHI), and CH2MHill Hanford Group (CHG)). This requires determining current status toward meeting the Secretary of Energy's goals; establishing the Hanford Site FY goals, and allocating waste reduction goals by prime contractor. The third phase of the strategy and plan is goal implementation. This

  8. Gas attack

    Energy Technology Data Exchange (ETDEWEB)

    North, D.

    1977-08-01

    Consumersfirst Ltd. is reacting to deregulation with a massive advertising campaign. The gas utility is owned by Consumers Gas Energy Inc., and is struggling to hold onto its 35 per cent share of Ontario`s two million residential natural gas buyers. An industry analyst pointed out that deregulation could mean that Consumers` Gas has much to lose: customers, market share, control of the assets and control of the process. The Ontario Energy Board (OEB) however, had specified that Consumersfirst is not to proceed with paperwork to sign up new customers until the OEB issues a draft code-of-conduct that would prevent cross-subsidizing between regulated franchise holders. This has now been done, and several heavyweights such as Calgary-based Suncor Energy Inc., Union Gas of Chatham, Ontario, and the US-based Enron Corp. of Houston, have started campaigns to sign up potential consumers. It is predicted that brand loyalty will be a factor, but in the end, like long distance telephone rates, it will all come down to pricing, and a winning formula is not easy to find.

  9. Prevention of Localized Osteitis in Mandibular Third-Molar Sites Using Platelet-Rich Fibrin

    Directory of Open Access Journals (Sweden)

    Donald R. Hoaglin

    2013-01-01

    Full Text Available Purpose. To review our experience utilizing platelet rich fibrin (PRF, which is reported to aid in wound healing of extraction sites, for the prevention of localized osteitis following lower third-molar removal. Materials and Methods. PRF was placed in the mandibular third-molar extraction sites, 200 sites total, on 100 consecutive patients treated in our practice, by the authors. The patients were managed with standard surgical techniques, intraoperative IV antibiotic/steroid coverage, and routine postoperative narcotic analgesics/short-term steroid coverage. All patients were reevaluated for localized osteitis within 7–10 days of the surgery. A comparison group consisted of 100 consecutive patients who underwent bilateral removal of indicated mandibular wisdom teeth and did not receive PRF placement within the lower third molar surgical sites. Results. The incidence of localized osteitis (LO following removal of 200 lower third molars with simultaneous PRF placement within the extraction site was 1% (2 sites out of 200. The group of patients whose mandibular 3rd molar sockets were not treated with PRF demonstrated a 9.5% (19 sites out of 200 incidence of localized osteitis. The latter group also required 6.5 hours of additional clinical time to manage LO than the study group who received PRF. Conclusions. This retrospective review demonstrated that preventative treatment of localized osteitis can be accomplished using a low cost, autogenous, soluble, biologic material, PRF, that PRF enhanced third-molar socket healing/clot retention and greatly decreased the clinical time required for postoperative management of LO.

  10. Hanford Site Guide for Preparing and Maintaining Generator Group Pollution Prevention Documentation

    International Nuclear Information System (INIS)

    PLACE, B.G.

    2000-01-01

    This document provides guidance to generator groups for preparing and maintaining documentation of Pollution Prevention/Waste Minimization (P2/WMin) Program activities. The guidance is one of a hierarchical series that includes the Hanford Site Waste Minimization and Pollution Prevention Awareness Program Plan (DOE-RL, 2000) and Prime Contractor implementation plans describing programs required by Resource Conservation and Recovery Act of 1976 (RCRA) 3002(b) and 3005(h) (RCRA and EPA, 1994) and Department of Energy Acquisition Regulations (DEAR) (48 CFR 970.5204-2 and 48 CFR 970.5204-78). Documentation guidance for the following five P2/WMin elements is discussed: Fiscal Year (FY) Goals; Budget and Staffing; Pollution Prevention (P2) Reporting; WMin Certification; and Waste Minimization (WMin) Assessments (WMAs)

  11. Efficacy of a Community-Based Physical Activity Program KM2H2 for Stroke and Heart Attack Prevention among Senior Hypertensive Patients: A Cluster Randomized Controlled Phase-II Trial.

    Directory of Open Access Journals (Sweden)

    Jie Gong

    Full Text Available To evaluate the efficacy of the program Keep Moving toward Healthy Heart and Healthy Brain (KM2H2 in encouraging physical activities for the prevention of heart attack and stroke among hypertensive patients enrolled in the Community-Based Hypertension Control Program (CBHCP.Cluster randomized controlled trial with three waves of longitudinal assessments at baseline, 3 and 6 months post intervention.Community-based and patient-centered self-care for behavioral intervention in urban settings of China.A total of 450 participants diagnosed with hypertension from 12 community health centers in Wuhan, China were recruited, and were randomly assigned by center to receive either KM2H2 plus standard CBHCP care (6 centers and 232 patients or the standard care only (6 centers and 218 patients.KM2H2 is a behavioral intervention guided by the Transtheoretical Model, the Model of Personalized Medicine and Social Capital Theory. It consists of six intervention sessions and two booster sessions engineered in a progressive manner. The purpose is to motivate and maintain physical activities for the prevention of heart attack and stroke.Heart attack and stroke (clinically diagnosed, primary outcome, blood pressure (measured, secondary outcome, and physical activity (self-report, tertiary outcome were assessed at the individual level during the baseline, 3- and 6-month post-intervention.Relative to the standard care, receiving KM2H2 was associated with significant reductions in the incidence of heart attack (3.60% vs. 7.03%, p < .05 and stroke (5.11% vs. 9.90%, p<0.05, and moderate reduction in blood pressure (-3.72 mmHg in DBP and -2.92 mmHg in DBP at 6-month post-intervention; and significant increases in physical activity at 3- (d = 0.53, 95% CI: 0.21, 0.85 and 6-month (d = 0.45, 95% CI: 0.04, 0.85 post-intervention, respectively.The program KM2H2 is efficacious to reduce the risk of heart attack and stroke among senior patients who are on anti

  12. Patient engagement with surgical site infection prevention: an expert panel perspective

    Directory of Open Access Journals (Sweden)

    E. Tartari

    2017-05-01

    Full Text Available Abstract Despite remarkable developments in the use of surgical techniques, ergonomic advancements in the operating room, and implementation of bundles, surgical site infections (SSIs remain a substantial burden, associated with increased morbidity, mortality and healthcare costs. National and international recommendations to prevent SSIs have been published, including recent guidelines by the World Health Organization, but implementation into clinical practice remains an unresolved issue. SSI improvement programs require an integrative approach with measures taken during the pre-, intra- and postoperative care from the numerous stakeholders involved. The current SSI prevention strategies have focused mainly on the role of healthcare workers (HCWs and procedure related risk factors. The importance and influence of patient participation is becoming an increasingly important concept and advocated as a means to improve patient safety. Novel interventions supporting an active participative role within SSI prevention programs have not been assessed. Empowering patients with information they require to engage in the process of SSI prevention could play a major role for the implementation of recommendations. Based on available scientific evidence, a panel of experts evaluated options for patient involvement in order to provide pragmatic recommendations for pre-, intra- and postoperative activities for the prevention of SSIs. Recommendations were based on existing guidelines and expert opinion. As a result, 9 recommendations for the surgical patient are presented here, including a practice brief in the form of a patient information leaflet. HCWs can use this information to educate patients and allow patient engagement.

  13. Patient engagement with surgical site infection prevention: an expert panel perspective.

    Science.gov (United States)

    Tartari, E; Weterings, V; Gastmeier, P; Rodríguez Baño, J; Widmer, A; Kluytmans, J; Voss, A

    2017-01-01

    Despite remarkable developments in the use of surgical techniques, ergonomic advancements in the operating room, and implementation of bundles, surgical site infections (SSIs) remain a substantial burden, associated with increased morbidity, mortality and healthcare costs. National and international recommendations to prevent SSIs have been published, including recent guidelines by the World Health Organization, but implementation into clinical practice remains an unresolved issue. SSI improvement programs require an integrative approach with measures taken during the pre-, intra- and postoperative care from the numerous stakeholders involved. The current SSI prevention strategies have focused mainly on the role of healthcare workers (HCWs) and procedure related risk factors. The importance and influence of patient participation is becoming an increasingly important concept and advocated as a means to improve patient safety. Novel interventions supporting an active participative role within SSI prevention programs have not been assessed. Empowering patients with information they require to engage in the process of SSI prevention could play a major role for the implementation of recommendations. Based on available scientific evidence, a panel of experts evaluated options for patient involvement in order to provide pragmatic recommendations for pre-, intra- and postoperative activities for the prevention of SSIs. Recommendations were based on existing guidelines and expert opinion. As a result, 9 recommendations for the surgical patient are presented here, including a practice brief in the form of a patient information leaflet. HCWs can use this information to educate patients and allow patient engagement.

  14. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  15. Classifying network attack scenarios using an ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-03-01

    Full Text Available ) or to the target?s reputation. The Residue sub-phase refers to damage or artefacts of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example after the launch of a DDOS..., A. (1995). Hacking theft of $10 million from citibank revealed. Retrieved 10/10, 2011, from http://articles.latimes.com/1995-08-19/business/fi-36656_1_citibank-system Hurley, E. (2004). SCO site succumbs to DDoS attack. Retrieved 10/10, 2011, from...

  16. Design and implementation of an identification system in construction site safety for proactive accident prevention.

    Science.gov (United States)

    Yang, Huanjia; Chew, David A S; Wu, Weiwei; Zhou, Zhipeng; Li, Qiming

    2012-09-01

    Identifying accident precursors using real-time identity information has great potential to improve safety performance in construction industry, which is still suffering from day to day records of accident fatality and injury. Based on the requirements analysis for identifying precursor and the discussion of enabling technology solutions for acquiring and sharing real-time automatic identification information on construction site, this paper proposes an identification system design for proactive accident prevention to improve construction site safety. Firstly, a case study is conducted to analyze the automatic identification requirements for identifying accident precursors in construction site. Results show that it mainly consists of three aspects, namely access control, training and inspection information and operation authority. The system is then designed to fulfill these requirements based on ZigBee enabled wireless sensor network (WSN), radio frequency identification (RFID) technology and an integrated ZigBee RFID sensor network structure. At the same time, an information database is also designed and implemented, which includes 15 tables, 54 queries and several reports and forms. In the end, a demonstration system based on the proposed system design is developed as a proof of concept prototype. The contributions of this study include the requirement analysis and technical design of a real-time identity information tracking solution for proactive accident prevention on construction sites. The technical solution proposed in this paper has a significant importance in improving safety performance on construction sites. Moreover, this study can serve as a reference design for future system integrations where more functions, such as environment monitoring and location tracking, can be added. Copyright © 2011 Elsevier Ltd. All rights reserved.

  17. Consensus Bundle on Prevention of Surgical Site Infections After Major Gynecologic Surgery.

    Science.gov (United States)

    Pellegrini, Joseph E; Toledo, Paloma; Soper, David E; Bradford, William C; Cruz, Deborah A; Levy, Barbara S; Lemieux, Lauren A

    Surgical site infections are the most common complications of surgery in the United States. Of surgeries in women of reproductive age, hysterectomy is one of the most frequently performed, second only to cesarean birth. Therefore, prevention of surgical site infections in women undergoing gynecologic surgery is an ideal topic for a patient safety bundle. The primary purpose of this safety bundle is to provide recommendations that can be implemented into any surgical environment in an effort to reduce the incidence of surgical site infection. This bundle was developed by a multidisciplinary team convened by the Council on Patient Safety in Women's Health Care. The bundle is organized into four domains: Readiness, Recognition and Prevention, Response, and Reporting and Systems Learning. In addition to recommendations for practice, each of the domains stresses communication and teamwork between all members of the surgical team. Although the bundle components are designed to be adaptable to work in a variety of clinical settings, standardization within institutions is encouraged. Copyright © 2017 AWHONN, the Association of Women’s Health, Obstetric and Neonatal Nurses. Published by Elsevier Inc. All rights reserved.

  18. The role of oral antibiotics prophylaxis in prevention of surgical site infection in colorectal surgery.

    Science.gov (United States)

    Koullouros, Michalis; Khan, Nadir; Aly, Emad H

    2017-01-01

    Surgical site infection (SSI) continues to be a challenge in colorectal surgery. Over the years, various modalities have been used in an attempt to reduce SSI risk in elective colorectal surgery, which include mechanical bowel preparation before surgery, oral antibiotics and intravenous antibiotic prophylaxis at induction of surgery. Even though IV antibiotics have become standard practice, there has been a debate on the exact role of oral antibiotics. The primary aim was to identify the role of oral antibiotics in reduction of SSI in elective colorectal surgery. The secondary aim was to explore any potential benefit in the use of mechanical bowel preparation (MBP) in relation to SSI in elective colorectal surgery. Medline, Embase and the Cochrane Library were searched. Any randomised controlled trials (RCTs) or cohort studies after 1980, which investigated the effectiveness of oral antibiotic prophylaxis and/or MBP in preventing SSIs in elective colorectal surgery were included. Twenty-three RCTs and eight cohorts were included. The results indicate a statistically significant advantage in preventing SSIs with the combined usage of oral and systemic antibiotic prophylaxis. Furthermore, our analysis of the cohort studies shows no benefits in the use of MBP in prevention of SSIs. The addition of oral antibiotics to systemic antibiotics could potentially reduce the risk of SSIs in elective colorectal surgery. Additionally, MBP does not seem to provide a clear benefit with regard to SSI prevention.

  19. Randomized controlled trial of a coordinated care intervention to improve risk factor control after stroke or transient ischemic attack in the safety net: Secondary stroke prevention by Uniting Community and Chronic care model teams Early to End Disparities (SUCCEED).

    Science.gov (United States)

    Towfighi, Amytis; Cheng, Eric M; Ayala-Rivera, Monica; McCreath, Heather; Sanossian, Nerses; Dutta, Tara; Mehta, Bijal; Bryg, Robert; Rao, Neal; Song, Shlee; Razmara, Ali; Ramirez, Magaly; Sivers-Teixeira, Theresa; Tran, Jamie; Mojarro-Huang, Elizabeth; Montoya, Ana; Corrales, Marilyn; Martinez, Beatrice; Willis, Phyllis; Macias, Mireya; Ibrahim, Nancy; Wu, Shinyi; Wacksman, Jeremy; Haber, Hilary; Richards, Adam; Barry, Frances; Hill, Valerie; Mittman, Brian; Cunningham, William; Liu, Honghu; Ganz, David A; Factor, Diane; Vickrey, Barbara G

    2017-02-06

    Recurrent strokes are preventable through awareness and control of risk factors such as hypertension, and through lifestyle changes such as healthier diets, greater physical activity, and smoking cessation. However, vascular risk factor control is frequently poor among stroke survivors, particularly among socio-economically disadvantaged blacks, Latinos and other people of color. The Chronic Care Model (CCM) is an effective framework for multi-component interventions aimed at improving care processes and outcomes for individuals with chronic disease. In addition, community health workers (CHWs) have played an integral role in reducing health disparities; however, their effectiveness in reducing vascular risk among stroke survivors remains unknown. Our objectives are to develop, test, and assess the economic value of a CCM-based intervention using an Advanced Practice Clinician (APC)-CHW team to improve risk factor control after stroke in an under-resourced, racially/ethnically diverse population. In this single-blind randomized controlled trial, 516 adults (≥40 years) with an ischemic stroke, transient ischemic attack or intracerebral hemorrhage within the prior 90 days are being enrolled at five sites within the Los Angeles County safety-net setting and randomized 1:1 to intervention vs usual care. Participants are excluded if they do not speak English, Spanish, Cantonese, Mandarin, or Korean or if they are unable to consent. The intervention includes a minimum of three clinic visits in the healthcare setting, three home visits, and Chronic Disease Self-Management Program group workshops in community venues. The primary outcome is blood pressure (BP) control (systolic BP risk factors including lipids and hemoglobin A1c, (3) inflammation (C reactive protein [CRP]), (4) medication adherence, (5) lifestyle factors (smoking, diet, and physical activity), (6) estimated relative reduction in risk for recurrent stroke or myocardial infarction (MI), and (7) cost

  20. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  1. Solidarity under Attack

    DEFF Research Database (Denmark)

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  2. Pericarditis - after heart attack

    Science.gov (United States)

    ... include: A previous heart attack Open heart surgery Chest trauma A heart attack that has affected the thickness of your heart muscle Symptoms Symptoms include: Anxiety Chest pain from the swollen pericardium rubbing on the ...

  3. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  4. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  5. Pollution prevention opportunity assessment for the K-25 Site Steam Plant -- Level 3

    International Nuclear Information System (INIS)

    1995-09-01

    A Level 3 pollution prevention opportunity assessment (PPOA) was performed for the K-1501 Steam Plant at the K-25 Site. The primary objective was to identify and evaluate pollution prevention (P2) options to reduce the quantities of each waste stream generated by the Steam Plant. For each of the waste streams, P2 options were evaluated to first reduce the quantity of waste generated and second to recycle the waste. This report provides a process description of the facility; identification, evaluation, and recommendations of P2 options; an implementation schedule with funding sources; and conclusions. Largely for economic reasons, only 3 of the 14 P2 options are being recommended for implementation. All are source reduction options. When implemented, these three options are estimated to reduce the annual generation of waste by 658,412 kg and will result in a cost savings of approximately $29,232/year for the K-25 Site. The recommended options are to: install a flue gas return System in Boiler 7; reduce steam loss from traps; and increase lapse time between rinses. The four boilers currently in operation at the Steam Plant use natural gas or fuel oil as fuel sources

  6. Intraoperative technique as a factor in the prevention of surgical site infection.

    LENUS (Irish Health Repository)

    McHugh, S M

    2012-02-01

    Approximately five percent of patients who undergo surgery develop surgical site infections (SSIs) which are associated with an extra seven days as an inpatient and with increased postoperative mortality. The competence and technique of the surgeon is considered important in preventing SSI. We have reviewed the evidence on different aspects of surgical technique and its role in preventing SSI. The most recent guidelines from the National Institute for Health and Clinical Excellence in the UK recommend avoiding diathermy for skin incision even though this reduces incision time and blood loss, both associated with lower infection rates. Studies comparing different closure techniques, i.e. continuous versus interrupted sutures, have not found a statistically significant difference in the SSI rate, but using continuous sutures is quicker. For contaminated wounds, the surgical site should be left open for four days to allow for treatment of local infection before subsequent healing by primary intention. Surgical drains should be placed through separate incisions, closed suction drains are preferable to open drains, and all drains should be removed as soon as possible. There are relatively few large studies on the impact of surgical techniques on SSI rates. Larger multicentre prospective studies are required to define what aspects of surgical technique impact on SSI, to better inform surgical practice and support education programmes for surgical trainees.

  7. Intraoperative technique as a factor in the prevention of surgical site infection.

    LENUS (Irish Health Repository)

    McHugh, S M

    2011-02-28

    Approximately five percent of patients who undergo surgery develop surgical site infections (SSIs) which are associated with an extra seven days as an inpatient and with increased postoperative mortality. The competence and technique of the surgeon is considered important in preventing SSI. We have reviewed the evidence on different aspects of surgical technique and its role in preventing SSI. The most recent guidelines from the National Institute for Health and Clinical Excellence in the UK recommend avoiding diathermy for skin incision even though this reduces incision time and blood loss, both associated with lower infection rates. Studies comparing different closure techniques, i.e. continuous versus interrupted sutures, have not found a statistically significant difference in the SSI rate, but using continuous sutures is quicker. For contaminated wounds, the surgical site should be left open for four days to allow for treatment of local infection before subsequent healing by primary intention. Surgical drains should be placed through separate incisions, closed suction drains are preferable to open drains, and all drains should be removed as soon as possible. There are relatively few large studies on the impact of surgical techniques on SSI rates. Larger multicentre prospective studies are required to define what aspects of surgical technique impact on SSI, to better inform surgical practice and support education programmes for surgical trainees.

  8. Toward Exposing Timing-Based Probing Attacks in Web Applications.

    Science.gov (United States)

    Mao, Jian; Chen, Yue; Shi, Futian; Jia, Yaoqi; Liang, Zhenkai

    2017-02-25

    Web applications have become the foundation of many types of systems, ranging from cloud services to Internet of Things (IoT) systems. Due to the large amount of sensitive data processed by web applications, user privacy emerges as a major concern in web security. Existing protection mechanisms in modern browsers, e.g., the same origin policy, prevent the users' browsing information on one website from being directly accessed by another website. However, web applications executed in the same browser share the same runtime environment. Such shared states provide side channels for malicious websites to indirectly figure out the information of other origins. Timing is a classic side channel and the root cause of many recent attacks, which rely on the variations in the time taken by the systems to process different inputs. In this paper, we propose an approach to expose the timing-based probing attacks in web applications. It monitors the browser behaviors and identifies anomalous timing behaviors to detect browser probing attacks. We have prototyped our system in the Google Chrome browser and evaluated the effectiveness of our approach by using known probing techniques. We have applied our approach on a large number of top Alexa sites and reported the suspicious behavior patterns with corresponding analysis results. Our theoretical analysis illustrates that the effectiveness of the timing-based probing attacks is dramatically limited by our approach.

  9. Toward Exposing Timing-Based Probing Attacks in Web Applications

    Directory of Open Access Journals (Sweden)

    Jian Mao

    2017-02-01

    Full Text Available Web applications have become the foundation of many types of systems, ranging from cloud services to Internet of Things (IoT systems. Due to the large amount of sensitive data processed by web applications, user privacy emerges as a major concern in web security. Existing protection mechanisms in modern browsers, e.g., the same origin policy, prevent the users’ browsing information on one website from being directly accessed by another website. However, web applications executed in the same browser share the same runtime environment. Such shared states provide side channels for malicious websites to indirectly figure out the information of other origins. Timing is a classic side channel and the root cause of many recent attacks, which rely on the variations in the time taken by the systems to process different inputs. In this paper, we propose an approach to expose the timing-based probing attacks in web applications. It monitors the browser behaviors and identifies anomalous timing behaviors to detect browser probing attacks. We have prototyped our system in the Google Chrome browser and evaluated the effectiveness of our approach by using known probing techniques. We have applied our approach on a large number of top Alexa sites and reported the suspicious behavior patterns with corresponding analysis results. Our theoretical analysis illustrates that the effectiveness of the timing-based probing attacks is dramatically limited by our approach.

  10. Preoperative skin antiseptic preparations for preventing surgical site infections: a systematic review.

    Science.gov (United States)

    Kamel, Chris; McGahan, Lynda; Polisena, Julie; Mierzwinski-Urban, Monika; Embil, John M

    2012-06-01

    To evaluate the clinical effectiveness of preoperative skin antiseptic preparations and application techniques for the prevention of surgical site infections (SSIs). Systematic review of the literature using Medline, EMBASE, and other databases, for the period January 2001 to June 2011. Comparative studies (including randomized and nonrandomized trials) of preoperative skin antisepsis preparations and application techniques were included. Two researchers reviewed each study and extracted data using standardized tables developed before the study. Studies were reviewed for their methodological quality and clinical findings. Twenty studies (n = 9,520 patients) were included in the review. The results indicated that presurgical antiseptic showering is effective for reducing skin flora and may reduce SSI rates. Given the heterogeneity of the studies and the results, conclusions about which antiseptic is more effective at reducing SSIs cannot be drawn. The evidence suggests that preoperative antiseptic showers reduce bacterial colonization and may be effective at preventing SSIs. The antiseptic application method is inconsequential, and data are lacking to suggest which antiseptic solution is the most effective. Disinfectant products are often mixed with alcohol or water, which makes it difficult to form overall conclusions regarding an active ingredient. Large, well-conducted randomized controlled trials with consistent protocols comparing agents in the same bases are needed to provide unequivocal evidence on the effectiveness of one antiseptic preparation over another for the prevention of SSIs.

  11. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  12. The efficacy of normal saline irrigation to prevent surgical site infection

    International Nuclear Information System (INIS)

    Ashraf, V.; Awan, A.S.

    2015-01-01

    The efficacy of normal saline irrigation to prevent surgical site Infection The aim of the study was to evaluate the efficacy of normal saline irrigations to prevent surgical site infection (SSI). Study Design: A comparative study. Place and Duration of Study: The study was conducted at surgery and gynecology Dept CMH Chunian from 1st Jan 2012 to 1st Nov 2012. Patients and Methods: Two hundred clean surgical and gynecological cases were included in the study. Hundred cases which were randomly selected had their wound washed with warm normal saline for 60 sec and then mopped dry with clean swabs. Subcuticular Stitches were applied to all the 200 cases. The surgical wounds were examined on 3rd post operative day and then finally on 15th post operative day. Patients with wound infection developed pain at the operation site and fever on third post operative day. Wounds were examined for swelling, redness, discharge and stitch abscess. Routine investigations were done as per protocol. Wound swabs were taken for culture and sensitivity. Results: The study was carried out on 200 clean cases (general and gynecological). They were 130 females and 70 males. The 100 cases whose wounds were washed with normal saline only 1 patient developed wound infection while in the other group who did not had saline irrigations 8 patients out of 100 developed wound infection. The commonest infective organisms were staphylococcus aureus and the other organisms were streptococcus pyogenes, proteus, Klaebsiella, E coli and pseudomonas. No MRSA was detected. Conclusion: In our study washing the wound with warm normal saline for 60 seconds resulted in the wound being infection free. Wound infection is associated with delayed wound healing, prolonged hospital stay and increased economic pressure on the patient and on the state. (author)

  13. B vitamins and magnetic resonance imaging-detected ischemic brain lesions in patients with recent transient ischemic attack or stroke: the VITAmins TO Prevent Stroke (VITATOPS) MRI-substudy.

    Science.gov (United States)

    Cavalieri, Margherita; Schmidt, Reinhold; Chen, Christopher; Mok, Vincent; de Freitas, Gabriel R; Song, Swithin; Yi, Qilong; Ropele, Stefan; Grazer, Anja; Homayoon, Nina; Enzinger, Christian; Loh, Katherine; Wong, Ka Sing Lawrence; Wong, Adrian; Xiong, Yunyun; Chang, Hui Meng; Wong, Meng Cheong; Fazekas, Franz; Eikelboom, John W; Hankey, Graeme J

    2012-12-01

    Elevated concentrations of homocysteine are associated with cerebral small vessel disease (CSVD). B-vitamin supplementation with folate and vitamins B12 and B6 reduces homocysteine concentrations. In a substudy of the VITAmins TO Prevent Stroke (VITATOPS) trial, we assessed the hypothesis that the addition of once-daily supplements of B vitamins would reduce the progression of CSVD-related brain lesions. A total of 359 patients with recent stroke or transient ischemic attack, who were randomly allocated to double-blind treatment with placebo or b vitamins, underwent brain MRI at randomization and after 2 years of B-vitamin supplementation. MR images were analyzed blinded to treatment allocation. Outcomes related to the prespecified hypothesis were progression of white matter hyperintensities and incident lacunes. We also explored the effect of B-vitamin supplementation on the incidence of other ischemic abnormalities. After 2 years of treatment with b vitamins or placebo, there was no significant difference in white matter hyperintensities volume change (0.08 vs 0.13 cm3; P=0.419) and incidence of lacunes (8.0% vs 5.9%, P=0.434; odds ratio=1.38). In a subanalysis of patients with MRI evidence of severe CSVD at baseline, b-vitamin supplementation was associated with a significant reduction in white matter hyperintensities volume change (0.3 vs 1.7 cm3; P=0.039). Daily B-vitamin supplementation for 2 years did not significantly reduce the progression of brain lesions resulting from presumed CSVD in all patients with recent stroke or transient ischemic attack but may do so in the subgroup of patients with recent stroke or transient ischemic attack and severe CSVD. http://vitatops.highway1.com.au/. Unique identifier: NCT00097669 and ISRCTN74743444.

  14. The surgical care improvement project and prevention of post-operative infection, including surgical site infection.

    Science.gov (United States)

    Rosenberger, Laura H; Politano, Amani D; Sawyer, Robert G

    2011-06-01

    In response to inconsistent compliance with infection prevention measures, the Centers for Medicare & Medicaid Services collaborated with the U.S. Centers for Disease Control and Prevention on the Surgical Infection Prevention (SIP) project, introduced in 2002. Quality improvement measures were developed to standardize processes to increase compliance. In 2006, the Surgical Care Improvement Project (SCIP) developed out of the SIP project and its process measures. These initiatives, published in the Specifications Manual for National Inpatient Quality Measures, outline process and outcome measures. This continually evolving manual is intended to provide standard quality measures to unify documentation and track standards of care. Seven of the SCIP initiatives apply to the peri-operative period: Prophylactic antibiotics should be received within 1 h prior to surgical incision (1), be selected for activity against the most probable antimicrobial contaminants (2), and be discontinued within 24 h after the surgery end-time (3); (4) euglycemia should be maintained, with well-controlled morning blood glucose concentrations on the first two post-operative days, especially in cardiac surgery patients; (6) hair at the surgical site should be removed with clippers or by depilatory methods, not with a blade; (9) urinary catheters are to be removed within the first two post-operative days; and (10) normothermia should be maintained peri-operatively. There is strong evidence that implementation of protocols that standardize practices reduce the risk of surgical infection. The SCIP initiative targets complications that account for a significant portion of preventable morbidity as well as cost. One of the goals of the SCIP guidelines was a 25% reduction in the incidence of surgical site infections from implementation through 2010. Process measures are becoming routine, and as we practice more evidence-based medicine, it falls to us, the surgeons and scientists, to be active

  15. Implementation of surgical quality improvement: auditing tool for surgical site infection prevention practices.

    Science.gov (United States)

    Hechenbleikner, Elizabeth M; Hobson, Deborah B; Bennett, Jennifer L; Wick, Elizabeth C

    2015-01-01

    Surgical site infections are a potentially preventable patient harm. Emerging evidence suggests that the implementation of evidence-based process measures for infection reduction is highly variable. The purpose of this work was to develop an auditing tool to assess compliance with infection-related process measures and establish a system for identifying and addressing defects in measure implementation. This was a retrospective cohort study using electronic medical records. We used the auditing tool to assess compliance with 10 process measures in a sample of colorectal surgery patients with and without postoperative infections at an academic medical center (January 2012 to March 2013). We investigated 59 patients with surgical site infections and 49 patients without surgical site infections. First, overall compliance rates for the 10 process measures were compared between patients with infection vs patients without infection to assess if compliance was lower among patients with surgical site infections. Then, because of the burden of data collection, the tool was used exclusively to evaluate quarterly compliance rates among patients with infection. The results were reviewed, and the key factors contributing to noncompliance were identified and addressed. Ninety percent of process measures had lower compliance rates among patients with infection. Detailed review of infection cases identified many defects that improved following the implementation of system-level changes: correct cefotetan redosing (education of anesthesia personnel), temperature at surgical incision >36.0°C (flags used to identify patients for preoperative warming), and the use of preoperative mechanical bowel preparation with oral antibiotics (laxative solutions and antibiotics distributed in clinic before surgery). Quarterly compliance improved for 80% of process measures by the end of the study period. This study was conducted on a small surgical cohort within a select subspecialty. The

  16. Prevention of adolescent reoccurring violence and alcohol abuse: a multiple site evaluation.

    Science.gov (United States)

    Wodarski, John S

    2010-07-01

    "Prevention of Adolescent Reoccurring Violence and Alcohol Abuse: A Multiple Site Evaluation" is a multiple component alcohol abuse and violent behavior prevention strategy, targeted to adolescents ages 16-21 who have high levels of anger, or who are victims/perpetrators of violence, and their families. Three community centers located in upstate New York provided group participants (N = 210) known to have conduct disorder and substance abuse history. The centers were used as the intervention sites over a seven-week period with the youth assessment staff using objective screening measures. The participants were exposed to a two-pronged intervention, using a parental involvement cohort with approximately half of the study participants. The Teams, Games, and Tournaments strategy was the intervention method. Teams, Games, and Tournaments is a Social Learning Theory-based intervention with demonstrated empirical evidence of the model's effectiveness. A 2 x 3 factorial design with two follow-up points encompassed: anger control, alcohol/substance abuse, and family interactive education. The goals of the study were to help adolescents reduce their alcohol use, to increase productive family interaction, and ultimately to reduce the adolescents' aggression levels and subsequently reduce the possibility of their becoming victims or perpetrators of a violent crime. Consistent with Social Learning Theory, the Teams, Games, and Tournaments treatment intervention makes use of adolescents as peer counselors. The practical implications include that professionals or students in our public schools, juvenile courts, correctional institutions, and residential treatment centers can easily implement this program. A standardized treatment manual is available. It offers a complete, ready-to-use, and cost-effective tool for reducing adolescent violence and alcohol abuse. Further, the data provide support for a hypothesis of social learning theory, that is: interventions using multiple

  17. Evaluation of adherence to measures for the prevention of surgical site infections by the surgical team

    Directory of Open Access Journals (Sweden)

    Adriana Cristina de Oliveira

    2015-10-01

    Full Text Available AbstractOBJECTIVEEvaluate pre- and intraoperative practices adopted by medical and nursing teams for the prevention of surgical infections.METHODA prospective study carried out in the period of April to May 2013, in a surgical center of a university hospital in Belo Horizonte, Minas Gerais.RESULTS18 surgeries were followed and 214 surgical gloves were analyzed, of which 23 (10.7% had postoperative glove perforation detected, with 52.2% being perceived by users. Hair removal was performed on 27.7% of patients in the operating room, with the use of blades in 80% of the cases. Antibiotic prophylaxis was administered to 81.8% of patients up to 60 minutes prior to surgical incision. An average of nine professionals were present during surgery and the surgery room door remained open in 94.4% of the procedures.CONCLUSIONPartial adhesion to the recommended measures was identified, reaffirming a need for greater attention to these critical steps/actions in order to prevent surgical site infection.

  18. Protecting mobile agents from external replay attacks

    OpenAIRE

    Garrigues Olivella, Carles; Migas, Nikos; Buchanan, William; Robles, Sergi; Borrell Viader, Joan

    2014-01-01

    Peer-reviewed This paper presents a protocol for the protection of mobile agents against external replay attacks. This kind of attacks are performed by malicious platforms when dispatching an agent multiple times to a remote host, thus making it reexecute part of its itinerary. Current proposals aiming to address this problem are based on storing agent identifiers, or trip markers, inside agent platforms, so that future reexecutions can be detected and prevented. The problem of these solut...

  19. Web server attack analyzer

    OpenAIRE

    Mižišin, Michal

    2013-01-01

    Web server attack analyzer - Abstract The goal of this work was to create prototype of analyzer of injection flaws attacks on web server. Proposed solution combines capabilities of web application firewall and web server log analyzer. Analysis is based on configurable signatures defined by regular expressions. This paper begins with summary of web attacks, followed by detection techniques analysis on web servers, description and justification of selected implementation. In the end are charact...

  20. Prevention and treatment of surgical site infection in HIV-infected patients

    Directory of Open Access Journals (Sweden)

    Zhang Lei

    2012-05-01

    Full Text Available Abstract Background Surgical site infection (SSI are the third most frequently reported nosocomial infection, and the most common on surgical wards. HIV-infected patients may increase the possibility of developing SSI after surgery. There are few reported date on incidence and the preventive measures of SSI in HIV-infected patients. This study was to determine the incidence and the associated risk factors for SSI in HIV-infected patients. And we also explored the preventive measures. Methods A retrospective study of SSI was conducted in 242 HIV-infected patients including 17 patients who combined with hemophilia from October 2008 to September 2011 in Shanghai Public Health Clinical Center. SSI were classified according to Centers for Disease Control and Prevention (CDC criteria and identified by bedside surveillance and post-discharge follow-up. Data were analyzed using SPSS 16.0 statistical software (SPSS Inc., Chicago, IL. Results The SSI incidence rate was 47.5% (115 of 242; 38.4% incisional SSIs, 5.4% deep incisional SSIs and 3.7% organ/space SSIs. The SSI incidence rate was 37.9% in HIV-infected patients undergoing abdominal operation. Patients undergoing abdominal surgery with lower preoperative CD4 counts were more likely to develop SSIs. The incidence increased from 2.6% in clean wounds to 100% in dirty wounds. In the HIV-infected patients combined with hemophilia, the mean preoperative albumin and postoperative hemoglobin were found significantly lower than those in no-SSIs group (P Conclusions SSI is frequent in HIV-infected patients. And suitable perioperative management may decrease the SSIs incidence rate of HIV-infected patients.

  1. Efficacy of Negative Pressure Wound Treatment in Preventing Surgical Site Infections after Whipple Procedures.

    Science.gov (United States)

    Gupta, Ryan; Darby, Geoffrey C; Imagawa, David K

    2017-10-01

    Surgical site infections (SSIs) occur at an average rate of 21.1 per cent after Whipple procedures per NSQIP data. In the setting of adherence to standard National Surgery Quality Improvement Program (NSQIP) Hepatopancreatobiliary recommendations including wound protector use and glove change before closing, this study seeks to evaluate the efficacy of using negative pressure wound treatment (NPWT) over closed incision sites after a Whipple procedure to prevent SSI formation. We retrospectively examined consecutive patients from January 2014 to July 2016 who met criteria of completing Whipple procedures with full primary incision closure performed by a single surgeon at a single institution. Sixty-one patients were included in the study between two cohorts: traditional dressing (TD) (n = 36) and NPWT dressing (n = 25). There was a statistically significant difference (P = 0.01) in SSI formation between the TD cohort (n = 15, SSI rate = 0.41) and the NPWT cohort (n = 3, SSI rate = 0.12). The adjusted odds ratio (OR) of SSI formation was significant for NPWT use [OR = 0.15, P = 0.036] and for hospital length of stay [OR = 1.21, P = 0.024]. Operative length, operative blood loss, units of perioperative blood transfusion, intraoperative gastrojejunal tube placement, preoperative stent placement, and postoperative antibiotic duration did not significantly impact SSI formation (P > 0.05).

  2. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  3. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  4. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  5. Different systolic blood pressure targets for people with history of stroke or transient ischaemic attack: PAST-BP (Prevention After Stroke—Blood Pressure) randomised controlled trial

    Science.gov (United States)

    McManus, Richard J; Roalfe, Andrea; Fletcher, Kate; Taylor, Clare J; Martin, Una; Virdee, Satnam; Greenfield, Sheila; Hobbs, F D Richard

    2016-01-01

    Objective To assess whether using intensive blood pressure targets leads to lower blood pressure in a community population of people with prevalent cerebrovascular disease. Design Open label randomised controlled trial. Setting 99 general practices in England, with participants recruited in 2009-11. Participants People with a history of stroke or transient ischaemic attack whose systolic blood pressure was 125 mm Hg or above. Interventions Intensive systolic blood pressure target (different target, patients in both arms were actively managed in the same way with regular reviews by the primary care team. Main outcome measure Change in systolic blood pressure between baseline and 12 months. Results 529 patients (mean age 72) were enrolled, 266 to the intensive target arm and 263 to the standard target arm, of whom 379 were included in the primary analysis (182 (68%) intensive arm; 197 (75%) standard arm). 84 patients withdrew from the study during the follow-up period (52 intensive arm; 32 standard arm). Mean systolic blood pressure dropped by 16.1 mm Hg to 127.4 mm Hg in the intensive target arm and by 12.8 mm Hg to 129.4 mm Hg in the standard arm (difference between groups 2.9 (95% confidence interval 0.2 to 5.7) mm Hg; P=0.03). Conclusions Aiming for target below 130 mm Hg rather than 140 mm Hg for systolic blood pressure in people with cerebrovascular disease in primary care led to a small additional reduction in blood pressure. Active management of systolic blood pressure in this population using a blood pressure. Trial registration Current Controlled Trials ISRCTN29062286. PMID:26919870

  6. Classification of cyber attacks in South Africa

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-05-01

    Full Text Available various ATM's throughout South Africa. Two criminals, Motsoane and Masoleng, were arrested in February 2012 and both sentenced to 15 years in jail [36, 37]. 3.10 2013: IOL DDoS Anonymous Africa claimed responsibility for launching a Distributed Denial... of Service (DDoS) attack on the Independent Newspaper web site iol.co.za. The attack was in response to claims that the IOL group supports Zimbabwean president Robert Mugabe. The following taunt was sent to boast about the attack: “IOL bad boys bad boys...

  7. Plants under dual attack

    NARCIS (Netherlands)

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses

  8. Heart attack - discharge

    Science.gov (United States)

    ... and lifestyle Cholesterol - drug treatment Controlling your high blood pressure Deep vein thrombosis - discharge Dietary fats explained Fast food tips Heart attack - discharge Heart attack - what to ask your doctor Heart bypass ... pacemaker - discharge High blood pressure - what to ask your doctor How to read ...

  9. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  10. Develop a solution for protecting and securing enterprise networks from malicious attacks

    Science.gov (United States)

    Kamuru, Harshitha; Nijim, Mais

    2014-05-01

    In the world of computer and network security, there are myriad ways to launch an attack, which, from the perspective of a network, can usually be defined as "traffic that has huge malicious intent." Firewall acts as one of the measure in order to secure the device from incoming unauthorized data. There are infinite number of computer attacks that no firewall can prevent, such as those executed locally on the machine by a malicious user. From the network's perspective, there are numerous types of attack. All the attacks that degrade the effectiveness of data can be grouped into two types: brute force and precision. The Firewall that belongs to Juniper has the capability to protect against both types of attack. Denial of Service (DoS) attacks are one of the most well-known network security threats under brute force attacks, which is largely due to the high-profile way in which they can affect networks. Over the years, some of the largest, most respected Internet sites have been effectively taken offline by Denial of Service (DOS) attacks. A DoS attack typically has a singular focus, namely, to cause the services running on a particular host or network to become unavailable. Some DoS attacks exploit vulnerabilities in an operating system and cause it to crash, such as the infamous Win nuke attack. Others submerge a network or device with traffic so that there are no more resources to handle legitimate traffic. Precision attacks typically involve multiple phases and often involves a bit more thought than brute force attacks, all the way from reconnaissance to machine ownership. Before a precision attack is launched, information about the victim needs to be gathered. This information gathering typically takes the form of various types of scans to determine available hosts, networks, and ports. The hosts available on a network can be determined by ping sweeps. The available ports on a machine can be located by port scans. Screens cover a wide variety of attack traffic

  11. Optimum Operating Room Environment for the Prevention of Surgical Site Infections.

    Science.gov (United States)

    Gaines, Sara; Luo, James N; Gilbert, Jack; Zaborina, Olga; Alverdy, John C

    Surgical site infections (SSI), whether they be incisional or deep, can entail major morbidity and death to patients and additional cost to the healthcare system. A significant amount of effort has gone into optimizing the surgical patient and the operating room environment to reduce SSI. Relevant guidelines and literature were reviewed. The modern practice of surgical antisepsis involves the employment of strict sterile techniques inside the operating room. Extensive guidelines are available regarding the proper operating room antisepsis as well as pre-operative preparation. The use of pre-operative antimicrobial prophylaxis has become increasingly prevalent, which also presents the challenge of opportunistic and nosocomial infections. Ongoing investigative efforts have brought about a greater appreciation of the surgical patient's endogenous microflora, use of non-bactericidal small molecules, and pre-operative microbial screening. Systematic protocols exist for optimizing the surgical sterility of the operating room to prevent SSIs. Ongoing research efforts aim to improve the precision of peri-operative antisepsis measures and personalize these measures to tailor the patient's unique microbial environment.

  12. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  13. A Review of HIV Prevention Studies that Use Social Networking Sites: Implications for Recruitment, Health Promotion Campaigns, and Efficacy Trials.

    Science.gov (United States)

    Jones, Jamal; Salazar, Laura F

    2016-11-01

    This review describes the use of social networking sites (SNS) in the context of primary prevention of HIV. A review was conducted to assess the published literature for HIV interventions using SNS. Sixteen articles describing twelve interventions were included. SNS were instrumental in recruiting hard-to-reach populations within a short amount of time; were able to reach wide audiences beyond the targeted population for HIV prevention campaigns; and helped to significantly reduce sexual risk behaviors and increase HIV testing. SNS are a viable option to recruit hidden populations, engage the target audience, and disseminate HIV prevention messages. Researchers should use SNS to generate sampling frames that can be used to select participants. Practitioners should use SNS to post images of preventive behavior within health promotion campaigns. Researchers should use multiple SNS platforms to engage participants. As more studies are published using SNS for HIV prevention, meta-analyses will be needed.

  14. Peri-operative glycaemic control regimens for preventing surgical site infections in adults.

    Science.gov (United States)

    Kao, Lillian S; Meeks, Derek; Moyer, Virginia A; Lally, Kevin P

    2009-07-08

    Surgical site infections (SSIs) are associated with significant morbidity, mortality, and resource utilization and are potentially preventable. Peri-operative hyperglycaemia has been associated with increased SSIs and previous recommendations have been to treat glucose levels above 200 mg/dL. However, recent studies have questioned the optimal glycaemic control regimen to prevent SSIs. Whether the benefits of strict or intensive glycaemic control with insulin infusion as compared to conventional management outweigh the risks remains controversial. To summarise the evidence for the impact of glycaemic control in the peri-operative period on the incidence of surgical site infections, hypoglycaemia, level of glycaemic control, all-cause and infection-related mortality, and hospital length of stay and to investigate for differences of effect between different levels of glycaemic control. A search strategy was developed to search the following databases: Cochrane Wounds Group Specialised Register (searched 25 March 2009), The Cochrane Central Register of Controlled Trials, The Cochrane Library 2009, Issue 1; Ovid MEDLINE (1950 to March Week 2 2009); Ovid EMBASE (1980 to 2009 Week 12) and EBSCO CINAHL (1982 to March Week 3 2009). The search was not limited by language or publication status. Randomised controlled trials (RCTs) were eligible for inclusion if they evaluated two (or more) glycaemic control regimens in the peri-operative period (within one week pre-, intra-, and/or post-operative) and reported surgical site infections as an outcome. The standard method for conducting a systematic review in accordance with the Cochrane Wounds Group was used. Two review authors independently reviewed the results from the database searches and identified relevant studies. Two review authors extracted study data and outcomes from each study and reviewed each study for methodological quality. Any disagreement was resolved by discussion or by referral to a third review author. Five

  15. Introduction to the Centers for Disease Control and Prevention and Healthcare Infection Control Practices Advisory Committee Guideline for Prevention of Surgical Site Infection: Prosthetic Joint Arthroplasty Section.

    Science.gov (United States)

    Segreti, John; Parvizi, Javad; Berbari, Elie; Ricks, Philip; Berríos-Torres, Sandra I

    Peri-prosthetic joint infection (PJI) is a severe complication of total joint arthroplasty that appears to be increasing as more of these procedures are performed. Numerous risk factors for incisional (superficial and deep) and organ/space (e.g., PJI) surgical site infections (SSIs) have been identified. A better understanding and reversal of modifiable risk factors may lead to a reduction in the incidence of incisional SSI and PJI. The Centers for Disease Control and Prevention (CDC) and the Healthcare Infection Control Practices Advisory Committee (HICPAC) recently updated the national Guideline for Prevention of Surgical Site Infection. The updated guideline applies evidence-based methodology, presents recommendations for potential strategies to reduce the risk of SSI, and includes an arthroplasty-specific section. This article serves to introduce the guideline development process and to complement the Prosthetic Joint Arthroplasty section with background information on PJI-specific economic burden, epidemiology, pathogenesis and microbiology, and risk factor information.

  16. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  17. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  18. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  19. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  20. Multivariate Thermo-Hygrometric Characterisation of the Archaeological Site of Plaza de l’Almoina (Valencia, Spain) for Preventive Conservation

    Science.gov (United States)

    Fernández-Navajas, Ángel; Merello, Paloma; Beltrán, Pedro; García-Diego, Fernando-Juan

    2013-01-01

    Preventive conservation requires monitoring and control of the parameters involved in the deterioration process, mainly temperature and relative humidity. It is important to characterise an archaeological site prior to carrying out comparative studies in the future for preventive conservation, either by regular studies to verify whether the conditions are constant, or occasional ones when the boundary conditions are altered. There are numerous covered archaeological sites, but few preventive conservation works that give special attention to the type of cover installed. In particular, there is no background of microclimatic studies in sites that are in the ground and, as in the Plaza de l’Almoina (Valencia, Spain), are buried and partially covered by a transparent roof. A large effect of the transparent cover was found by the sensors located below this area, with substantial increases in temperature and a decrease in the relative humidity during the day. Surrounding zones also have values above the recommended temperature values. On the other hand, the influence of a buried water drainage line near the site is notable, causing an increase in relative humidity levels in the surrounding areas. Multivariate statistical analyses enabled us to characterise the microclimate of the archaeological site, allowing future testing to determine whether the conservation conditions have been altered. PMID:23899937

  1. Cyber attacks, countermeasures, and protection schemes — A state of the art survey

    OpenAIRE

    Shabut, Antesar M.; Lwin, K.T.; Hossain, M.A.

    2017-01-01

    Thousands of cyber-attacks (fraudulent online activities to acquire users’ sensitive information via email, during online transactions, live video streaming, online gaming and browsing) are launched every day against Internet users across the world. To prevent these attacks, researchers have responded with a number of protection systems. Currently, the methods which cyber-attackers use to conduct attacks is associated with exploiting humans. Such attacks are recorded more frequently than befo...

  2. Intracavity lavage and wound irrigation for prevention of surgical site infection

    Science.gov (United States)

    Norman, Gill; Atkinson, Ross A; Smith, Tanya A; Rowlands, Ceri; Rithalia, Amber D; Crosbie, Emma J; Dumville, Jo C

    2017-01-01

    Background Surgical site infections (SSIs) are wound infections that occur after an operative procedure. A preventable complication, they are costly and associated with poorer patient outcomes, increased mortality, morbidity and reoperation rates. Surgical wound irrigation is an intraoperative technique, which may reduce the rate of SSIs through removal of dead or damaged tissue, metabolic waste, and wound exudate. Irrigation can be undertaken prior to wound closure or postoperatively. Intracavity lavage is a similar technique used in operations that expose a bodily cavity; such as procedures on the abdominal cavity and during joint replacement surgery. Objectives To assess the effects of wound irrigation and intracavity lavage on the prevention of surgical site infection (SSI). Search methods In February 2017 we searched the Cochrane Wounds Specialised Register; the Cochrane Central Register of Controlled Trials (CENTRAL); Ovid MEDLINE; Ovid Embase and EBSCO CINAHL Plus. We also searched three clinical trials registries and references of included studies and relevant systematic reviews. There were no restrictions on language, date of publication or study setting. Selection criteria We included all randomised controlled trials (RCTs) of participants undergoing surgical procedures in which the use of a particular type of intraoperative washout (irrigation or lavage) was the only systematic difference between groups, and in which wounds underwent primary closure. The primary outcomes were SSI and wound dehiscence. Secondary outcomes were mortality, use of systemic antibiotics, antibiotic resistance, adverse events, re-intervention, length of hospital stay, and readmissions. Data collection and analysis Two review authors independently assessed studies for inclusion at each stage. Two review authors also undertook data extraction, assessment of risk of bias and GRADE assessment. We calculated risk ratios or differences in means with 95% confidence intervals where

  3. SCADA system vulnerabilities to cyber attack

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, W. T. [Cyber Security Consulting (Canada)

    2004-10-01

    The susceptibility to terrorist attacks of computer-based supervisory control (SCADA) systems that are used to monitor and control water distribution systems, oil and gas pipelines and the electrical grid, is discussed. The discussion includes ways in which SCADA systems may be attacked and remedial actions that may be taken to reduce or eliminate the possibility of such attacks. Attacks may take the form of causing the system to generate false data to divert attention from impending system disasters, or commandeer the system to seriously disable it, or cause damage to the process or equipment being controlled by sending improper control commands. SCADA systems are also vulnerable to internal threats, either from an accidental action that results in damage, or an intentional action, as for example by a disgruntled employee, or ex-employee, usually by way of reprogramming an RTU or PLC by accessing the polling/communications circuit. Recent SCADA systems are much more susceptible to concerted cyber attacks because of the adoption of IT technologies and standards into the design of such systems. (Older systems are more likely to be unique designs, hence less susceptible to attack). As far as protection of SCADA systems is concerned, there are no technologies that would prevent a technologically sophisticated terrorist or disgruntled employee from doing major damage to the system, however, the IT world has developed a range of technologies for the protection of IT assets, and many of these same technologies can also be used to safeguard modern SCADA systems.

  4. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  5. Ecological Mapping for the Preventive Conservation of Prehistoric Mural Paintings in Rock Habitats: the Site of Filiano (Basilicata, Italy

    Directory of Open Access Journals (Sweden)

    Giulia Caneva

    2017-06-01

    Full Text Available Biodeterioration phenomena are of great relevance in rock settlements, due to favourable environmental conditions, such as the infiltration of rainwaters, condensation phenomena and abundance of salts and organic nutrients. Rinaldi’s rock shelter in Filiano, which is located in a natural forest of mixed oaks is of great value due to the important traces of prehistoric paintings. It is an emblematic case of the delicate balance, achieved throughout the centuries, between the environment and artwork. During the plurimillenarian history of the site, a portion of the ceiling that covered the shelter collapsed, leaving signs that are still visible today, together with traces of blackening left by the fires of ancient settlements. Several of the biodeteriogens typical of rocky habitats have already been detected and include algae, cyanobacteria, mosses, lichens, vascular plants and fungi, which form macroscopic communities.Each community has an ecological preference and the mapping of their distribution is a suitable tool for understanding variations in the environmental factors that most affect them. Relating ecological data to the taxonomical characterization of the species and to the spatial distribution of each community, a site map of the humidity and of the nutrients was obtained. Among the various communities, microcolonial fungi (MCF, which appear as little black spots, here, represent the most critical risk factor, due to their low water needs. An evaluation of the biological risk for the possible future attack of such a biological community was made, suggesting indirect mitigation measures, through modification of the microclimatic and local ventilation conditions.

  6. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  7. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  8. A fatal elephant attack.

    Science.gov (United States)

    Hejna, Petr; Zátopková, Lenka; Safr, Miroslav

    2012-01-01

    A rare case of an elephant attack is presented. A 44-year-old man working as an elephant keeper was attacked by a cow elephant when he tripped over a foot chain while the animal was being medically treated. The man fell down and was consequently repeatedly attacked with elephant tusks. The man sustained multiple stab injuries to both groin regions, a penetrating injury to the abdominal wall with traumatic prolapse of the loops of the small bowel, multiple defects of the mesentery, and incomplete laceration of the abdominal aorta with massive bleeding into the abdominal cavity. In addition to the penetrating injuries, the man sustained multiple rib fractures with contusion of both lungs and laceration of the right lobe of the liver, and comminuted fractures of the pelvic arch and left femoral body. The man died shortly after he had been received at the hospital. The cause of death was attributed to traumatic shock. © 2011 American Academy of Forensic Sciences.

  9. Robustness of non-interdependent and interdependent networks against dependent and adaptive attacks

    Science.gov (United States)

    Tyra, Adam; Li, Jingtao; Shang, Yilun; Jiang, Shuo; Zhao, Yanjun; Xu, Shouhuai

    2017-09-01

    Robustness of complex networks has been extensively studied via the notion of site percolation, which typically models independent and non-adaptive attacks (or disruptions). However, real-life attacks are often dependent and/or adaptive. This motivates us to characterize the robustness of complex networks, including non-interdependent and interdependent ones, against dependent and adaptive attacks. For this purpose, dependent attacks are accommodated by L-hop percolation where the nodes within some L-hop (L ≥ 0) distance of a chosen node are all deleted during one attack (with L = 0 degenerating to site percolation). Whereas, adaptive attacks are launched by attackers who can make node-selection decisions based on the network state in the beginning of each attack. The resulting characterization enriches the body of knowledge with new insights, such as: (i) the Achilles' Heel phenomenon is only valid for independent attacks, but not for dependent attacks; (ii) powerful attack strategies (e.g., targeted attacks and dependent attacks, dependent attacks and adaptive attacks) are not compatible and cannot help the attacker when used collectively. Our results shed some light on the design of robust complex networks.

  10. Cooperative Electronic Attack using Unmanned Air Vehicles

    National Research Council Canada - National Science Library

    Mears, Mark J

    2006-01-01

    ... that are salient in the context of cooperative control. The utility of electronic attack is described in the context of integrated air defense systems that rely on RADAR sites that act as a network to gather information about potential airborne threats...

  11. Armed Deterrence: Countering Soft Target Attacks

    Science.gov (United States)

    2016-02-06

    offer no security. With over 17,430 such geographically separated military sites across the United States, these fatal shootings by a Kuwaiti- born ...increasing trend and the carnage 4 that IS sympathizers can unleash. This coordinated attack on a concert hall, a soccer stadium, and restaurant

  12. Introduction to the Centers for Disease Control and Prevention and the Healthcare Infection Control Practices Advisory Committee Guideline for the Prevention of Surgical Site Infections.

    Science.gov (United States)

    Solomkin, Joseph S; Mazuski, John; Blanchard, Joan C; Itani, Kamal M F; Ricks, Philip; Dellinger, E Patchen; Allen, George; Kelz, Rachel; Reinke, Caroline E; Berríos-Torres, Sandra I

    Surgical site infection (SSI) is a common type of health-care-associated infection (HAI) and adds considerably to the individual, social, and economic costs of surgical treatment. This document serves to introduce the updated Guideline for the Prevention of SSI from the Centers for Disease Control and Prevention (CDC) and the Healthcare Infection Control Practices Advisory Committee (HICPAC). The Core section of the guideline addresses issues relevant to multiple surgical specialties and procedures. The second procedure-specific section focuses on a high-volume, high-burden procedure: Prosthetic joint arthroplasty. While many elements of the 1999 guideline remain current, others warrant updating to incorporate new knowledge and changes in the patient population, operative techniques, emerging pathogens, and guideline development methodology.

  13. A Review Of Recent Cyber-Attacks In Fiji

    Directory of Open Access Journals (Sweden)

    Neeraj A. Sharma

    2015-08-01

    Full Text Available Computing technology has evolved in such dramatic ways that a child can use such technology and their features. Internet is one such technology which allows peripheral devices to be connected to each other creating a network to share information. In the same way information can be attacked. In this paper we will be discussing the different types of cyber-attack that recently took place in Fiji. Common attacks discussed in this review paper are phishing email scams website defacement and skimming. Apart from common preventative methods some novel recommendations have been made. We believe the Fiji experiences and recommendations will assist technology users prepare better against such attacks.

  14. Cyanoacrylate Skin Microsealant for Preventing Surgical Site Infection after Vascular Surgery : A Discontinued Randomized Clinical Trial

    NARCIS (Netherlands)

    Vierhout, Bastiaan P.; Ott, Alewijn; Reijnen, Michel M. P. J.; Oskam, Jacques; Ott, Alewijn; van den Dungen, Jan J. A. M.; Zeebregts, Clark J.

    Background: Surgical site infections (SSI) after vascular surgery are related to substantial morbidity. Restriction of bacterial access to the site of surgery with a cyanoacrylate sealant is a new concept. We performed a randomized clinical trial to assess the effect of the sealing of skin with a

  15. Making the workplace a more effective site for prevention of noncommunicable diseases in adults.

    Science.gov (United States)

    Tryon, Katherine; Bolnick, Howard; Pomeranz, Jennifer L; Pronk, Nicolaas; Yach, Derek

    2014-11-01

    Efforts to realize the potential of disease prevention in the United States have fallen behind those of peer countries, and workplace disease prevention is a major gap. This article investigates the reasons for this gap. Literature review and expert discussions. Obstacles to effective use of workplace disease prevention include limited leadership and advocacy, poor alignment of financial incentives, limitations in research quality and investment, regulation that does not support evidence-based practice, and a dearth of community-employer partnerships. We make recommendations to address these obstacles, such as the inclusion of health metrics in corporate reporting, making the workplace a central component of the strategy to combat the effect of noncommunicable diseases, and linking prevention directly benefit businesses' bottom lines.

  16. [No role for oral anticoagulants (target INR: 2.0-3.0) after transient ischaemic attack or cerebral infarction of arterial origin; the 'European/Australasian stroke prevention in reversible ischaemia trial' (ESPRIT)].

    Science.gov (United States)

    De Schryver, E L L M; Halkes, P H A

    2008-02-23

    The 'European/Australasian stroke prevention in reversible ischaemia trial' (ESPRIT) aimed to determine whether oral anticoagulation of moderate intensity (target international normalised ratio (INR): 2.0-3.0) is more effective than acetylsalicylic acid in preventing future vascular events in patients with transient ischaemic attack (TIA) or minor stroke of arterial origin. International, multicentre randomised clinical trial. Patients were randomised within 6 months of TIA or minor stroke of arterial origin to oral anticoagulants (target INR: 2.0-3.0; n = 536) or acetylsalicylic acid (30-325 mg daily; n = 532). The primary endpoint was a composite of vascular death, non-fatal stroke, non-fatal myocardial infarction or major bleeding complications. In a post hoc analysis, the efficacy of anticoagulants was compared with that of the combination of acetylsalicylic acid and dipyridamole (200 mg twice daily), a third arm of ESPRIT. Treatment was unblinded, but auditing of endpoints was blinded. Data were analysed on an intent-to-treat basis. The comparison of anticoagulants and acetylsalicylic acid was stopped prematurely because the combination of acetylsalicylic acid and dipyridamole was found to be more effective than acetylsalicylic acid alone. The mean duration of follow-up was 4.6 years (SD: 2.2). The mean INR was 2.57 (SD: 0.86; nearly 70% of the time within target range). The primary endpoint occurred in 99 patients (19%) in the anticoagulation group and 98 patients (18%) in the acetylsalicylic acid group (hazard ratio: 1.02; 95% CI: 0.77-1.35). The hazard ratio was 0.73 (95% CI: 0.52-1.01) for ischaemic events and 2.56 (95% CI: 1.48-4.43) for major bleeding complications. The hazard ratio for the primary outcome event comparing anticoagulants with the combination of acetylsalicylic acid and dipyridamole was 1.31 (95% CI: 0.98-1.75). Oral anticoagulants (target INR: 2.0-3.0) were not more effective than acetylsalicylic acid in the secondary prevention of

  17. Lifestyle Changes for Heart Attack Prevention

    Science.gov (United States)

    ... alcohol consumption contributes to obesity, alcoholism, suicide and accidents. However, there is a cardioprotective effect of moderate ... to the Terms and Conditions and Privacy Policy Work with your doctor to lower your HBP and ...

  18. Can Vitamins Help Prevent a Heart Attack?

    Science.gov (United States)

    ... uptodate.com/home. Accessed Nov. 26, 2016. Loffredo L, et al. Supplementation with vitamin E alone is associated with reduced myocardial infarction: ... Cardiovascular Diseases. 2015;25:354. Pilz S, et al. Vitamin D and cardiovascular ... L, et al. Prospective association between the dietary inflammatory ...

  19. Why cryptography should not rely on physical attack complexity

    CERN Document Server

    Krämer, Juliane

    2015-01-01

    This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two indepe...

  20. Waste generation and pollution prevention progress fact sheet: Nevada Test Site

    International Nuclear Information System (INIS)

    1994-01-01

    The Nevada Test Site is responsible for maintaining nuclear testing capability, supporting science-based Stockpile Stewardship experiments, maintaining nuclear agency response capability, applying environmental restoration techniques to areas affected by nuclear testing, managing low-level and mixed radioactive waste, investigating demilitarization technologies, investigating counter- proliferation technologies, supporting work-for-others programs and special Department of Defense activities, operating a hazardous materials spill test center, and providing for the commercial development of the site. This fact sheet provides information on routine waste generation and projected reduction by waste type. Also, materials recycled by the Nevada Test Site in 1994 are listed

  1. Attacker Model Lab

    OpenAIRE

    2006-01-01

    tut quiz present Tutorial Quiz Presentation Interactive Media Element This interactive tutorial the two sub-classes of computer attackers: amateurs and professionals. It provides valuable insight into the nature of necessary protection measure for information assets. CS3600 Information Assurance: Introduction to Computer Security Course

  2. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... major stroke. It's important to call 9-1-1 immediately for any stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. The content in this ...

  3. Temporal Cyber Attack Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  4. Attacks and infections in percolation processes

    International Nuclear Information System (INIS)

    Janssen, Hans-Karl; Stenull, Olaf

    2017-01-01

    We discuss attacks and infections at propagating fronts of percolation processes based on the extended general epidemic process. The scaling behavior of the number of the attacked and infected sites in the long time limit at the ordinary and tricritical percolation transitions is governed by specific composite operators of the field-theoretic representation of this process. We calculate corresponding critical exponents for tricritical percolation in mean-field theory and for ordinary percolation to 1-loop order. Our results agree well with the available numerical data. (paper)

  5. New oral anticoagulants are not superior to warfarin in secondary prevention of stroke or transient ischemic attacks, but lower the risk of intracranial bleeding: insights from a meta-analysis and indirect treatment comparisons.

    Directory of Open Access Journals (Sweden)

    Partha Sardar

    Full Text Available PURPOSE: Patients with Atrial Fibrillation (AF and prior stroke are classified as high risk in all risk stratification schemes. A systematic review and meta-analysis was performed to compare the efficacy and safety of New Oral Anticoagulants (NOACs to warfarin in patients with AF and previous stroke or transient ischemic attack (TIA. METHODS: Three randomized controlled trials (RCTs, including total 14527 patients, comparing NOACs (apixaban, dabigatran and rivaroxaban with warfarin were included in the analysis. Primary efficacy endpoint was ischemic stroke, and primary safety endpoint was intracranial bleeding. Random-effects models were used to pool efficacy and safety data across RCTs. RevMan and Stata software were used for direct and indirect comparisons, respectively. RESULTS: In patients with AF and previous stroke or TIA, effects of NOACs were not statistically different from that of warfarin, in reduction of stroke (Odds Ratio [OR] 0.86, 95% confidence interval [CI] 0.73- 1.01, disabling and fatal stroke (OR 0.85, 95% CI 0.71-1.04, and all-cause mortality (OR 0.90, 95% CI 0.79 -1.02. Randomization to NOACs was associated with a significantly lower risk of intracranial bleeding (OR 0.42, 95% CI 0.25-0.70. There were no major differences in efficacy between apixaban, dabigatran (110 mg BID and 150 mg BID and rivaroxaban. Major bleeding was significantly lower with apixaban and dabigatran (110 mg BID compared with dabigatran (150 mg BID and rivaroxaban. CONCLUSION: NOACs may not be more effective than warfarin in the secondary prevention of ischemic stroke in patients with a prior history of cerebrovascular ischemia, but have a lower risk of intracranial bleeding.

  6. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  7. Transient ischemic attack: diagnostic evaluation.

    Science.gov (United States)

    Messé, Steven R; Jauch, Edward C

    2008-08-01

    A transient ischemic attack portends significant risk of a stroke. Consequently, the diagnostic evaluation in the emergency department is focused on identifying high-risk causes so that preventive strategies can be implemented. The evaluation consists of a facilitated evaluation of the patient's metabolic, cardiac, and neurovascular systems. At a minimum, the following tests are recommended: fingerstick glucose level, electrolyte levels, CBC count, urinalysis, and coagulation studies; noncontrast computed tomography (CT) of the head; electrocardiography; and continuous telemetry monitoring. Vascular imaging studies, such as carotid ultrasonography, CT angiography, or magnetic resonance angiography, should be performed on an urgent basis and prioritized according to the patient's risk stratification for disease. Consideration should be given for echocardiography if no large vessel abnormality is identified.

  8. Subclinical endophthalmitis following a rooster attack.

    Science.gov (United States)

    Lekse Kovach, Jaclyn; Maguluri, Srilakshmi; Recchia, Franco M

    2006-12-01

    Ocular injury resulting from rooster attacks is rarely reported in the literature. Sadly, the target of these attacks is most often children younger than 3 years old, whose naiveté of the aggressive, territorial behavior of birds can place them at risk. Acute sequelae of these attacks can result in a lifetime of visual impairment. The possibility of a subacute or occult infection is an unusual occurrence that must always be considered. In an effort to prevent future attacks and ocular casualties, we present a case of a 12-month-old boy who suffered an open globe following a rooster attack. The open globe was emergently repaired. One week later, a white cataract was noticed on examination in the absence of systemic or ocular signs of inflammation. Traumatic endophthalmitis and lenticular abscess were suspected during examination under anesthesia. Vitrectomy, lensectomy, and injection of intravitreal antibiotics were performed. Culture of lenticular and vitreous aspirates grew alpha-streptococcus. Alpha-streptococcal endophthalmitis can result from ocular injuries caused by rooster pecking. The infection may present insidiously and without typical ocular or systemic symptoms or signs. Management is challenging and may require surgery.

  9. Treatment-resistant hypertension and the incidence of cardiovascular disease and end-stage renal disease: results from the Antihypertensive and Lipid-Lowering Treatment to Prevent Heart Attack Trial (ALLHAT).

    Science.gov (United States)

    Muntner, Paul; Davis, Barry R; Cushman, William C; Bangalore, Sripal; Calhoun, David A; Pressel, Sara L; Black, Henry R; Kostis, John B; Probstfield, Jeffrey L; Whelton, Paul K; Rahman, Mahboob

    2014-11-01

    Apparent treatment-resistant hypertension (aTRH) is defined as uncontrolled hypertension despite the use of ≥3 antihypertensive medication classes or controlled hypertension while treated with ≥4 antihypertensive medication classes. Although a high prevalence of aTRH has been reported, few data are available on its association with cardiovascular and renal outcomes. We analyzed data on 14 684 Antihypertensive and Lipid-Lowering Treatment to Prevent Heart Attack Trial (ALLHAT) participants to determine the association between aTRH (n=1870) with coronary heart disease, stroke, all-cause mortality, heart failure, peripheral artery disease, and end-stage renal disease. We defined aTRH as blood pressure not at goal (systolic/diastolic blood pressure ≥140/90 mm Hg) while taking ≥3 classes of antihypertensive medication or taking ≥4 classes of antihypertensive medication with blood pressure at goal during the year 2 ALLHAT study visit (1996-2000). Use of a diuretic was not required to meet the definition of aTRH. Follow-up occurred through 2002. The multivariable adjusted hazard ratios (95% confidence intervals) comparing participants with versus without aTRH were as follows: coronary heart disease (1.44 [1.18-1.76]), stroke (1.57 [1.18-2.08]), all-cause mortality (1.30 [1.11-1.52]), heart failure (1.88 [1.52-2.34]), peripheral artery disease (1.23 [0.85-1.79]), and end-stage renal disease (1.95 [1.11-3.41]). aTRH was also associated with the pooled outcomes of combined coronary heart disease (hazard ratio, 1.47; 95% confidence interval, 1.26-1.71) and combined cardiovascular disease (hazard ratio, 1.46; 95% confidence interval, 1.29-1.64). These results demonstrate that aTRH increases the risk for cardiovascular disease and end-stage renal disease. Studies are needed to identify approaches to prevent aTRH and reduce risk for adverse outcomes among individuals with aTRH. © 2014 American Heart Association, Inc.

  10. Preventive strike vs. false targets and protection in defense strategy

    International Nuclear Information System (INIS)

    Levitin, Gregory; Hausken, Kjell

    2011-01-01

    A defender allocates its resource between defending an object passively and striking preventively against an attacker seeking to destroy the object. With no preventive strike the defender distributes its entire resource between deploying false targets, which the attacker cannot distinguish from the genuine object, and protecting the object. If the defender strikes preventively, the attacker's vulnerability depends on its protection and on the defender's resource allocated to the strike. If the attacker survives, the object's vulnerability depends on the attacker's revenge attack resource allocated to the attacked object. The optimal defense resource distribution between striking preventively, deploying the false targets and protecting the object is analyzed. Two cases of the attacker strategy are considered: when the attacker attacks all of the targets and when it chooses a number of targets to attack. An optimization model is presented for making a decision about the efficiency of the preventive strike based on the estimated attack probability, dependent on a variety of model parameters.

  11. Controlling sulfate attack in Mississippi Department of Transportation structures.

    Science.gov (United States)

    2010-08-01

    At some construction sites in Mississippi, deterioration of concrete in contact with the surrounding soil could be related to the high sulfate content of the adjacent soils. Studies dating to 1966 have documented sulfate attack associated with specif...

  12. Controlling sulfate attack in Mississippi Department of Transportation structures

    Science.gov (United States)

    2010-08-01

    At some construction sites in Mississippi, deterioration of concrete in contact with the surrounding soil could be related to the high sulfate content of the adjacent soils. Studies dating to 1966 have documented sulfate attack associated with sp...

  13. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  14. Heart Attack Symptoms in Women

    Science.gov (United States)

    ... fat, cholesterol and other substances (plaque). Watch an animation of a heart attack . Many women think the ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  15. Prevention

    DEFF Research Database (Denmark)

    Halken, S; Høst, A

    2001-01-01

    , breastfeeding should be encouraged for 4-6 months. In high-risk infants a documented extensively hydrolysed formula is recommended if exclusive breastfeeding is not possible for the first 4 months of life. There is no evidence for preventive dietary intervention neither during pregnancy nor lactation...... populations. These theories remain to be documented in proper, controlled and prospective studies. Breastfeeding and the late introduction of solid foods (>4 months) is associated with a reduced risk of food allergy, atopic dermatitis, and recurrent wheezing and asthma in early childhood. In all infants....... Preventive dietary restrictions after the age of 4-6 months are not scientifically documented....

  16. Hanford site guide for preparing and maintaining generator group pollution prevention program documentation

    International Nuclear Information System (INIS)

    1995-12-01

    This manual provides the necessary guidance to contractor generator groups for developing and maintaining documentation of their pollution prevention (P2) program activities. Preparation of program documentation will demonstrate compliance with contractor and U.S. Department of Energy (DOE) requirements, as well as state and federal regulations. Contractor waste generator groups are no longer required to prepare and update facility waste minimization plans. Developing and maintaining program documentation replace this requirement

  17. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  18. Surgical site infection prevention: a survey to identify the gap between evidence and practice in University of Toronto teaching hospitals.

    Science.gov (United States)

    Eskicioglu, Cagla; Gagliardi, Anna R; Fenech, Darlene S; Forbes, Shawn S; McKenzie, Marg; McLeod, Robin S; Nathens, Avery B

    2012-08-01

    A gap exists between the best evidence and practice with regards to surgical site infection (SSI) prevention. Awareness of evidence is the first step in knowledge translation. A web-based survey was distributed to 59 general surgeons and 68 residents at University of Toronto teaching hospitals. Five domains pertaining to SSI prevention with questions addressing knowledge of prevention strategies, efficacy of antibiotics, strategies for changing practice and barriers to implementation of SSI prevention strategies were investigated. Seventy-six individuals (60%) responded. More than 90% of respondents stated there was evidence for antibiotic prophylaxis and perioperative normothermia and reported use of these strategies. There was a discrepancy in the perceived evidence for and the self-reported use of perioperative hyperoxia, omission of hair removal and bowel preparation. Eighty-three percent of respondents felt that consulting published guidelines is important in making decisions regarding antibiotics. There was also a discrepancy between what respondents felt were important strategies to ensure timely administration of antibiotics and what strategies were in place. Checklists, standardized orders, protocols and formal surveillance programs were rated most highly by 75%-90% of respondents, but less than 50% stated that these strategies were in place at their institutions. Broad-reaching initiatives that increase surgeon and trainee awareness and implementation of multifaceted hospital strategies that engage residents and attending surgeons are needed to change practice.

  19. Pollution prevention opportunity assessment for the K-25 Site Toxic Substances Control Act Incinerator Operations, Level III

    International Nuclear Information System (INIS)

    1995-09-01

    A Level III pollution prevention opportunity assessment (PPOA) was performed for the Oak Ridge K-25 Site Toxic Substances Control Act (TSCA) Incinerator to evaluate pollution prevention (P2) options for various waste streams: The main objective of this study was to identify and evaluate options to reduce the quantities of each waste stream generated by the TSCA Incinerator operations to realize significant environmental and/or economic benefits from P2. For each of the waste streams, P2 options were evaluated following the US Environmental Protection Agency (EPA) hierarchy to (1) reduce the quantity of waste generated, (2) recycle the waste, and/or (3) use alternate waste treatment or segregation methods. This report provides process descriptions, identification and evaluation of P2 options, and final recommendations

  20. Can a Copycat Effect be Observed in Terrorist Suicide Attacks?

    Directory of Open Access Journals (Sweden)

    Nicholas Farnham

    2017-03-01

    Full Text Available The purpose of this paper is to explore how a copycat effect – established within the field of suicide studies – may manifest itself in terrorist suicide attacks, and takes an exploratory approach in evaluating the prospect of incorporating open-data resources in future counter-terrorism research. This paper explores a possible ‘copycat effect’ in cases of suicide terrorism, which entails a perpetrator being inspired by a preceding attack to carry out a similar attack not long after the original. In the wake of mounting risks of lone wolf terrorist attacks today and due to the general difficulties faced in preventing such attacks, in this paper we explore a potential area of future prevention in media reporting, security and anti-terrorism policies today. Using the START Global Terrorism Database (GTD, this paper investigates terrorist suicide-attack clusters and analyses the relationship between attacks found within the same cluster. Using a mixed-method approach, our analyses did not uncover clear evidence supporting a copycat effect among the studied attacks. These and other findings have numerous policy and future research implications.

  1. Preventing Alcohol Abuse Through Social Networking Sites: A First Assessment of a Two-Year Ecological Approach.

    Science.gov (United States)

    Flaudias, Valentin; de Chazeron, Ingrid; Zerhouni, Oulmann; Boudesseul, Jordane; Begue, Laurent; Bouthier, Renaud; Lévrier, Christel; Llorca, Pierre Michel; Brousse, Georges

    2015-12-10

    Prevention strategies to reduce alcohol use/consumption among young people are crucial to reducing alcohol-related deaths and preventing disease. This paper focuses on the effectiveness of a social networking site (SNS) alcohol prevention program targeted toward young people. We hypothesized that the program would diminish the relation made by participants between alcohol and festive moments, and would result in a reduction of their declared consumption of alcohol at festive moments during the program. We also explored the interaction with the prevention program that was the most efficient. The prevention program took the form of 3 lotteries over 2 years. The participants periodically received prevention messages, particularly on alcohol and festive moments (eg, videos on Facebook and short message service [SMS] text messages on their mobile phones). For the 3 periods, the participants had to answer questions exploring the level of their belief that alcohol consumption and festive moments are highly associated. A control group that did not participate in the prevention program was asked the same questions over the same number of days for the first 2 periods. During the second period, the participants were asked to answer questions about their alcohol consumption during parties. During the third period, we explored the interaction with the prevention program on the reduction of their belief that alcohol consumption and festive moments are associated. A total of 651 participants (age: mean 22.24, SD 4.10 years; women: n=430) during the first period, 301 participants (age: mean 21.27, SD 3.07 years; women n=199) during the second period, and 305 (age: mean 22.41, SD 4.65 years; women: n=190) during the third period correctly completed the survey. For the control group, 69 students completed the survey during the first period (age: mean 18.93, SD 1.14 years; women: n=59) and 50 during the second (age: mean 20.78, SD 1.94 years; women: n=45). We observed a significant

  2. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  3. Are blockchains immune to all malicious attacks?

    OpenAIRE

    Xu, Jennifer J.

    2016-01-01

    Background: In recent years, blockchain technology has attracted considerable attention. It records cryptographic transactions in a public ledger that is difficult to alter and compromise because of the distributed consensus. As a result, blockchain is believed to resist fraud and hacking. Results: This work explores the types of fraud and malicious activities that can be prevented by blockchain technology and identifies attacks to which blockchain remains vulnerable. Conclusions: This study ...

  4. Toward Exposing Timing-Based Probing Attacks in Web Applications †

    Science.gov (United States)

    Mao, Jian; Chen, Yue; Shi, Futian; Jia, Yaoqi; Liang, Zhenkai

    2017-01-01

    Web applications have become the foundation of many types of systems, ranging from cloud services to Internet of Things (IoT) systems. Due to the large amount of sensitive data processed by web applications, user privacy emerges as a major concern in web security. Existing protection mechanisms in modern browsers, e.g., the same origin policy, prevent the users’ browsing information on one website from being directly accessed by another website. However, web applications executed in the same browser share the same runtime environment. Such shared states provide side channels for malicious websites to indirectly figure out the information of other origins. Timing is a classic side channel and the root cause of many recent attacks, which rely on the variations in the time taken by the systems to process different inputs. In this paper, we propose an approach to expose the timing-based probing attacks in web applications. It monitors the browser behaviors and identifies anomalous timing behaviors to detect browser probing attacks. We have prototyped our system in the Google Chrome browser and evaluated the effectiveness of our approach by using known probing techniques. We have applied our approach on a large number of top Alexa sites and reported the suspicious behavior patterns with corresponding analysis results. Our theoretical analysis illustrates that the effectiveness of the timing-based probing attacks is dramatically limited by our approach. PMID:28245610

  5. Fuzzy Expert System for Heart Attack Diagnosis

    Science.gov (United States)

    Hassan, Norlida; Arbaiy, Nureize; Shah, Noor Aziyan Ahmad; Afizah Afif@Afip, Zehan

    2017-08-01

    Heart attack is one of the serious illnesses and reported as the main killer disease. Early prevention is significant to reduce the risk of having the disease. The prevention efforts can be strengthen through awareness and education about risk factor and healthy lifestyle. Therefore the knowledge dissemination is needed to play role in order to distribute and educate public in health care management and disease prevention. Since the knowledge dissemination in medical is important, there is a need to develop a knowledge based system that can emulate human intelligence to assist decision making process. Thereby, this study utilized hybrid artificial intelligence (AI) techniques to develop a Fuzzy Expert System for Diagnosing Heart Attack Disease (HAD). This system integrates fuzzy logic with expert system, which helps the medical practitioner and people to predict the risk and as well as diagnosing heart attack based on given symptom. The development of HAD is expected not only providing expert knowledge but potentially become one of learning resources to help citizens to develop awareness about heart-healthy lifestyle.

  6. The role of topical antibiotics used as prophylaxis in surgical site infection prevention.

    LENUS (Irish Health Repository)

    McHugh, S M

    2011-04-01

    Compared with systemic antibiotic therapy, the topical or local delivery of an antibiotic has many potential advantages. However, local antibiotics at the surgical site have received very limited approval in any of the surgical prophylaxis consensus guidelines that we are aware of. A review of the literature was carried out through searches of peer-reviewed publications in PubMed in the English language over a 30 year period between January 1980 and May 2010. Both retrospective and prospective studies were included, as well as meta-analyses. With regard to defining \\'topical\\' or \\'local\\' antibiotic application, the application of an antibiotic solution to the surgical site intraoperatively or immediately post-operatively was included. A number of surgical procedures have been shown to significantly benefit from perioperative topical prophylaxis, e.g. joint arthroplasty, cataract surgery and, possibly, breast augmentation. In obese patients undergoing abdominal surgery, topical surgical prophylaxis is also proven to be beneficial. The selective use of topical antibiotics as surgical prophylaxis is justified for specific procedures, such as joint arthroplasty, cataract surgery and, possibly, breast augmentation. In selective cases, such as obese patients undergoing abdominal surgery, topical surgical prophylaxis is also proven to be beneficial. Apart from these specific indications, the evidence for use of topical antibiotics in surgery is lacking in conclusive randomized controlled trials.

  7. The role of topical antibiotics used as prophylaxis in surgical site infection prevention.

    LENUS (Irish Health Repository)

    McHugh, S M

    2012-02-01

    Compared with systemic antibiotic therapy, the topical or local delivery of an antibiotic has many potential advantages. However, local antibiotics at the surgical site have received very limited approval in any of the surgical prophylaxis consensus guidelines that we are aware of. A review of the literature was carried out through searches of peer-reviewed publications in PubMed in the English language over a 30 year period between January 1980 and May 2010. Both retrospective and prospective studies were included, as well as meta-analyses. With regard to defining \\'topical\\' or \\'local\\' antibiotic application, the application of an antibiotic solution to the surgical site intraoperatively or immediately post-operatively was included. A number of surgical procedures have been shown to significantly benefit from perioperative topical prophylaxis, e.g. joint arthroplasty, cataract surgery and, possibly, breast augmentation. In obese patients undergoing abdominal surgery, topical surgical prophylaxis is also proven to be beneficial. The selective use of topical antibiotics as surgical prophylaxis is justified for specific procedures, such as joint arthroplasty, cataract surgery and, possibly, breast augmentation. In selective cases, such as obese patients undergoing abdominal surgery, topical surgical prophylaxis is also proven to be beneficial. Apart from these specific indications, the evidence for use of topical antibiotics in surgery is lacking in conclusive randomized controlled trials.

  8. Clinical relevance of surgical site infection as defined by the criteria of the Centers for Disease Control and Prevention

    DEFF Research Database (Denmark)

    Henriksen, N A; Meyhoff, C S; Wetterslev, J

    2010-01-01

    Surgical site infection (SSI) is a common complication after abdominal surgery and the Centers for Disease Control and Prevention (CDC) criteria are commonly used for diagnosis and surveillance. The aim of this study was to evaluate whether SSI diagnosed according to CDC is clinically relevant (C...... a suitable standard definition for monitoring and identifying SSI, even if some cases of less clinically significant superficial SSI are included.......Surgical site infection (SSI) is a common complication after abdominal surgery and the Centers for Disease Control and Prevention (CDC) criteria are commonly used for diagnosis and surveillance. The aim of this study was to evaluate whether SSI diagnosed according to CDC is clinically relevant...... hospital stay or referral to an intensive care unit for SSI. The rate of CRSSI was 38 of 54 (70%) in patients with CDC-diagnosed SSI and none in patients without a CDC-diagnosed SSI. Sixty-one percent of the CDC-diagnosed SSIs were superficial, of which 48% were considered clinically relevant...

  9. Prevention of low back pain in female eldercare workers: randomized controlled work site trial

    DEFF Research Database (Denmark)

    Jensen, Lone Donbæk; Gonge, Henrik Gjesing; Jørs, Erik

    2006-01-01

    Study Design. Randomized controlled trial. Objective. To evaluate the effectiveness of an ergonomic and psychosocial intervention in reducing low back pain (LBP) among health care workers. Summary of Background Data. LBP and injuries are reported frequently among health care workers worldwide......, stress management, or reference arm. A total of 163 individuals (79% of the source population) participated in both baseline and follow-up after 2 years. Outcome was intra-individual change in rating of LBP during the past 3 and 12 months. Results. We found no difference in LBP in any of the intervention...... arms over the study period. Conclusion. The study showed no effect of a transfer technique or stress management program targeting LBP. Thus, there is a need for discussing other priorities in the prevention of LBP among health care workers....

  10. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks...... that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio...

  11. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  12. SDN-Based Double Hopping Communication against Sniffer Attack

    Directory of Open Access Journals (Sweden)

    Zheng Zhao

    2016-01-01

    Full Text Available Sniffer attack has been a severe threat to network communication security. Traditional network usually uses static network configuration, which provides convenience to sniffer attack. In this paper, an SDN-based double hopping communication (DHC approach is proposed to solve this problem. In DHC, ends in communication packets as well as the routing paths are changed dynamically. Therefore, the traffic will be distributed to multiple flows and transmitted along different paths. Moreover, the data from multiple users will be mixed, bringing difficulty for attackers in obtaining and recovering the communication data, so that sniffer attack will be prevented effectively. It is concluded that DHC is able to increase the overhead of sniffer attack, as well as the difficulty of communication data recovery.

  13. In vitro results of flexible light-emitting antimicrobial bandage designed for prevention of surgical site infections

    Science.gov (United States)

    Greenberg, Mitchell; Sharan, Riti; Galbadage, Thushara; Sule, Preeti; Smith, Robert; Lovelady, April; Cirillo, Jeffrey D.; Glowczwski, Alan; Maitland, Kristen C.

    2018-02-01

    Surgical site infections (SSIs) are a leading cause of morbidity and mortality and a significant expense to the healthcare system and hospitals. The majority of these infections are preventable; however, increasing bacterial resistance, biofilm persistence, and human error contribute to the occurrence of these healthcare-associated infections. We present a flexible antimicrobial blue-light emitting bandage designed for use on postoperative incisions and wounds. The photonic device is designed to inactivate bacteria present on the skin and prevent bacterial colonization of the site, thus reducing the occurrence of SSIs. This antimicrobial light emitting bandage uses blue light's proven abilities to inactivate a wide range of clinical pathogens regardless of their resistance to antibiotics, inactivate bacteria without harming mammalian cells, improve wound healing, and inactivate bacteria in biofilms. The antimicrobial bandage consists of a thin 2"x2" silicone sheet with an array of 77 LEDs embedded in multiple layers of the material for thermal management. The 405 nm center wavelength LED array is designed to be a wearable device that integrates with standard hospital infection prevention protocols. The device was characterized for irradiance of 44.5 mW/cm2. Methicillin-resistant Staphylococcus aureus seeded in a petri dish was used to evaluate bacterial inactivation in vitro. Starting with a concentration of 2.16 x 107 colony forming units (CFU)/mL, 45% of the bacteria was inactivated within 15 minutes, 65% had been inactivated by 30 minutes, 99% was inactivated by 60 minutes, and a 7 log reduction and complete sterilization was achieved within 120 minutes.

  14. Before Using Aspirin to Lower Your Risk of Heart Attack or Stroke, Here Is What You Should Know

    Science.gov (United States)

    ... Medicines Safe Daily Use of Aspirin Before Using Aspirin to Lower Your Risk of Heart Attack or ... care provider can determine whether regular use of aspirin will help to prevent a heart attack or ...

  15. Prevention of the wind migration of Semipalatinsk test site contaminated topsoil by inter-polymer complexes

    International Nuclear Information System (INIS)

    Kudaibergenov, S.E.

    2010-01-01

    Full text: It is well known that Semipalatinsk Test Site has been contaminated by radionuclides mainly as a result of atmospheric, aboveground and underground intensive nuclear tests during more than 40 years. Survey of residual radioactivity in the soil at ten Semipalatinsk Test Site areas showed that a great number of Plutonium-239, 240, Strontium-90 and Cesium-137 are concentrated in the depth of soil layer 0-8 cm. The residual radioactivity within the Semipalatinsk Test Site is tightly bound to the topsoil as a result of extreme heating and melting of the soils during the tests. The maximal amount of radionuclides is accumulated on the fine soil particles having 0.1-1.0 mm size. Wind erosion is responsible for suspension of contaminated soil particles in the air and further spreading of contamination far away. For instance, dust particles of diameter 0,05-0,1 mm are dropped within a couple of kilometers of the erosion site, while particles of about 0.005-0.01 mm diameter can move hundreds and thousands of kilometers. According to the results of the Institute of Radiation Safety and Ecology, Kazakhstan, in “Degelen” massive, where the intensive nuclear tests were carried out, the concentration of radionuclides in air increases for Sr-90 up to 5 times, for Pu-239,240 up to 100-250 times during the elevation of thin dust from the ground surface. In this connection agglomeration of thin dust containing radionuclides is of primary importance to protect the population from inhalation of re-suspended dust. Inter-polymer complexes are water-insoluble, moisture and gas permeable substances that form a “cobweb” on the surface of soil particles and consequently leading to formation of protective crust. Inter-polymer complexes enhance the intrusion of water into the soil, resulting in increased soil moisture to promote seed germination and plant growth. Inter-polymer complexes are also able to accumulate radionuclides via inclusion of metal ions into the Inter

  16. Hypothesis of a nuclear accident to the nuclear power plant of Gravelines with important radioactive release out of the site: risks prevention, intervention strategies. Evaluation of the sensitization to the nuclear risk of the physician practicing near the site

    International Nuclear Information System (INIS)

    Mraovic, Th.

    1998-01-01

    This thesis has for hypothesis a nuclear accident at the nuclear power plant of Gravelines with radioactive release out of the site: the risks prevention and the strategies of intervention are studied. An evaluation of the sensitization to a nuclear risk is made for the general practitioner that practices near the site. (N.C.)

  17. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  18. Reconstruction of iliac crest with rib to prevent donor site complications: A prospective study of 26 cases

    Directory of Open Access Journals (Sweden)

    Dave B

    2007-01-01

    Full Text Available Background: The tricortical bone graft from the iliac crest are used to reconstruct the post corpectomy spinal defects. The donor iliac area defect is large and may give rise to pain at donor site, instability of pelvis, fracture of ilium, donor site muscle herniation or abdominal content herniation. Rib removed during thoracotomy was used by us to reconstruct the iliac crest defect. Materials and Methods: Twenty-six patients who underwent thoracotomy for dorsal spine corpectomy or curettage for various spinal pathologies from June 2002 to May 2004 were included in the study. After adequate decompression the spine was reconstructed by tricortical bone graft from iliac crest and reconstruction of the iliac crest was done with the rib removed for exposure during thoracotomy. Results: The mean follow up was 15 months. All patients had good graft incorporation which was evaluated on the basis of local tenderness and radiographs. One patient had graft displacement. Conclusion: The reconstruction of iliac crest by rib is a simple and effective procedure to prevent donor site complications.

  19. Inflammation and neuropathic attacks in hereditary brachial plexus neuropathy

    Science.gov (United States)

    Klein, C; Dyck, P; Friedenberg, S; Burns, T; Windebank, A; Dyck, P

    2002-01-01

    Objective: To study the role of mechanical, infectious, and inflammatory factors inducing neuropathic attacks in hereditary brachial plexus neuropathy (HBPN), an autosomal dominant disorder characterised by attacks of pain and weakness, atrophy, and sensory alterations of the shoulder girdle and upper limb muscles. Methods: Four patients from separate kindreds with HBPN were evaluated. Upper extremity nerve biopsies were obtained during attacks from a person of each kindred. In situ hybridisation for common viruses in nerve tissue and genetic testing for a hereditary tendency to pressure palsies (HNPP; tomaculous neuropathy) were undertaken. Two patients treated with intravenous methyl prednisolone had serial clinical and electrophysiological examinations. One patient was followed prospectively through pregnancy and during the development of a stereotypic attack after elective caesarean delivery. Results: Upper extremity nerve biopsies in two patients showed prominent perivascular inflammatory infiltrates with vessel wall disruption. Nerve in situ hybridisation for viruses was negative. There were no tomaculous nerve changes. In two patients intravenous methyl prednisolone ameliorated symptoms (largely pain), but with tapering of steroid dose, signs and symptoms worsened. Elective caesarean delivery did not prevent a typical postpartum attack. Conclusions: Inflammation, probably immune, appears pathogenic for some if not all attacks of HBPN. Immune modulation may be useful in preventing or reducing the neuropathic attacks, although controlled trials are needed to establish efficacy, as correction of the mutant gene is still not possible. The genes involved in immune regulation may be candidates for causing HBPN disorders. PMID:12082044

  20. Establishing an Effective Combat Strategy for Prevalent Cyber- Attacks

    OpenAIRE

    Vivian Ogochukwu Nwaocha; Inyiama H.C.

    2011-01-01

    As organisations continue to incorporate the Internet as a key component of their operations, the global cyber-threat level is increasing. One of the most common types of cyber-threats is known as the Distributed Denial of Service (DDoS) attack – an attack preventing users from accessing a system for a period of time. Recent DDoS attacks have left large corporate and government networks inaccessible to customers, partners and users for hours or days, resulting in significant financial, reputa...

  1. Vancomycin Powder Regimen for Prevention of Surgical Site Infection in Complex Spine Surgeries.

    Science.gov (United States)

    Van Hal, Michael; Lee, Joon; Laudermilch, Dann; Nwasike, Chinedu; Kang, James

    2017-10-01

    In total, 496 patients of a single surgeon cohort examining the surgical-site infection (SSI) rates with the addition of vancomycin powder in both diabetic and revision spine surgery cases. A historical control group of 652 patients were compared from the same surgeon over an earlier time period before the inception of using vancomycin powder prophylaxis. The objective of this study was to describe and compare the rates of infection in high-risk patient populations while using vancomycin powder. Vancomycin powder may not decrease an already low rate of infection. Therefore, use of vancomycin powder in high-risk patients with a higher rate of infection would potentially show benefit of vancomycin powder. In total, 496 patient charts were collected from a database of cases. Patients were included in the cohort if they had revision spinal operation or if they were diabetic. Patients in the time period July 2010 to August 2013 were included in the vancomycin protocol where 1 g of vancomycin powder was added to the wound before wound closure. Cases were considered positive if there was a positive culture or if there was sufficient clinical suspicion to treat. As a control to this cohort, 692 charts were reviewed from a earlier time period of the same surgeon and institution. In total, 28 patients of 496 (5.6%) patients in the cohort returned to the operating room for seroma, hematoma, draining wound, or infection. Sixteen of these patients (16/496, 3.2%) had a culture positive infection or were treated as an infection. This rate was significantly lower than the historical rate before the protocol. Although vancomycin does seem to be useful in decreasing SSIs, it is not a panacea. SSIs in high-risk patients were not completely eliminated by the vancomycin protocol.

  2. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  3. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  4. Clinical relevance of surgical site infection as defined by the criteria of the Centers for Disease Control and Prevention

    DEFF Research Database (Denmark)

    Henriksen, N A; Meyhoff, C S; Wetterslev, J

    2010-01-01

    Surgical site infection (SSI) is a common complication after abdominal surgery and the Centers for Disease Control and Prevention (CDC) criteria are commonly used for diagnosis and surveillance. The aim of this study was to evaluate whether SSI diagnosed according to CDC is clinically relevant...... diagnosed with SSI and a matched control group (N=46) without SSI according to the CDC criteria after laparotomy. Two blinded experienced surgeons evaluated the hospital records and determined whether patients had CRSSI, based on the following criteria: antibiotic treatment, surgical intervention, prolonged...... hospital stay or referral to an intensive care unit for SSI. The rate of CRSSI was 38 of 54 (70%) in patients with CDC-diagnosed SSI and none in patients without a CDC-diagnosed SSI. Sixty-one percent of the CDC-diagnosed SSIs were superficial, of which 48% were considered clinically relevant...

  5. Crony Attack: Strategic Attack’s Silver Bullet

    Science.gov (United States)

    2006-11-01

    physical assets or financial assets. The form of crony attack that most closely resembles classic strategic attack is to deny, degrade, or destroy a money...February 1951. Reprinted in Airpower Studies Coursebook , Air Command and Staff College, Maxwell AFB, AL, 2002, 152–58. Hirsch, Michael. “NATO’s Game of

  6. The New World Health Organization Recommendations on Perioperative Administration of Oxygen to Prevent Surgical Site Infections: A Dangerous Reductionist Approach?

    Science.gov (United States)

    Wenk, Manuel; Van Aken, Hugo; Zarbock, Alexander

    2017-08-01

    In October 2016, the World Health Organization (WHO) published recommendations for preventing surgical site infections (SSIs). Among those measures is a recommendation to administer oxygen at an inspired fraction of 80% intra- and postoperatively for up to 6 hours. SSIs have been identified as a global health problem, and the WHO should be commended for their efforts. However, this recommendation focuses only on the patient's "wound," ignores other organ systems potentially affected by hyperoxia, and may ultimately worsen patient outcomes.The WHO advances a "strong recommendation" for the use of a high inspired oxygen fraction even though the quality of evidence is only moderate. However, achieving this goal by disregarding other potentially lethal complications seems inappropriate, particularly in light of the weak evidence underpinning the use of high fractions of oxygen to prevent SSI. Use of such a strategy thus should be intensely discussed by anesthesiologists and perioperative physicians.Normovolemia, normotension, normoglycemia, normothermia, and normoventilation can clearly be safely applied to most patients in most clinical scenarios. But the liberal application of hyperoxemia intraoperatively and up to 6 hours postoperatively, as suggested by the WHO, is questionable from the viewpoint of anesthesia and perioperative medicine, and its effects will be discussed in this article.

  7. Routine implementation of isoniazid preventive therapy in HIV-infected patients in seven pilot sites in Zimbabwe

    Science.gov (United States)

    Choto, R. C.; Harries, A. D.; Mutasa-Apollo, T.; Chakanyuka-Musanhu, C.

    2017-01-01

    Setting: Seven pilot sites in Zimbabwe implementing 6 months of isoniazid preventive therapy (IPT) for people living with the human immunodeficiency virus (PLHIV). Objectives: To determine, among PLHIV started on IPT, the completion rates for a 6-month course of IPT and factors associated with non-adherence. Design: A retrospective cohort study. Results: Of 578 patients, 466 (81%) completed IPT. Of the 112 patients who failed to complete IPT, 69 (60%) were lost to follow-up, 30 (27%) stopped treatment with no documented reasons, 8 (7%) developed toxicity/adverse reactions, 5 (5%) were documented as having drug stock-outs and the remainder transferred out or refused to continue treatment. Currently being on antiretroviral therapy (ART) (aOR 0.09, 95%CI 0.03–0.28) and receiving a ⩾2 month supply of isoniazid at the start of treatment were associated with a lower risk of not completing IPT, while missing clinic visits prior to starting IPT (aOR 5.25, 95%CI 2.10–13.14) was associated with a higher risk of non-completion. Conclusion: IPT completion rates in seven pilot sites of Zimbabwe were comparatively high, showing that IPT roll-out in public health facilities is feasible. Enhanced adherence counselling or active tracing among pre-ART patients and those with a history of loss to follow-up may improve IPT completion rates, along with synchronising IPT and ART resupplies. PMID:28775944

  8. Invisible Trojan-horse attack

    DEFF Research Database (Denmark)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin

    2017-01-01

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance...

  9. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  10. Fatal injection: a survey of modern code injection attack countermeasures

    Directory of Open Access Journals (Sweden)

    Dimitris Mitropoulos

    2017-11-01

    Full Text Available With a code injection attack (CIA an attacker can introduce malicious code into a computer program or system that fails to properly encode data that comes from an untrusted source. A CIA can have different forms depending on the execution context of the application and the location of the programming flaw that leads to the attack. Currently, CIAs are considered one of the most damaging classes of application attacks since they can severely affect an organisation’s infrastructure and cause financial and reputational damage to it. In this paper we examine and categorize the countermeasures developed to detect the various attack forms. In particular, we identify two distinct categories. The first incorporates static program analysis tools used to eliminate flaws that can lead to such attacks during the development of the system. The second involves the use of dynamic detection safeguards that prevent code injection attacks while the system is in production mode. Our analysis is based on nonfunctional characteristics that are considered critical when creating security mechanisms. Such characteristics involve usability, overhead, implementation dependencies, false positives and false negatives. Our categorization and analysis can help both researchers and practitioners either to develop novel approaches, or use the appropriate mechanisms according to their needs.

  11. On Node Replication Attack in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mumtaz Qabulio

    2016-04-01

    Full Text Available WSNs (Wireless Sensor Networks comprise a large number of small, inexpensive, low power and memory constrained sensing devices (called sensor nodes that are densely deployed to measure a given physical phenomenon. Since WSNs are commonly deployed in a hostile and unattended environment, it is easy for an adversary to physically capture one or more legitimate sensor nodes, re-program and redeploy them in the network. As a result, the adversary becomes able to deploy several identical copies of physically captured nodes in the network in order to perform illegitimate activities. This type of attack is referred to as Node Replication Attack or Clone Node Attack. By launching node replication attack, an adversary can easily get control on the network which consequently is the biggest threat to confidentiality, integrity and availability of data and services. Thus, detection and prevention of node replication attack in WSNs has become an active area of research and to date more than two dozen schemes have been proposed, which address this issue. In this paper, we present a comprehensive review, classification and comparative analysis of twenty five of these schemes which help to detect and/or prevent node replication attack in WSNs

  12. On node replication attack in wireless sensor networks

    International Nuclear Information System (INIS)

    Qabulio, M.; Malkani, Y.A.

    2015-01-01

    WSNs (Wireless Sensor Networks) comprise a large number of small, inexpensive, low power and memory constrained sensing devices (called sensor nodes) that are densely deployed to measure a given physical phenomenon. Since WSNs are commonly deployed in a hostile and unattended environment, it is easy for an adversary to physically capture one or more legitimate sensor nodes, re-program and redeploy them in the network. As a result, the adversary becomes able to deploy several identical copies of physically captured nodes in the network in order to perform illegitimate activities. This type of attack is referred to as Node Replication Attack or Clone Node Attack. By launching node replication attack, an adversary can easily get control on the network which consequently is the biggest threat to confidentiality, integrity and availability of data and services. Thus, detection and prevention of node replication attack in WSNs has become an active area of research and to date more than two dozen schemes have been proposed, which address this issue. In this paper, we present a comprehensive review, classification and comparative analysis of twenty five of these schemes which help to detect and/or prevent node replication attack in WSNs. (author)

  13. Human behaviour can trigger large carnivore attacks in developed countries.

    Science.gov (United States)

    Penteriani, Vincenzo; Delgado, María del Mar; Pinchera, Francesco; Naves, Javier; Fernández-Gil, Alberto; Kojola, Ilpo; Härkönen, Sauli; Norberg, Harri; Frank, Jens; Fedriani, José María; Sahlén, Veronica; Støen, Ole-Gunnar; Swenson, Jon E; Wabakken, Petter; Pellegrini, Mario; Herrero, Stephen; López-Bao, José Vicente

    2016-02-03

    The media and scientific literature are increasingly reporting an escalation of large carnivore attacks on humans in North America and Europe. Although rare compared to human fatalities by other wildlife, the media often overplay large carnivore attacks on humans, causing increased fear and negative attitudes towards coexisting with and conserving these species. Although large carnivore populations are generally increasing in developed countries, increased numbers are not solely responsible for the observed rise in the number of attacks by large carnivores. Here we show that an increasing number of people are involved in outdoor activities and, when doing so, some people engage in risk-enhancing behaviour that can increase the probability of a risky encounter and a potential attack. About half of the well-documented reported attacks have involved risk-enhancing human behaviours, the most common of which is leaving children unattended. Our study provides unique insight into the causes, and as a result the prevention, of large carnivore attacks on people. Prevention and information that can encourage appropriate human behaviour when sharing the landscape with large carnivores are of paramount importance to reduce both potentially fatal human-carnivore encounters and their consequences to large carnivores.

  14. Impact of the Antibiotic Stewardship Program on Prevention and Control of Surgical Site Infection during Peri-Operative Clean Surgery.

    Science.gov (United States)

    Liu, Juyuan; Li, Na; Hao, Jinjuan; Li, Yanming; Liu, Anlei; Wu, Yinghong; Cai, Meng

    2018-04-01

    Surgical site infections (SSIs) are the leading cause of hospital-acquired infections and are associated with substantial healthcare costs, with increased morbidity and mortality. To investigate the effects of the antibiotic stewardship program on prevention and control of SSI during clean surgery, we investigated this situation in our institution. We performed a quasi-experimental study to compare the effect before and after the antibiotic stewardship program intervention. During the pre-intervention stage (January 1, 2010 through December 31, 2011), comprehensive surveillance was performed to determine the SSI baseline data. In the second stage (January 1, 2012 through December 31, 2016), an infectious diseases physician and an infection control practitioner identified the surgical patients daily and followed up on the duration of antimicrobial prophylaxis. From January 1, 2010 to December 31, 2016, 41,426 patients underwent clean surgeries in a grade III, class A hospital. The rate of prophylactic antibiotic use in the 41,426 clean surgeries was reduced from 82.9% to 28.0% after the interventions. The rate of antibiotic agents administered within 120 minutes of the first incision increased from 20.8% to 85.1%. The rate at which prophylactic antimicrobial agents were discontinued in the first 24 hours after surgery increased from 22.1% to 60.4%. Appropriate antibiotic selection increased from 37.0% to 93.6%. Prophylactic antibiotic re-dosing increased from 3.8% to 64.8%. The SSI rate decreased from 0.7% to 0.5% (p < 0.05). The pathogen detection rate increased from 16.7% up to 41.8% after intervention. The intensity of antibiotic consumption reduced from 74.9 defined daily doses (DDDs) per 100 bed-days to 34.2 DDDs per 100 bed-days after the interventions. Long-term and continuous antibiotic stewardship programs have important effects on the prevention and control of SSI during clean surgery.

  15. Update to the Centers for Disease Control and Prevention and the Healthcare Infection Control Practices Advisory Committee Guideline for the Prevention of Surgical Site Infection (2017): A summary, review, and strategies for implementation.

    Science.gov (United States)

    O'Hara, Lyndsay M; Thom, Kerri A; Preas, Michael Anne

    2018-03-07

    Surgical site infections remain a common cause of morbidity, mortality, and increased length of stay and cost amongst hospitalized patients in the United States. This article summarizes the evidence used to inform the Centers for Disease Control and Prevention and the Healthcare Infection Control Practices Advisory Committee Guideline for the Prevention of Surgical Site Infection (2017), and highlights key updates and new recommendations. We also present specific suggestions for how infection preventionists can play a central role in guideline implementation by translating these recommendations into evidence-based policies and practices in their facility. Copyright © 2018. Published by Elsevier Inc.

  16. Chess therapy: A new approach to curing panic attack.

    Science.gov (United States)

    Barzegar, Kazem; Barzegar, Somayeh

    2017-12-01

    To study the effect of playing cell phone chess game on treating panic attack. The chess game on an android cell phone was played by the researcher who was affected by panic attack as a post-traumatic disorder immediately after or before feeling of the start of symptoms. The right level of difficulty, i.e., levels 2-4, was selected for optimal results. Playing chess game on the android cell phone prevented the manifestation of panic attack and led to the cure of this traumatic condition. Chess therapy with the right level of difficulty can be recommended as a very effective non-pharmaceutical method for the successful treatment of panic attacks. Copyright © 2017 Elsevier B.V. All rights reserved.

  17. Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems

    Directory of Open Access Journals (Sweden)

    Omar Achbarou

    2017-03-01

    Full Text Available Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system has many common characteristics with distributed systems, hence, the cloud computing also uses the features of networking. Thus the security is the biggest issue of this system, because the services of cloud computing is based on the sharing. Thus, a cloud computing environment requires some intrusion detection systems (IDSs for protecting each machine against attacks. The aim of this work is to present a classification of attacks threatening the availability, confidentiality and integrity of cloud resources and services. Furthermore, we provide literature review of attacks related to the identified categories. Additionally, this paper also introduces related intrusion detection models to identify and prevent these types of attacks.

  18. [Acute asthma attacks introduced by anesthesia before nasal endoscopic surgery].

    Science.gov (United States)

    Lü, Xiaofei; Han, Demin; Zhou, Bing; Ding, Bin

    2004-05-01

    In order to pay our attention to the perioperative treatment before nasal endoscopic surgery. Three patients with asthma accompanied chronic sinusitis were analyzed systemically, who had undergone acute attacks of asthma introduced by anesthesia. Anesthetic drugs and instruments can lead to acute attacks of asthma, because sinusitis with asthma means allergic airway inflammation, broncho-hyperreactivity and lower compensatory pulmonary function. Then all of the 3 cases had missed the preoperative treatment. Anesthetic drugs and instruments can lead to acute attacks of asthma. The perioperative treatment before nasal endoscopic surgery is very important for the prevention of the occurrences of this severe complication. Except emergency, the operation should be can celled for avoiding the acute attack of asthma introduced by anesthesia.

  19. Countermeasures Against Blinding Attack on Superconducting Nanowire Detectors for QKD

    Directory of Open Access Journals (Sweden)

    Elezov M.S.

    2015-01-01

    Full Text Available Nowadays, the superconducting single-photon detectors (SSPDs are used in Quantum Key Distribution (QKD instead of single-photon avalanche photodiodes. Recently bright-light control of the SSPD has been demonstrated. This attack employed a “backdoor” in the detector biasing technique. We developed the autoreset system which returns the SSPD to superconducting state when it is latched. We investigate latched state of the SSPD and define limit conditions for effective blinding attack. Peculiarity of the blinding attack is a long nonsingle photon response of the SSPD. It is much longer than usual single photon response. Besides, we need follow up response duration of the SSPD. These countermeasures allow us to prevent blind attack on SSPDs for Quantum Key Distribution.

  20. Shark Attack Project - Marine Attack at Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Adrianus J

    2005-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  1. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  2. Identifying and tracking attacks on networks: C3I displays and related technologies

    Science.gov (United States)

    Manes, Gavin W.; Dawkins, J.; Shenoi, Sujeet; Hale, John C.

    2003-09-01

    Converged network security is extremely challenging for several reasons; expanded system and technology perimeters, unexpected feature interaction, and complex interfaces all conspire to provide hackers with greater opportunities for compromising large networks. Preventive security services and architectures are essential, but in and of themselves do not eliminate all threat of compromise. Attack management systems mitigate this residual risk by facilitating incident detection, analysis and response. There are a wealth of attack detection and response tools for IP networks, but a dearth of such tools for wireless and public telephone networks. Moreover, methodologies and formalisms have yet to be identified that can yield a common model for vulnerabilities and attacks in converged networks. A comprehensive attack management system must coordinate detection tools for converged networks, derive fully-integrated attack and network models, perform vulnerability and multi-stage attack analysis, support large-scale attack visualization, and orchestrate strategic responses to cyber attacks that cross network boundaries. We present an architecture that embodies these principles for attack management. The attack management system described engages a suite of detection tools for various networking domains, feeding real-time attack data to a comprehensive modeling, analysis and visualization subsystem. The resulting early warning system not only provides network administrators with a heads-up cockpit display of their entire network, it also supports guided response and predictive capabilities for multi-stage attacks in converged networks.

  3. GasAttack

    International Nuclear Information System (INIS)

    MacQuillin, I.

    1998-01-01

    A recent Landfill Directive, which aims to reduce the amount of biodegradable materials being disposed of in landfill sites, must necessarily, it is argued, cause gas supply problems for the fledgling landfill gas industry in the United Kingdom. Prospects for the new industry over the next twenty years are explored in the light of this setback. (UK)

  4. I Was Attacked Online!

    Science.gov (United States)

    Hensel, Jan

    1996-01-01

    Considers some of the problems posed by electronic mail systems when the identity of the user is protected by the server. Suggests that high school instructors and administrators have good reason to circulate electronic messages through a central site, as students need to be protected from exploitative users and prohibited from sending abusive…

  5. Thwarting Nonintrusive Occupancy Detection Attacks from Smart Meters

    Directory of Open Access Journals (Sweden)

    Dapeng Man

    2017-01-01

    Full Text Available Occupancy information is one of the most important privacy issues of a home. Unfortunately, an attacker is able to detect occupancy from smart meter data. The current battery-based load hiding (BLH methods cannot solve this problem. To thwart occupancy detection attacks, we propose a framework of battery-based schemes to prevent occupancy detection (BPOD. BPOD monitors the power consumption of a home and detects the occupancy in real time. According to the detection result, BPOD modifies those statistical metrics of power consumption, which highly correlate with the occupancy by charging or discharging a battery, creating a delusion that the home is always occupied. We evaluate BPOD in a simulation using several real-world smart meter datasets. Our experiment results show that BPOD effectively prevents the threshold-based and classifier-based occupancy detection attacks. Furthermore, BPOD is also able to prevent nonintrusive appliance load monitoring attacks (NILM as a side-effect of thwarting detection attacks.

  6. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  7. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  8. Panic Attacks and Panic Disorder

    Science.gov (United States)

    ... Major changes in your life, such as a divorce or the addition of a baby Smoking or ... quality of life. Complications that panic attacks may cause or be linked to include: Development of specific ...

  9. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-01-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  10. Genetic attack on neural cryptography

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  11. What Is a Heart Attack?

    Science.gov (United States)

    ... medical center. Support from family and friends also can help relieve stress and anxiety. Let your loved ones know how you feel and what they can do to help you. Risk of a Repeat Heart Attack Once ...

  12. Software-based Microarchitectural Attacks

    OpenAIRE

    Gruss, Daniel

    2017-01-01

    Modern processors are highly optimized systems where every single cycle of computation time matters. Many optimizations depend on the data that is being processed. Software-based microarchitectural attacks exploit effects of these optimizations. Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel. This leakage even persists across all common isolation boundaries, such as processes, containers, and virtual ...

  13. OPERATION COBRA. Deliberate Attack, Exploitation

    Science.gov (United States)

    1984-05-25

    to attack Sens, then continue to Troyes , on the Seine River. CCA was in the north, crossing the Loing River at Souppes against light resistance and...advanced from Troyes and prepared positions close to Sens. Under strong artillery support, a task force from CCA (TF Oden) attacked the enemy frontally...movement towards the Seine River on 24 August with an advance toward Troyes . Facing the combat command were what remained of the 51st SS Brigade, light

  14. Neutralizing SQL Injection Attack Using Server Side Code Modification in Web Applications

    Directory of Open Access Journals (Sweden)

    Asish Kumar Dalai

    2017-01-01

    Full Text Available Reports on web application security risks show that SQL injection is the top most vulnerability. The journey of static to dynamic web pages leads to the use of database in web applications. Due to the lack of secure coding techniques, SQL injection vulnerability prevails in a large set of web applications. A successful SQL injection attack imposes a serious threat to the database, web application, and the entire web server. In this article, the authors have proposed a novel method for prevention of SQL injection attack. The classification of SQL injection attacks has been done based on the methods used to exploit this vulnerability. The proposed method proves to be efficient in the context of its ability to prevent all types of SQL injection attacks. Some popular SQL injection attack tools and web application security datasets have been used to validate the model. The results obtained are promising with a high accuracy rate for detection of SQL injection attack.

  15. Design and Implementation of High Interaction Client Honeypot for Drive-by-Download Attacks

    Science.gov (United States)

    Akiyama, Mitsuaki; Iwamura, Makoto; Kawakoya, Yuhei; Aoki, Kazufumi; Itoh, Mitsutaka

    Nowadays, the number of web-browser targeted attacks that lead users to adversaries' web sites and exploit web browser vulnerabilities is increasing, and a clarification of their methods and countermeasures is urgently needed. In this paper, we introduce the design and implementation of a new client honeypot for drive-by-download attacks that has the capacity to detect and investigate a variety of malicious web sites. On the basis of the problems of existing client honeypots, we enumerate the requirements of a client honeypot: 1) detection accuracy and variety, 2) collection variety, 3) performance efficiency, and 4) safety and stability. We improve our system with regard to these requirements. The key features of our developed system are stepwise detection focusing on exploit phases, multiple crawler processing, tracking of malware distribution networks, and malware infection prevention. Our evaluation of our developed system in a laboratory experiment and field experiment indicated that its detection variety and crawling performance are higher than those of existing client honeypots. In addition, our system is able to collect information for countermeasures and is secure and stable for continuous operation. We conclude that our system can investigate malicious web sites comprehensively and support countermeasures.

  16. Economic and organizational sustainability of a negative-pressure portable device for the prevention of surgical-site complications

    Directory of Open Access Journals (Sweden)

    Foglia E

    2017-06-01

    Full Text Available Emanuela Foglia,1 Lucrezia Ferrario,1 Elisabetta Garagiola,1 Giuseppe Signoriello,2 Gianluca Pellino,3 Davide Croce,1,4 Silvestro Canonico3 1Centre for Health Economics, Social and Health Care Management - LIUC University, Castellanza, Italy; 2Department of Mental Health and Preventive Medicine, University of Campania “Luigi Vanvitelli”, Naples, Italy; 3School of Medicine, University of Campania “Luigi Vanvitelli”, Naples, Italy; 4School of Public Health, Faculty of Health Sciences, University of the Witwatersrand, Johannesburg, South \tAfrica Purpose: Surgical-site complications (SSCs affect patients’ clinical pathway, prolonging their hospitalization and incrementing their management costs. The present study aimed to assess the economic and organizational implications of a portable device for negative-pressure wound therapy (NPWT implementation, compared with the administration of pharmacological therapies alone for preventing surgical complications in patients undergoing general, cardiac, obstetrical–gynecological, or orthopedic surgical procedures.Patients and methods: A total of 8,566 hospital procedures, related to the year 2015 from one hospital, were evaluated considering infection risk index, occurrence rates of SSCs, drug therapies, and surgical, diagnostic, and specialist procedures and hematological exams. Activity-based costing and budget impact analyses were implemented for the economic assessment.Results: Patients developing an SSC absorbed i 64.27% more economic resources considering the length of stay (€ 8,269±2,096 versus € 5,034±2,901, p<0.05 and ii 42.43% more economic resources related to hematological and diagnostic procedures (€ 639±117 versus € 449±72, p<0.05. If the innovative device had been used over the 12-month time period, it would have decreased the risk of developing SSCs; the hospital would have realized an average reduction in health care expenditure equal to −0.69% (−€ 483

  17. DoS attacks targeting SIP server and improvements of robustness

    OpenAIRE

    Vozňák, Miroslav; Šafařík, Jakub

    2012-01-01

    The paper describes the vulnerability of SIP servers to DoS attacks and methods for server protection. For each attack, this paper describes their impact on a SIP server, evaluation of the threat and the way in which they are executed. Attacks are described in detail, and a security precaution is made to prevent each of them. The proposed solution of the protection is based on a specific topology of an intrusion protection systems components consisting of a combination of...

  18. An Approach for Assessing Consequences of Potential Supply Chain and Insider Contributed Cyber Attacks on Nuclear Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Chu, Tsong L.

    2016-11-06

    The Stuxnet attack at the Natanz facility is an example of a targeted and successful cyber attack on a nuclear facility. Snowden's release of National Security Agency documents demonstrated the consequences of the insider threat. More recently, the United States tried to attack North Korea but failed, South Korea was attempting to attack North Korea, and both applied Stuxnet-like approaches. These sophisticated targeted attacks differ from web-site hacking events that are reported almost daily in the news mainly because targeted attacks require detailed design and operation information of the systems attacked and/or are often carried out by insiders. For instance, in order to minimize disruption of facilities around the world, Stuxnet remained idle until it recognized the specific configuration of the Natanz facility, demonstrating that the attackers possessed extremely detailed information about the facility. Such targeted cyber attacks could become a national-level military weapon and be used in coercion of hostile countries.

  19. Grid attacks avian flu

    CERN Multimedia

    2006-01-01

    During April, a collaboration of Asian and European laboratories analysed 300,000 possible drug components against the avian flu virus H5N1 using the EGEE Grid infrastructure. Schematic presentation of the avian flu virus.The distribution of the EGEE sites in the world on which the avian flu scan was performed. The goal was to find potential compounds that can inhibit the activities of an enzyme on the surface of the influenza virus, the so-called neuraminidase, subtype N1. Using the Grid to identify the most promising leads for biological tests could speed up the development process for drugs against the influenza virus. Co-ordinated by CERN and funded by the European Commission, the EGEE project (Enabling Grids for E-sciencE) aims to set up a worldwide grid infrastructure for science. The challenge of the in silico drug discovery application is to identify those molecules which can dock on the active sites of the virus in order to inhibit its action. To study the impact of small scale mutations on drug r...

  20. Nursery Pest Management of Phytolyma lata Walker (Scott) Attack ...

    African Journals Online (AJOL)

    The establishment of plantations of Milicia excelsa has been constrained by the gall-forming psyllid Phytolyma lata Walker (Scott) that causes extensive damage to young plants. We present findings of an experiment aimed at preventing Phytolyma attack on Milicia seedlings in the nursery using chemical control and ...

  1. Hardening Logic Encryption against Key Extraction Attacks with Circuit Camouflage

    Science.gov (United States)

    2017-03-01

    camouflage; obfuscation; SAT; key extraction; reverse engineering ; security; trusted electronics Introduction Integrated Circuit (IC) designs are... Circuit camouflage is hardware obfuscation technology that prevents reverse engineering of a fabricated device by utilizing a relatively small...obfuscated with circuit camouflage technology, this type of attack becomes much more difficult because a reverse engineer cannot extract a gate- level

  2. Shark attack-related injuries: Epidemiology and implications for plastic surgeons.

    Science.gov (United States)

    Ricci, Joseph A; Vargas, Christina R; Singhal, Dhruv; Lee, Bernard T

    2016-01-01

    The increased media attention to shark attacks has led to a heightened fear and public awareness. Although few sharks are considered dangerous, attacks on humans can result in large soft tissue defects necessitating the intervention of reconstructive surgeons. This study aims to evaluate and describe the characteristics of shark-related injuries in order to improve treatment. The Global Shark Accident File, maintained by the Shark Research Institute (Princeton, NJ, USA), is a compilation of all known worldwide shark attacks. Database records since the 1900s were reviewed to identify differences between fatal and nonfatal attacks, including: geography, injury pattern, shark species, and victim activity. Since the 1900s, there have been 5034 reported shark attacks, of which 1205 (22.7%) were fatal. Although the incidence of attacks per decade has increased, the percentage of fatalities has decreased. Characteristics of fatal attacks included swimming (p = 0.001), boating (p = 0.001), three or more bite sites (p = 0.03), limb loss (p = 0.001), or tiger shark attack (p = 0.002). The most common attacks were bites to the legs (41.8%) or arms (18.4%), with limb loss occurring in 7% of attacks. Geographically, the majority of attacks occurred in North America (36.7%) and Australia (26.5%). Most attacks in the USA occurred in Florida (49.1%) and California (13.6%). Although rare, shark attacks result in devastating injuries to patients. As these injuries often involve multiple sites and limb loss, this creates a significant challenge for reconstructive surgeons. Proper identification of the characteristics of the attack can aid in providing optimal care for those affected. Copyright © 2015 British Association of Plastic, Reconstructive and Aesthetic Surgeons. Published by Elsevier Ltd. All rights reserved.

  3. Modeling attacker-defender interactions in information networks.

    Energy Technology Data Exchange (ETDEWEB)

    Collins, Michael Joseph

    2010-09-01

    The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in isolation from one another: an attacker seeks to penetrate or disrupt a system that has been protected to a given level, while a defender attempts to thwart particular attacks. Such a model also views all non-malicious parties as having the same goal of preventing all attacks. But in fact, attackers and defenders are interacting parts of the same system, and different defenders have their own individual interests: defenders may be willing to accept some risk of successful attack if the cost of defense is too high. We have used game theory to develop models of how non-cooperative but non-malicious players in a network interact when there is a substantial cost associated with effective defensive measures. Although game theory has been applied in this area before, we have introduced some novel aspects of player behavior in our work, including: (1) A model of how players attempt to avoid the costs of defense and force others to assume these costs; (2) A model of how players interact when the cost of defending one node can be shared by other nodes; and (3) A model of the incentives for a defender to choose less expensive, but less effective, defensive actions.

  4. Using the Domain Name System to Thwart Automated Client-Based Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Taylor, Curtis R [ORNL; Shue, Craig A [ORNL

    2011-09-01

    On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so. Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.

  5. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  6. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error......-prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...... are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  7. Breakthrough attacks in patients with hereditary angioedema receiving long-term prophylaxis are responsive to icatibant

    DEFF Research Database (Denmark)

    Aberer, Werner; Maurer, Marcus; Bouillet, Laurence

    2017-01-01

    BACKGROUND: Patients with hereditary angioedema (HAE) due to C1-inhibitor deficiency (C1-INH-HAE) experience recurrent attacks of cutaneous or submucosal edema that may be frequent and severe; prophylactic treatments can be prescribed to prevent attacks. However, despite the use of long-term prop...

  8. The ATPG Attack for Reverse Engineering of Combinational Hybrid Custom-Programmable Circuits

    Science.gov (United States)

    2017-03-23

    Introduction The widely practiced horizontal integrated circuit supply chain exposes a design to various types of attacks including the reverse engineering ...STT_CMOS designs for reverse- engineering prevention, DAC 2016. [5] M. E. Massad and et. al. Integrated circuit (IC) decamouflaging: reverse...The ATPG Attack for Reverse Engineering of Combinational Hybrid Custom-Programmable Circuits Raza Shafiq Hamid Mahmoodi Houman Homayoun Hassan

  9. An Analysis of Attacks on Blockchain Consensus

    OpenAIRE

    Bissias, George; Levine, Brian Neil; Ozisik, A. Pinar; Andresen, Gavin

    2016-01-01

    We present and validate a novel mathematical model of the blockchain mining process and use it to conduct an economic evaluation of the double-spend attack, which is fundamental to all blockchain systems. Our analysis focuses on the value of transactions that can be secured under a conventional double-spend attack, both with and without a concurrent eclipse attack. Our model quantifies the importance of several factors that determine the attack's success, including confirmation depth, attacke...

  10. Recurrent spontaneous attacks of dizziness.

    Science.gov (United States)

    Lempert, Thomas

    2012-10-01

    This article describes the common causes of recurrent vertigo and dizziness that can be diagnosed largely on the basis of history. Ninety percent of spontaneous recurrent vertigo and dizziness can be explained by six disorders: (1) Ménière disease is characterized by vertigo attacks, lasting 20 minutes to several hours, with concomitant hearing loss, tinnitus, and aural fullness. Aural symptoms become permanent during the course of the disease. (2) Attacks of vestibular migraine may last anywhere from minutes to days. Most patients have a previous history of migraine headaches, and many experience migraine symptoms during the attack. (3) Vertebrobasilar TIAs affect older adults with vascular risk factors. Most attacks last less than 1 hour and are accompanied by other symptoms from the posterior circulation territory. (4) Vestibular paroxysmia is caused by vascular compression of the eighth cranial nerve. It manifests itself with brief attacks of vertigo that recur many times per day, sometimes with concomitant cochlear symptoms. (5) Orthostatic hypotension causes brief episodes of dizziness lasting seconds to a few minutes after standing up and is relieved by sitting or lying down. In older adults, it may be accompanied by supine hypertension. (6) Panic attacks usually last minutes, occur in specific situations, and are accompanied by choking, palpitations, tremor, heat, and anxiety. Less common causes of spontaneous recurrent vertigo and dizziness include perilymph fistula, superior canal dehiscence, autoimmune inner ear disease, otosclerosis, cardiac arrhythmia, and medication side effects. Neurologists need to venture into otolaryngology, internal medicine, and psychiatry to master the differential diagnosis of recurrent dizziness.

  11. AntibIoTic: Protecting IoT Devices Against DDoS Attacks

    DEFF Research Database (Denmark)

    De Donno, Michele; Dragoni, Nicola; Giaretta, Alberto

    2018-01-01

    The 2016 is remembered as the year that showed to the world how dangerous Distributed Denial of Service attacks can be. Gauge of the disruptiveness of DDoS attacks is the number of bots involved: the bigger the botnet, the more powerful the attack. This character, along with the increasing...... availability of connected and insecure IoT devices, makes DDoS and IoT the perfect pair for the malware industry. In this paper we present the main idea behind AntibIoTic, a palliative solution to prevent DDoS attacks perpetrated through IoT devices....

  12. Hereditary angioedema attacks resolve faster and are shorter after early icatibant treatment.

    Directory of Open Access Journals (Sweden)

    Marcus Maurer

    Full Text Available BACKGROUND: Attacks of hereditary angioedema (HAE are unpredictable and, if affecting the upper airway, can be lethal. Icatibant is used for physician- or patient self-administered symptomatic treatment of HAE attacks in adults. Its mode of action includes disruption of the bradykinin pathway via blockade of the bradykinin B(2 receptor. Early treatment is believed to shorten attack duration and prevent severe outcomes; however, evidence to support these benefits is lacking. OBJECTIVE: To examine the impact of timing of icatibant administration on the duration and resolution of HAE type I and II attacks. METHODS: The Icatibant Outcome Survey is an international, prospective, observational study for patients treated with icatibant. Data on timings and outcomes of icatibant treatment for HAE attacks were collected between July 2009-February 2012. A mixed-model of repeated measures was performed for 426 attacks in 136 HAE type I and II patients. RESULTS: Attack duration was significantly shorter in patients treated <1 hour of attack onset compared with those treated ≥ 1 hour (6.1 hours versus 16.8 hours [p<0.001]. Similar significant effects were observed for <2 hours versus ≥ 2 hours (7.2 hours versus 20.2 hours [p<0.001] and <5 hours versus ≥ 5 hours (8.0 hours versus 23.5 hours [p<0.001]. Treatment within 1 hour of attack onset also significantly reduced time to attack resolution (5.8 hours versus 8.8 hours [p<0.05]. Self-administrators were more likely to treat early and experience shorter attacks than those treated by a healthcare professional. CONCLUSION: Early blockade of the bradykinin B(2 receptor with icatibant, particularly within the first hour of attack onset, significantly reduced attack duration and time to attack resolution.

  13. Meeting blood requirements following terrorist attacks: the Israeli experience.

    Science.gov (United States)

    Shinar, Eilat; Yahalom, Vered; Silverman, Barbara G

    2006-11-01

    Blood services worldwide must be prepared to meet surges in demand for blood components needed by casualties of domestic disasters and acts of terrorism. Israel's National Blood Services, operated by Magen David Adom, has extensive experience in managing blood collections and supply in emergencies. This review summarizes the structure and function of Magen David Adom's national blood program, and relates its experience to other practices that have been reported in the medical literature. Between 2000 and 2005, 7497 victims (85% civilians) were involved in 1645 terrorist attacks in Israel. On-site triage resulted in 967 (13%) deaths at the scene, 615 (8%) with severe injuries, 897 (12%) with moderate injuries and 5018 (67%) with mild injuries. Requests for blood averaged 1.3 blood units and 0.9 components per casualty, or 6.7 units and 4.5 components per severe and moderately injured patient. Public appeals for blood donations were managed centrally to match supply with demand and prevent wastage. This experience illustrates the advantages of a comprehensive program for managing blood operations in emergency situations. A coordinated national program can stabilize in-hospital inventories during routine activities, ensure instant access to precisely defined inventories, facilitate sufficient supply in times of disasters, and minimize outdating and wastage.

  14. Investigating multi-thread utilization as a software defence mechanism against side channel attacks

    CSIR Research Space (South Africa)

    Frieslaar, Ibraheem

    2016-11-01

    Full Text Available out information at critical points in the cryptographic algorithm and confuse the attacker. This research demonstrates it is capable of outperforming the known countermeasure of hiding and shuffling in terms of preventing the secret information from...

  15. CodeArmor : Virtualizing the Code Space to Counter Disclosure Attacks

    NARCIS (Netherlands)

    Chen, Xi; Bos, Herbert; Giuffrida, Cristiano

    2017-01-01

    Code diversification is an effective strategy to prevent modern code-reuse exploits. Unfortunately, diversification techniques are inherently vulnerable to information disclosure. Recent diversification-aware ROP exploits have demonstrated that code disclosure attacks are a realistic threat, with an

  16. Can You Recognize a Heart Attack or Stroke? What To Do When Every Moment Counts

    Science.gov (United States)

    ... Special Issues Subscribe August 2014 Print this issue Can You Recognize a Heart Attack or Stroke? What ... could prevent many of these deaths. Fast action can also limit permanent damage to the body. Heart ...

  17. SYN Flood Attack Detection in Cloud Computing using Support Vector Machine

    Directory of Open Access Journals (Sweden)

    Zerina Mašetić

    2017-11-01

    Full Text Available Cloud computing is a trending technology, as it reduces the cost of running a business. However, many companies are skeptic moving about towards cloud due to the security concerns. Based on the Cloud Security Alliance report, Denial of Service (DoS attacks are among top 12 attacks in the cloud computing. Therefore, it is important to develop a mechanism for detection and prevention of these attacks. The aim of this paper is to evaluate Support Vector Machine (SVM algorithm in creating the model for classification of DoS attacks and normal network behaviors. The study was performed in several phases: a attack simulation, b data collection, cfeature selection, and d classification. The proposedmodel achieved 100% classification accuracy with true positive rate (TPR of 100%. SVM showed outstanding performance in DoS attack detection and proves that it serves as a valuable asset in the network security area.

  18. A DoS/DDoS Attack Detection System Using Chi-Square Statistic Approach

    Directory of Open Access Journals (Sweden)

    Fang-Yie Leu

    2010-04-01

    Full Text Available Nowadays, users can easily access and download network attack tools, which often provide friendly interfaces and easily operated features, from the Internet. Therefore, even a naive hacker can also launch a large scale DoS or DDoS attack to prevent a system, i.e., the victim, from providing Internet services. In this paper, we propose an agent based intrusion detection architecture, which is a distributed detection system, to detect DoS/DDoS attacks by invoking a statistic approach that compares source IP addresses' normal and current packet statistics to discriminate whether there is a DoS/DDoS attack. It first collects all resource IPs' packet statistics so as to create their normal packet distribution. Once some IPs' current packet distribution suddenly changes, very often it is an attack. Experimental results show that this approach can effectively detect DoS/DDoS attacks.

  19. Mitigating Higher Ed Cyber Attacks

    Science.gov (United States)

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  20. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  1. Cyber Attacks and Energy Infrastructures: Anticipating Risks

    International Nuclear Information System (INIS)

    Desarnaud, Gabrielle

    2017-01-01

    This study analyses the likelihood of cyber-attacks against European energy infrastructures and their potential consequences, particularly on the electricity grid. It also delivers a comparative analysis of measures taken by different European countries to protect their industries and collaborate within the European Union. The energy sector experiences an unprecedented digital transformation upsetting its activities and business models. Our energy infrastructures, sometimes more than a decade old and designed to remain functional for many years to come, now constantly interact with light digital components. The convergence of the global industrial system with the power of advanced computing and analytics reveals untapped opportunities at every step of the energy value chain. However, the introduction of digital elements in old and unprotected industrial equipment also exposes the energy industry to the cyber risk. One of the most compelling example of the type of threat the industry is facing, is the 2015 cyber-attack on the Ukraine power grid, which deprived about 200 000 people of electricity in the middle of the winter. The number and the level of technical expertise of cyber-attacks rose significantly after the discovery of the Stuxnet worm in the network of Natanz uranium enrichment site in 2010. Energy transition policies and the growing integration of renewable sources of energy will intensify this tendency, if cyber security measures are not part of the design of our future energy infrastructures. Regulators try to catch up and adapt, like in France where the authorities collaborate closely with the energy industry to set up a strict and efficient regulatory framework, and protect critical operators. This approach is adopted elsewhere in Europe, but common measures applicable to the whole European Union are essential to protect strongly interconnected energy infrastructures against a multiform threat that defies frontiers

  2. Mitigating Drive-By Download Attacks: Challenges and Open Problems

    Science.gov (United States)

    Egele, Manuel; Kirda, Engin; Kruegel, Christopher

    Malicious web sites perform drive-by download attacks to infect their visitors with malware. Current protection approaches rely on black- or white-listing techniques that are difficult to keep up-to-date. As todays drive-by attacks already employ encryption to evade network level detection we propose a series of techniques that can be implemented in web browsers to protect the user from such threats. In addition, we discuss challenges and open problems that these mechanisms face in order to be effective and efficient.

  3. Detection of network attacks based on adaptive resonance theory

    Science.gov (United States)

    Bukhanov, D. G.; Polyakov, V. M.

    2018-05-01

    The paper considers an approach to intrusion detection systems using a neural network of adaptive resonant theory. It suggests the structure of an intrusion detection system consisting of two types of program modules. The first module manages connections of user applications by preventing the undesirable ones. The second analyzes the incoming network traffic parameters to check potential network attacks. After attack detection, it notifies the required stations using a secure transmission channel. The paper describes the experiment on the detection and recognition of network attacks using the test selection. It also compares the obtained results with similar experiments carried out by other authors. It gives findings and conclusions on the sufficiency of the proposed approach. The obtained information confirms the sufficiency of applying the neural networks of adaptive resonant theory to analyze network traffic within the intrusion detection system.

  4. 3% Amuchina is as effective as the 50% concentration in the prevention of exit-site infection in children on chronic peritoneal dialysis.

    Science.gov (United States)

    Grosman, Mònica D; Mosquera, Vanesa M; Hernandez, Maria G; Agostini, Silvana; Adragna, Marta; Sojo, Ernesto T

    2005-01-01

    In a previous communication, we demonstrated that, in the prevention of exit-site infection (ESI) in children, the cleansing agent 50% Amuchina (electrolytic chloroxidizer. Amuchina SpA, Genoa, Italy) is more effective than 10% povidone iodine and as effective as 4% chlorhexidine, but with fewer adverse secondary effects. In the present study, we assessed, in an Argentine pediatric population, whether Amuchina 3% is as effective as Amuchina 50% in preventing ESI in children on chronic peritoneal dialysis. In an open-label, single-center prospective study, 27 children (mean age: 7.2 years; range: 1.7-17 years) used 3% Amuchina as a cleansing agent for the daily care of a healthy exit site. Of the 27 children, 14 were switched from 50% Amuchina to 3% Amuchina, and 13 were using the 3% Amuchina for the first time. The control group consisted of 18 patients who had previously used 50% Amuchina as a cleansing agent. We followed the recommendations of the International Society for Peritoneal Dialysis with regard to exit-site care, which include keeping the cleansing agent out of the sinus and rinsing the exit site with sterile water. Amuchina was used from the first post-implantation care of the exit site. No adverse secondary effects were seen with the use of Amuchina at either concentration. Patients using 3% Amuchina presented an ESI rate similar to that of patients using Amuchina 50%. The cost of 3% Amuchina was significantly lower than that of the 50% concentration, and it was even lower than the cost for 10% povidone iodine or 4% chlorhexidine. Although more research trials are needed to assess the efficacy of 3% Amuchina, we conclude that 3% Amuchina is the best and most cost-effective cleansing agent for the daily care of a healthy exit site in children on chronic peritoneal dialysis.

  5. Peacetime Use of Computer Network Attack

    National Research Council Canada - National Science Library

    Busby, Daniel

    2000-01-01

    .... PDD-63 alerts the nation to prepare for impending cyber attacks. This paper examines the nature, scale, and likelihood of cyber attacks posited in PDD-63 and finds that the country does not face an imminent "electronic Pearl Harbor...

  6. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... of this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter ... most common heart attack symptom in men and women is chest pain or discomfort. However, women also ...

  7. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  8. Robust Detection of Stepping-Stone Attacks

    National Research Council Canada - National Science Library

    He, Ting; Tong, Lang

    2006-01-01

    The detection of encrypted stepping-stone attack is considered. Besides encryption and padding, the attacker is capable of inserting chaff packets and perturbing packet timing and transmission order...

  9. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within...

  10. SDN-based path hopping communication against eavesdropping attack

    Science.gov (United States)

    Zhang, Chuanhao; Bu, Youjun; Zhao, Zheng

    2016-10-01

    Network eavesdropping is one of the most popular means used by cyber attackers, which has been a severe threat to network communication security. Adversaries could capture and analyze network communication data from network nodes or links, monitor network status and steal sensitive data such as username and password etc. Traditional network usually uses static network configuration, and existing defense methods, including firewall, IDS, IPS etc., cannot prevent eavesdropping, which has no distinguishing characteristic. Network eavesdropping become silent during most of the time of the attacking process, which is why it is difficult to discover and to defend. But A successful eavesdropping attack also has its' precondition, which is the target path should be relatively stable and has enough time of duration. So, In order to resolve this problem, it has to work on the network architecture. In this paper, a path hopping communication(PHC) mechanism based on Software Define Network (SDN) was proposed to solve this problem. In PHC, Ends in communication packets as well as the routing paths were changed dynamically. Therefore, the traffic would be distributed to multiple flows and transmitted along different paths. so that Network eavesdropping attack could be prevented effectively. It was concluded that PHC was able to increase the overhead of Network eavesdropping, as well as the difficulty of communication data recovery.

  11. Attack Graph Construction for Security Events Analysis

    Directory of Open Access Journals (Sweden)

    Andrey Alexeevich Chechulin

    2014-09-01

    Full Text Available The paper is devoted to investigation of the attack graphs construction and analysis task for a network security evaluation and real-time security event processing. Main object of this research is the attack modeling process. The paper contains the description of attack graphs building, modifying and analysis technique as well as overview of implemented prototype for network security analysis based on attack graph approach.

  12. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  13. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank...

  14. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  15. A Bioterrorism Prevention Strategy for the 21st Century

    National Research Council Canada - National Science Library

    Lein, Brian

    2003-01-01

    .... The results of the anthrax attack and multiple wargames revealed that the United States is currently ill prepared to prevent or deter a bioterrorism attack against it's homeland and protect the citizens...

  16. Detection of Variations of Local Irregularity of Traffic under DDOS Flood Attack

    Directory of Open Access Journals (Sweden)

    Ming Li

    2008-01-01

    Full Text Available The aim of distributed denial-of-service (DDOS flood attacks is to overwhelm the attacked site or to make its service performance deterioration considerably by sending flood packets to the target from the machines distributed all over the world. This is a kind of local behavior of traffic at the protected site because the attacked site can be recovered to its normal service state sooner or later even though it is in reality overwhelmed during attack. From a view of mathematics, it can be taken as a kind of short-range phenomenon in computer networks. In this paper, we use the Hurst parameter (H to measure the local irregularity or self-similarity of traffic under DDOS flood attack provided that fractional Gaussian noise (fGn is used as the traffic model. As flood attack packets of DDOS make the H value of arrival traffic vary significantly away from that of traffic normally arriving at the protected site, we discuss a method to statistically detect signs of DDOS flood attacks with predetermined detection probability and false alarm probability.

  17. [Comparative analysis of phenomenology of paroxysms of atrial fibrillation and panic attacks].

    Science.gov (United States)

    San'kova, T A; Solov'eva, A D; Nedostup, A V

    2004-01-01

    To study phenomenology of attacks of atrial fibrillation (AF) and to compare it with phenomenology of panic attacks for elucidation of pathogenesis of atrial fibrillation and for elaboration of rational therapeutic intervention including those aimed at correction of psychovegetative abnormalities. Patients with nonrheumatic paroxysmal AF (n=105) and 100 patients with panic attacks (n=100). Clinical, cardiological and neurological examination, analysis of patients complaints during attacks of AF, and comparison them with diagnostic criteria for panic attack. It was found that clinical picture of attacks of AF comprised vegetative, emotional and functional neurological phenomena similar to those characteristic for panic attacks. This similarity as well as positive therapeutic effect of clonazepam allowed to propose a novel pathogenic mechanism of AF attacks. Severity of psychovegetative disorders during paroxysm of AF could be evaluated by calculation of psychovegetative iudex: Psychovegetative index should be used for detection of panic attack-like component in clinical picture of AF paroxysm and thus for determination of indications for inclusion of vegetotropic drugs, e. g. clonazepam, in complex preventive therapy.

  18. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  19. Give Water a Hand. School Site Action Guide. Organizing Water Conservation and Pollution Prevention Service Projects in Your Community.

    Science.gov (United States)

    Wisconsin Univ., Madison. Coll. of Agricultural and Life Sciences.

    Students grades 4-8 can use this guide to explore the topics of water, and water conservation at a school site, while conducting an environmental community service project. Youth groups, led by a group leader, work with local experts from business, government, or environmental organizations to complete the project. Nine activity sections involve…

  20. Waste minimization and pollution prevention in D ampersand D operations at the Argonne National Laboratory-East site

    International Nuclear Information System (INIS)

    Boing, L.E.; Coffey, M.J.; Ditch, R.W.; Fellhauer, C.R.; Rose, R.W.

    1996-01-01

    Argonne National Laboratory (ANL) is implementing waste minimization and pollution prevention activities into its conduct of decontamination and decommissioning (D ampersand D) projects. Many of these activities are rather straight forward and simple approaches, yet they are often overlooked and not implemented as often as they should or could be. Specific activities involving recycling and reuse of materials and structures, which have proven useful in lowering decommissioning and disposal costs on D ampersand D projects at ANL are presented

  1. Attacks on IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Dejan Milan Tepšić

    2013-06-01

    Full Text Available Security of wireless computer networks was initially secured with the WEP security protocol, which relies on the RC4 encryption algorithm and the CRC algorithm to check the integrity. The basic problems of the WEP are a short initialization vector, unsafe data integrity checking, using a common key, the lack of mechanisms for management and exchange of keys, the lack of protection from the endless insertion of the same package into the network, the lack of authentication of access points and the like. The consequences of these failures are easy attacks against the WEP network, namely their complete insecurity. Therefore, the work began on the IEEE 802.11i protocol, which should radically improve the security of wireless networks. Since the development of a protocol lasted, the WPA standard was released to offset the security gap caused by the WEP. The WPA also relies on RC4 and CRC algorithms, but brings temporary keys and the MIC algorithm for data integrity. The 802.1X authentication was introduced and common keys are no longer needed, since it is possible to use an authentication server. The length of the initialization vector was increased and the vector is obtained based on the packet serial number, in order to prevent the insertion of the same packet into the network. The weakness of the WPA security mechanism is the use of a common key. WPA2 (802.11i later appeared. Unlike the WPA mechanism that worked on old devices with the replacement of software, WPA2 requires new network devices that can perform AES encryption. AES replaces the RC4 algorithm and delivers much greater security. Data integrity is protected by encryption. Despite progress, there are still weaknesses in wireless networks. Attacks for denial of service are possible as well as spoofing package headers attacks. For now, it is not advisable to use wireless networks in environments where unreliability and unavailability are not tolerated. Introduction In the entire history of

  2. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  3. Script-viruses Attacks on UNIX OS

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-06-01

    Full Text Available In this article attacks on UNIX OS are considered. Currently antivirus developers are concentrated on protecting systems from viruses that are most common and attack popular operating systems. If the system or its components are not often attacked then the antivirus products are not protecting these components as it is not profitable. The same situation is with script-viruses for UNIX OS as most experts consider that it is impossible for such viruses to get enough rights to attack. Nevertheless the main conclusion of this article is the fact that such viruses can be very powerful and can attack systems and get enough rights.

  4. The comparison of exit-site care with normal saline and povidone-iodine in preventing exit-site infection and peritonitis in children on chronic peritoneal dialysis treatment

    Directory of Open Access Journals (Sweden)

    Onder Yavascan

    2011-01-01

    Full Text Available Peritonitis and catheter exit- site infections (ESI are important causes of hospitalization and catheter loss in patients undergoing chronic peritoneal dialysis (CPD. The frequency of infection can be reduced by scrupulous exit- site care with or without topical antiseptics. There are no studies showing any benefit in the use of povidone-iodine or normal saline for care of exit- sites in long- term CPD patients. In this study, we aimed to determine the potential effectiveness of the application of povidone-iodine or normal saline at the catheter exit- site in preventing ESI and peritonitis in children on CPD. A total of 98 patients treated with either povidone-iodine or normal saline were included in this study. Group I (34 patients used povidone-iodine and group II (64 patients simply cleansed the exit- site with normal saline (0.9% NaCl. Dressings were changed 2 to 3 times in a week. The total cumulative follow- up time was 3233 patient- months. ESIs occurred in 10 (29.4% of 34 patients using povidone-iodine and in 10 (15.6% of 64 patients using normal saline. The frequency of ESI was significantly high in group I (povidone-iodine patients. The mean rate of ESI was 1 episode/60.8 patient- months for group I versus 1 episode/144 patient- months for group II (P 0.05. In conclusion, exit- site care with normal saline is an effective strategy in reducing the incidence of ESI in children on CPD. It can thus significantly reduce morbidity, catheter loss, and the need to transfer patients on peritoneal dialysis to hemodialysis.

  5. Using the Electronic Health Record Data in Real Time and Predictive Analytics to Prevent Hospital-Acquired Postoperative/Surgical Site Infections.

    Science.gov (United States)

    Falen, Thomas; Noblin, Alice M; Russell, O Lucia; Santiago, Nonica

    Of critical concern to hospitals today is the prevention of postoperative (surgical site) infections that often result in increased lengths of stays for patients, increased resource demands and costs, loss of public trust and lawsuits, and needless pain and suffering for patients and their families. While all surgical patients have the potential to develop a postoperative infection, the main challenge is to identify key risk factors (both patient centered and operational) through an electronic early-warning system to reduce the likelihood of a postoperative infection from occurring. Currently, most postoperative infection risk prevention practices encompass limited use of informatics technologies or do not maximize the potential benefits. In addition, from a research perspective, there has been more focus on extrapolating electronically housed data (eg, from progress notes, operative notes, laboratory, pharmacy, radiology) retrospectively to describe poor patient outcomes for benchmarking purposes (revealing poor results and opportunities for improvement) rather than using similar sources of real-time data to prevent poor patient outcomes from occurring. This article proposes that standardized indicators, both patient centered and operational, linked to the patient's electronic health record could allow for implementation of 24/7, "real-time" monitoring/surveillance to implement well-timed preventive interventions scaled to each patient and facility to assist caregivers in reducing the numbers of postoperative infections and improve the overall quality and costs of patient care.

  6. Prospective Vigilance: Assessing Complex Coordinated Attack Preparedness Programs

    Science.gov (United States)

    2017-12-01

    INTENTIONALLY LEFT BLANK xiii LIST OF ACRONYMS AND ABBREVIATIONS CCA complex coordinate attack EMS emergency medical services FBI Federal Bureau...the Bombings in London on 7th July 2005, vol. HC 1087 (London: The Stationery Office, 2006), https://www.gov.uk/government/uploads/system/uploads...School Center for Homeland Defense and Security Mobile Education Team, DHS Office of Bombing Prevention, and DHS Active Shooter training. 55 NCTC, DHS

  7. Understanding network hacks attack and defense with Python

    CERN Document Server

    Ballmann, Bastian

    2015-01-01

    This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore the reader will be introduced to defense methods such as intrusion detection and prevention systems and log file analysis by diving into code.

  8. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks. In prac......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks....... In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  9. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based......Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....

  10. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  11. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...... AES or similar algorithms in virtualized environments. This paper applies variants of this cache timing attack to Intel's latest generation of microprocessors. It enables a spy-process to recover cryptographic keys, interacting with the victim processes only over TCP. The threat model is a logically...... separated but CPU co-located attacker with root privileges. We report successful and practically verified applications of this attack against a wide range of microarchitectures, from a two-core Nehalem processor (i5-650) to two-core Haswell (i7-4600M) and four-core Skylake processors (i7-6700). The attack...

  12. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  13. Attack-Resistant Trust Metrics

    Science.gov (United States)

    Levien, Raph

    The Internet is an amazingly powerful tool for connecting people together, unmatched in human history. Yet, with that power comes great potential for spam and abuse. Trust metrics are an attempt to compute the set of which people are trustworthy and which are likely attackers. This chapter presents two specific trust metrics developed and deployed on the Advogato Website, which is a community blog for free software developers. This real-world experience demonstrates that the trust metrics fulfilled their goals, but that for good results, it is important to match the assumptions of the abstract trust metric computation to the real-world implementation.

  14. The Justice of Preventive War

    National Research Council Canada - National Science Library

    Stephenson, Henry

    2004-01-01

    In response to the 9/11 attacks and continuing threats of mass-casualty terrorism, the United States has adopted a new security strategy that emphasizes anticipatory actions, including preventive war...

  15. Effectiveness of triclosan-coated PDS Plus versus uncoated PDS II sutures for prevention of surgical site infection after abdominal wall closure: the randomised controlled PROUD trial.

    Science.gov (United States)

    Diener, Markus K; Knebel, Phillip; Kieser, Meinhard; Schüler, Philipp; Schiergens, Tobias S; Atanassov, Vladimir; Neudecker, Jens; Stein, Erwin; Thielemann, Henryk; Kunz, Reiner; von Frankenberg, Moritz; Schernikau, Utz; Bunse, Jörg; Jansen-Winkeln, Boris; Partecke, Lars I; Prechtl, Gerald; Pochhammer, Julius; Bouchard, Ralf; Hodina, René; Beckurts, K Tobias E; Leißner, Lothar; Lemmens, Hans-Peter; Kallinowski, Friedrich; Thomusch, Oliver; Seehofer, Daniel; Simon, Thomas; Hyhlik-Dürr, Alexander; Seiler, Christoph M; Hackert, Thilo; Reissfelder, Christoph; Hennig, René; Doerr-Harim, Colette; Klose, Christina; Ulrich, Alexis; Büchler, Markus W

    2014-07-12

    Postoperative surgical site infections are one of the most frequent complications after open abdominal surgery, and triclosan-coated sutures were developed to reduce their occurrence. The aim of the PROUD trial was to obtain reliable data for the effectiveness of triclosan-coated PDS Plus sutures for abdominal wall closure, compared with non-coated PDS II sutures, in the prevention of surgical site infections. This multicentre, randomised controlled group-sequential superiority trial was done in 24 German hospitals. Adult patients (aged ≥18 years) who underwent elective midline abdominal laparotomy for any reason were eligible for inclusion. Exclusion criteria were impaired mental state, language problems, and participation in another intervention trial that interfered with the intervention or outcome of this trial. A central web-based randomisation tool was used to randomly assign eligible participants by permuted block randomisation with a 1:1 allocation ratio and block size 4 before mass closure to either triclosan-coated sutures (PDS Plus) or uncoated sutures (PDS II) for abdominal fascia closure. The primary endpoint was the occurrence of superficial or deep surgical site infection according to the Centers for Disease Control and Prevention criteria within 30 days after the operation. Patients, surgeons, and the outcome assessors were masked to group assignment. Interim and final analyses were by modified intention to treat. This trial is registered with the German Clinical Trials Register, number DRKS00000390. Between April 7, 2010, and Oct 19, 2012, 1224 patients were randomly assigned to intervention groups (607 to PDS Plus, and 617 to PDS II), of whom 1185 (587 PDS Plus and 598 PDS II) were analysed by intention to treat. The study groups were well balanced in terms of patient and procedure characteristics. The occurrence of surgical site infections did not differ between the PDS Plus group (87 [14·8%] of 587) and the PDS II group (96 [16·1%] of 598

  16. Migraine attacks the Basal Ganglia

    Directory of Open Access Journals (Sweden)

    Bigal Marcelo

    2011-09-01

    Full Text Available Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month. The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF to a matched (gender, age, age of onset and type of medication group of patients whose migraine episodes progressed (HF. Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine.

  17. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  18. Protecting water and wastewater infrastructure from cyber attacks

    Institute of Scientific and Technical Information of China (English)

    Srinivas Panguluri; William Phillips; John Cusimano

    2011-01-01

    Multiple organizations over the years have collected and analyzed data on cyber attacks and they all agree on one conclusion:cyber attacks are real and can cause significant damages.This paper presents some recent statistics on cyber attacks and resulting damages.Water and wastewater utilities must adopt countermeasures to prevent or minimize the damage in case of such attacks.Many unique challenges are faced by the water and wastewater industry while selecting and implementing security countermeasures; the key challenges are:1) the increasing interconnection of their business and control system networks,2) large variation of proprietary industrial control equipment utilized,3) multitude of cross-sector cyber-security standards,and 4) the differences in the equipment vendor's approaches to meet these security standards.The utilities can meet these challenges by voluntarily selecting and adopting security standards,conducting a gap analysis,performing vulnerability/risk analysis,and undertaking countermeasures that best meets their security and organizational requirements.Utilities should optimally utilize their limited resources to prepare and implement necessary programs that are designed to increase cyber-security over the years.Implementing cyber security does not necessarily have to be expensive,substantial improvements can be accomplished through policy,procedure,training and awareness.Utilities can also get creative and allocate more funding through annual budgets and reduce dependence upon capital improvement programs to achieve improvements in cyber-security.

  19. Protecting water and wastewater infrastructure from cyber attacks

    Science.gov (United States)

    Panguluri, Srinivas; Phillips, William; Cusimano, John

    2011-12-01

    Multiple organizations over the years have collected and analyzed data on cyber attacks and they all agree on one conclusion: cyber attacks are real and can cause significant damages. This paper presents some recent statistics on cyber attacks and resulting damages. Water and wastewater utilities must adopt countermeasures to prevent or minimize the damage in case of such attacks. Many unique challenges are faced by the water and wastewater industry while selecting and implementing security countermeasures; the key challenges are: 1) the increasing interconnection of their business and control system networks, 2) large variation of proprietary industrial control equipment utilized, 3) multitude of cross-sector cyber-security standards, and 4) the differences in the equipment vendor's approaches to meet these security standards. The utilities can meet these challenges by voluntarily selecting and adopting security standards, conducting a gap analysis, performing vulnerability/risk analysis, and undertaking countermeasures that best meets their security and organizational requirements. Utilities should optimally utilize their limited resources to prepare and implement necessary programs that are designed to increase cyber-security over the years. Implementing cyber security does not necessarily have to be expensive, substantial improvements can be accomplished through policy, procedure, training and awareness. Utilities can also get creative and allocate more funding through annual budgets and reduce dependence upon capital improvement programs to achieve improvements in cyber-security.

  20. Characterization of two second-site mutations preventing wild type protein aggregation caused by a dominant negative PMA1 mutant.

    Directory of Open Access Journals (Sweden)

    Pilar Eraso

    Full Text Available The correct biogenesis and localization of Pma1 at the plasma membrane is essential for yeast growth. A subset of PMA1 mutations behave as dominant negative because they produce aberrantly folded proteins that form protein aggregates, which in turn provoke the aggregation of the wild type protein. One approach to understand this dominant negative effect is to identify second-site mutations able to suppress the dominant lethal phenotype caused by those mutant alleles. We isolated and characterized two intragenic second-site suppressors of the PMA1-D378T dominant negative mutation. We present here the analysis of these new mutations that are located along the amino-terminal half of the protein and include a missense mutation, L151F, and an in-frame 12bp deletion that eliminates four residues from Cys409 to Ala412. The results show that the suppressor mutations disrupt the interaction between the mutant and wild type enzymes, and this enables the wild type Pma1 to reach the plasma membrane.

  1. A RANDOMIZED CONTROLLED STUDY OF RISK FACTORS AND ROLE OF PROPHYLACTIC ANTIBIOTICS IN PREVENTION OF SURGICAL SITE INFECTIONS

    Directory of Open Access Journals (Sweden)

    Avijeet Mukherjee, Naveen N

    2015-01-01

    Full Text Available Background and Objectives: Surgical site infection (SSI is the most common nosocomial infection encountered in post operative surgical wards. The use of prophylactic antibiotic in clean elective surgical cases is still a subject of controversy to surgeons. The objective of the study is to identify the need for using prophylactic antibiotics in clean surgeries, prevalence of organisms in patients who are not given prophylactic antibiotics and to study whether the presence of risk factors increase the incidence of surgical site infection. Methodology: The comparative study consists of 100 cases admitted under two groups of 50 each: Group A was given prophylactic antibiotic and Group B didn’t receive any. All surgeries other than clean surgical cases were excluded from the study. Results: Out of 50 patients in group B who were not given prophylactic antibiotic, 2 patients had more than one risk factor for development of SSI and both of them developed SSI. Of the 50 patients who received prophylactic antibiotic, none developed SSI. The rate of infection in group A was nil and in Group B was 4%. Conclusion: Prophylactic antibiotics are not recommended for clean elective surgical cases as there is no statistically significant change in the infection rate seen in patients not receiving prophylactic antibiotic(P=0.4952. Meticulous surgical technique and correcting risk factors prior to surgery is a must for reducing incidence of SSI.

  2. Sodium Mercaptoethane Sulfonate Reduces Collagenolytic Degradation and Synergistically Enhances Antimicrobial Durability in an Antibiotic-Loaded Biopolymer Film for Prevention of Surgical-Site Infections

    Directory of Open Access Journals (Sweden)

    Joel Rosenblatt

    2017-01-01

    Full Text Available Implant-associated surgical-site infections can have significant clinical consequences. Previously we reported a method for prophylactically disinfecting implant surfaces in surgical pockets, where an antibiotic solution containing minocycline (M and rifampin (R was applied as a solid film in a crosslinked biopolymer matrix that partially liquefied in situ to provide extended prophylaxis. Here we studied the effect of adding sodium 2-mercaptoethane sulfonate (MeSNA on durability of prophylaxis in an in vitro model of implant-associated surgical-site infection. Adding MeSNA to the M/R biopolymer, antimicrobial film extended the duration for which biofilm formation by multidrug-resistant Pseudomonas aeruginosa (MDR-PA was prevented on silicone surfaces in the model. M/R films with and without MeSNA were effective in preventing colonization by methicillin-resistant Staphylococcus aureus. Independent experiments revealed that MeSNA directly inhibited proteolytic digestion of the biopolymer film and synergistically enhanced antimicrobial potency of M/R against MDR-PA. Incubation of the MeSNA containing films with L929 fibroblasts revealed no impairment of cellular metabolic activity or viability.

  3. HIV preventive behavior and associated factors among mining workers in Sali traditional gold mining site Bench Maji zone, Southwest Ethiopia: a cross sectional study.

    Science.gov (United States)

    Abdissa, Hordofa Gutema; Lemu, Yohannes Kebede; Nigussie, Dejene Tilahun

    2014-09-26

    Prevalence of HIV and other STI is high among migrant mining workers due to factors such as dangerous working conditions, only masculine identities existence, living away from families, desolate and in hospitable place. This makes them known to be HIV and STI vulnerable group in different part of the world. But, in Ethiopia they were not thought as at risk group yet. So the aim of this study is to assess magnitude of HIV preventive behaviours and associated factors among gold miners in Sali traditional gold mining site. A cross sectional study was conducted to assess HIV preventive behavior of the mining worker. The data were collected using interviewer administered structured questionnaire adapted from other related behavioural studies. The data was entered using EPI data version 3.1 and analyzed using SPSS version 17. Multiple logistic regression was used to assess relationship of HIV preventive behavior with constructs of health belief model. A total of 393 respondents with response rate of 93.12% were participated. All of the study participants were male 393(100%), the mean age of the participant was 24.0 (± 5.13SD). Less than half of the respondents 187(47.6%) were engaged in HIV preventive behavior. Less than half (45.3%) of them have high perceived susceptibility to HIV/AIDS; majority (62.8%) of them has high perceived severity to HIV/AIDS. HIV preventive behavior is negatively associated with being in middle, higher and highest income [OR = 0.54, 95% CI: 0.21, 0.74], [OR = 0.40, 95% CI: 0.30, 0.98] and [OR = 0.39, 95% CI: 0.20, 0.77] respectively and positively associated with Completing secondary, tertiary school and self efficacy [OR = 2.66, 95% CI: 1.11, 6.41], [OR = 5.40, 95% CI: 1.54, 19] and [OR = 1.88, 95% CI: 1.18, 2.94] respectively. The HIV preventive behavior of the mining worker was low. Being engaged in sexual intercourse with one sexual partner is very low, Consistent condom use among these mining workers was low. Income, educational status

  4. Treating a patient with lower limb injury from shark attack – a case report

    Directory of Open Access Journals (Sweden)

    Uroš Ahčan

    2014-02-01

    Full Text Available Background: Every year a number of people are attacked by sharks worldwide; however, death as a consequence is quite unusual. In recent years, the number of reported shark attacks worldwide has been around 67 per year with fatalities averaging 5 persons annually. Shark attacks in the Adriatic Sea are very rare.Case report: In 2008, a great white shark attack happened in the Adriatic Sea, in which a man suffered a severe injury to his lower extremity and profuse bleeding that led to haemorrhagic shock.Conclusion: The expeditious intervention at the site of attack and the exemplary cooperation of medical teams in two centres in the neighbouring countries of Croatia and Slovenia has saved the life of the unusually injured patient and resulted in a satisfactory functional outcome.

  5. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  6. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support....... However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  7. A Game Theoretical Approach to Hacktivism: Is Attack Likelihood a Product of Risks and Payoffs?

    Science.gov (United States)

    Bodford, Jessica E; Kwan, Virginia S Y

    2018-02-01

    The current study examines hacktivism (i.e., hacking to convey a moral, ethical, or social justice message) through a general game theoretic framework-that is, as a product of costs and benefits. Given the inherent risk of carrying out a hacktivist attack (e.g., legal action, imprisonment), it would be rational for the user to weigh these risks against perceived benefits of carrying out the attack. As such, we examined computer science students' estimations of risks, payoffs, and attack likelihood through a game theoretic design. Furthermore, this study aims at constructing a descriptive profile of potential hacktivists, exploring two predicted covariates of attack decision making, namely, peer prevalence of hacking and sex differences. Contrary to expectations, results suggest that participants' estimations of attack likelihood stemmed solely from expected payoffs, rather than subjective risks. Peer prevalence significantly predicted increased payoffs and attack likelihood, suggesting an underlying descriptive norm in social networks. Notably, we observed no sex differences in the decision to attack, nor in the factors predicting attack likelihood. Implications for policymakers and the understanding and prevention of hacktivism are discussed, as are the possible ramifications of widely communicated payoffs over potential risks in hacking communities.

  8. Mitigate DoS and DDoS attacks in Mobile Ad Hoc Networks

    DEFF Research Database (Denmark)

    Michalas, Antonis; Komninos, Nikos; Prasad, Neeli R.

    2011-01-01

    This paper proposes a technique to defeat Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks in Ad Hoc Networks. The technique is divided into two main parts and with game theory and cryptographic puzzles. Introduced first is a new client puzzle to prevent DoS attacks...... in DoS and DDoS attacks. Experimental results show the effectiveness of the approach for devices with limited resources and for environments like ad hoc networks where nodes must exchange information quickly....

  9. Survival of the relocated population of the U. S. after a nuclear attack. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Haaland, C.M.; Chester, C.V.; Wigner, E.P.

    1976-06-01

    The feasibility of continued survival after a hypothetical nuclear attack is evaluated for people relocated from high-risk areas during the crisis period before the attack. The attack consists of 6559 MT, of which 5951 MT are ground bursts on military, industrial, and urban targets. Relocated people are assumed to be adequately protected from fallout radiation by shelters of various kinds. The major problems in the postattack situation will be the control of exposure to fallout radiation, and prevention of severe food shortages to several tens of millions of people.

  10. Waterless Hand Rub Versus Traditional Hand Scrub Methods for Preventing the Surgical Site Infection in Orthopedic Surgery.

    Science.gov (United States)

    Iwakiri, Kentaro; Kobayashi, Akio; Seki, Masahiko; Ando, Yoshiyuki; Tsujio, Tadao; Hoshino, Masatoshi; Nakamura, Hiroaki

    2017-11-15

    MINI: Fourteen hundred consecutive patients were investigated for evaluating the utility of waterless hand rub before orthopaedic surgery. The risk in the surgical site infection incidence was the same, but costs of liquids used for hand hygiene were cheaper and the hand hygiene time was shorter for waterless protocol, compared with traditional hand scrub. A retrospective cohort study with prospectively collected data. The aim of this study was to compare SSI incidences, the cost of hand hygiene agents, and hand hygiene time between the traditional hand scrub and the waterless hand rub protocols before orthopedic surgery. Surgical site infections (SSI) prolong hospitalization and are a leading nosocomial cause of morbidity and a source of excess cost. Recently, a waterless hand rub protocol comprising alcohol based chlorhexidine gluconate for use before surgery was developed, but no studies have yet examined its utility in orthopedic surgery. Fourteen hundred consecutive patients who underwent orthopedic surgery (spine, joint replacement, hand, and trauma surgeries) in our hospital since April 1, 2012 were included. A total of 712 cases underwent following traditional hand scrub between April 1, 2012 and April 30, 2013 and 688 cases underwent following waterless hand rub between June 1, 2013 and April 30, 2014. We compared SSI incidences within all and each subcategory between two hand hygiene protocols. All patients were screened for SSI within 1 year after surgery. We compared the cost of hand hygiene agents and hand hygiene time between two groups. The SSI incidences were 1.3% (9 of 712) following the traditional protocol (2 deep and 7 superficial infections) and 1.1% (8 of 688) following the waterless protocol (all superficial infections). There were no significant differences between the two groups. The costs of liquids used for one hand hygiene were about $2 for traditional hand scrub and less than $1 for waterless hand rub. The mean hand hygiene time was 264

  11. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... to the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools......, and techniques for analysing and solving (parts of) the problem. In this paper we first develop a formal model of systems, that can describe real-world scenarios. These high-level models are then mapped to acKlaim, a process algebra with support for access control, that is used to study and analyse properties...

  12. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    Nai Fovino, Igor; Masera, Marcelo; De Cian, Alessio

    2009-01-01

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  13. Visualizing Risks: Icons for Information Attack Scenarios

    National Research Council Canada - National Science Library

    Hosmer, Hilary

    2000-01-01

    .... Visual attack scenarios help defenders see system ambiguities, imprecision, vulnerabilities and omissions, thus speeding up risk analysis, requirements gathering, safeguard selection, cryptographic...

  14. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example, after the launch of a DDOS (Distributed Denial of Service) attack, zombie computers may still connect to the target...-scrap- value-of-a-hacked-pc-revisited/ . Lancor, L., & Workman, R. (2007). Using Google Hacking to Enhance Defense Strategies. ACM SIGCSE Bulletin, 39 (1), 491-495. Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed Denial of Service...

  15. Integrating cyber attacks within fault trees

    Energy Technology Data Exchange (ETDEWEB)

    Nai Fovino, Igor [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy)], E-mail: igor.nai@jrc.it; Masera, Marcelo [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy); De Cian, Alessio [Department of Electrical Engineering, University di Genova, Genoa (Italy)

    2009-09-15

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  16. Review and expectations of terror attack emergency rescue

    Directory of Open Access Journals (Sweden)

    De-wen WANG

    2012-03-01

    Full Text Available Ten years of anti-terror struggle since the 9/11 event has indicated adequately that terrorism is a global problem and international danger. Likewise, anti-terror emergency rescue is also an important task which will influence the safety and benefit of every country all over the world. This paper reviews the main progress and result of international anti-terror struggle in the last ten years, and also introduces the new characteristic of the international anti-terror activity. Besides that, this paper also brings forward the further consideration about the anti-terror emergency medical rescue and the researches remaining to be carried out. The latter includes: (1 to further perfect the high-efficient medical rescue command organization; (2 to further perfect the emergency medical rescue prearranged scheme; (3 to further perfect the construction of rescue system and rescue base after various types of terror attack; (4 to further promote the anti-terror consciousness in the public, and pay more attention to the prevention and investigation of the psychological disaster; (5 to further carry out the basic investigation on emergency medical rescue after various terror attack injuries (for example the types and characteristics of new injuries, pathophysiology and prevention and treatment of stress-psychological effect induced by terror attack, new high-efficient medical rescue measure and equipments, and so on.

  17. Environmental and safety education in Brazil: preventive measures to avoid contamination with U and Th in small mining sites

    International Nuclear Information System (INIS)

    Fonseca, Valeria da; Pastura, Silvia; Wieland, Patricia; Campos, Thomas F. da C.

    2008-01-01

    This paper presents the Environmental and Safety Educational Campaign on the care in the small mining 'garimpo' with radioactive ore of uranium and thorium. These radionuclides are the major source of radioactive material present in certain mineral from rocks for example, tantalite / columbite, granites with cassiterite coal, phosphates, zirconate and rare-earth elements. The occurrence of radioactive ores in some sites has risen especial attention from CNEN such as in Borborema Mountain, where Uranium and Thorium are found scattered in pegmatite bodies from Serido region between Rio Grande do Norte and Paraiba states, and in Amapa state, in the Amazonian forest region, where thorianite was being illegally mined. Besides work accident risks inherent to this activity, there are radiological risks, showing the need to adapt measures and actions aiming at the health and safety of the small miners and population in general. The campaign involves cooperatives, trade unions, schools, non-governmental organization, entities involved in national security and others take part. The objective is to foment actions of radiological safety, in order to guarantee the protection and safety of the workers, their families and population. (author)

  18. The 'over-researched community': An ethics analysis of stakeholder views at two South African HIV prevention research sites.

    Science.gov (United States)

    Koen, Jennifer; Wassenaar, Douglas; Mamotte, Nicole

    2017-12-01

    Health research in resource-limited, multi-cultural contexts raises complex ethical concerns. The term 'over-researched community' (ORC) has been raised as an ethical concern and potential barrier to community participation in research. However, the term lacks conceptual clarity and is absent from established ethics guidelines and academic literature. In light of the concern being raised in relation to research in low- and middle-income countries (LMICs), a critical and empirical exploration of the meaning of ORC was undertaken. Guided by Emanuel et al.'s (2004) eight principles for ethically sound research in LMICs, this study examines the relevance and meaning of the terms 'over-research' and 'over-researched community' through an analysis of key stakeholder perspectives at two South African research sites. Data were collected between August 2007 and October 2008. 'Over-research' was found to represent a conglomeration of ethical concerns often used as a proxy for standard research ethics concepts. 'Over-research' seemed fundamentally linked to disparate positions and perspectives between different stakeholders in the research interaction, arising from challenges in inter-stakeholder relationships. 'Over-research' might be interpreted to mean exploitation. However, exploitation itself could mean different things. Using the term may lead to obscured understanding of real or perceived ethical concerns, making it difficult to identify and address the underlying concerns. It is recommended that the term be carefully and critically interrogated for clarity when used in research ethics discourse. Because it represents other legitimate concerns, it should not be dismissed without careful exploration. Copyright © 2017 Elsevier Ltd. All rights reserved.

  19. Public health preparedness and response to a radiological terrorist attack

    International Nuclear Information System (INIS)

    Yamaguchi, Ichiro

    2016-01-01

    Given the potential for intentional malevolent acts, the security of radioactive sources should be ensured. In the event of a terrorist attack using a radioactive source, we should care not only about health concerns of victims, especially including first responders who suffer from radiation injury, but also public health activities with affected people during the long recovery phase. Regarding the radiological public health viewpoint, preventive efforts are also important. In fact, regulatory reform is progressing in Japan according to the code of conduct issued by IAEA. One of the difficulties of countermeasures for the security of radioactive sources in Japan is to establish a disposal facility for disused sealed radioactive sources, since radioactive waste has been additionally a point of contention in society since the nuclear disaster. This paper presents an overview of countermeasures for terrorist attacks using a radioactive source, from the viewpoint of public health in Japan including the results of survey targeted hospitals equipped with blood irradiation machines. (author)

  20. Current therapy for chronic cerebrovascular attack

    Directory of Open Access Journals (Sweden)

    A. A. Shmonin

    2015-01-01

    Full Text Available Chronic cerebrovascular attack (CCVA is a brain lesion caused by vascular factors. CCVA appears as cognitive impairments (CIs, affective (emotional disorders and focal syndromes. Treatment for CCVA requires a comprehensive approach. Effective combination therapy for CCVA involves secondary prevention of stroke and CIs; treatment of CIs; treatment of depression and other affective disorders; and neuroprotective therapy. Basic therapy for CCVA includes modification of risk factors, antihypertensive, hypolipidemic, and antithrombotic therapies. Central acetylcholinesterase inhibitors (galantamine, rivastigmine, donepezil and a reversible NMDA receptor blocker (memantine are symptomatically used at a stage of vascular and mixed dementia. There are no unique guidelines for the therapy of mild and moderate vascular nondementia-related CIs. Drug use, based on the neurochemical mechanisms underlying the development of vascular CIs, is substantiated. When choosing psychotropic agents, it is necessary to take into account the causes and clinical manifestations of neuromediator deficiency. Antidepressants are used as essential drugs. Neuroleptics and tranquilizers are additionally administered in complex-pattern syndromes, such as depression with marked anxiety. Prescription of neuroprotectors may be effective in treating both stroke and CCVA. These medicaments are most effective when a damaging factor acts, i.e. neuroprotectors should be given in a risk situation and to reduce damage. Citicoline is one of the most test drugs in a group of neuroprotectors. 

  1. Intergranular attack evaluation from hideout return

    International Nuclear Information System (INIS)

    Nordmann, F.; Dupin, M.; Menet, O.; Fiquet, J.-M.

    1989-01-01

    Intergranular Attack (IGA) is the secondary side corrosion mechanism on PWR steam generator tubing, which can occur most frequently even with a good waterchemistry. It has moderately developed in a few French units. Consequently, several remedies have been implemented, such as sodium content decrease in makeup water and application of more stringent chemistry specifications. In order to evaluate the local chemistry in restricted areas where IGA may occur, a large hideout return programme has been carried out on many units. It shows that free alkalinity returning during shutdown is usually ranging from 0.5 to 5 g of sodium per steam generator, and that the required time to let it return is about 40 hours. However, high temperature pH calculations indicate that such an amount of alkalinity can correspond to a potentially corrosive solution in restricted areas, where a concentration factor of 10 5 to 10 7 can be reached, inducing a pH of 10 at 300 o C. Studies are still in progress in order to define when a shutdown should be required to allow hideout return and help to prevent IGA. (author)

  2. Polar bear attacks on humans: Implications of a changing climate

    Science.gov (United States)

    Wilder, James; Vongraven, Dag; Atwood, Todd C.; Hansen, Bob; Jessen, Amalie; Kochnev, Anatoly A.; York, Geoff; Vallender, Rachel; Hedman, Daryll; Gibbons, Melissa

    2017-01-01

    Understanding causes of polar bear (Ursus maritimus) attacks on humans is critical to ensuring both human safety and polar bear conservation. Although considerable attention has been focused on understanding black (U. americanus) and grizzly (U. arctos) bear conflicts with humans, there have been few attempts to systematically collect, analyze, and interpret available information on human-polar bear conflicts across their range. To help fill this knowledge gap, a database was developed (Polar Bear-Human Information Management System [PBHIMS]) to facilitate the range-wide collection and analysis of human-polar bear conflict data. We populated the PBHIMS with data collected throughout the polar bear range, analyzed polar bear attacks on people, and found that reported attacks have been extremely rare. From 1870–2014, we documented 73 attacks by wild polar bears, distributed among the 5 polar bear Range States (Canada, Greenland, Norway, Russia, and United States), which resulted in 20 human fatalities and 63 human injuries. We found that nutritionally stressed adult male polar bears were the most likely to pose threats to human safety. Attacks by adult females were rare, and most were attributed to defense of cubs. We judged that bears acted as a predator in most attacks, and that nearly all attacks involved ≤2 people. Increased concern for both human and bear safety is warranted in light of predictions of increased numbers of nutritionally stressed bears spending longer amounts of time on land near people because of the loss of their sea ice habitat. Improved conflict investigation is needed to collect accurate and relevant data and communicate accurate bear safety messages and mitigation strategies to the public. With better information, people can take proactive measures in polar bear habitat to ensure their safety and prevent conflicts with polar bears. This work represents an important first step towards improving our understanding of factors influencing

  3. Secure Data Aggregation in Wireless Sensor Network-Fujisaki Okamoto(FO) Authentication Scheme against Sybil Attack.

    Science.gov (United States)

    Nirmal Raja, K; Maraline Beno, M

    2017-07-01

    In the wireless sensor network(WSN) security is a major issue. There are several network security schemes proposed in research. In the network, malicious nodes obstruct the performance of the network. The network can be vulnerable by Sybil attack. When a node illicitly assertions multiple identities or claims fake IDs, the WSN grieves from an attack named Sybil attack. This attack threatens wireless sensor network in data aggregation, synchronizing system, routing, fair resource allocation and misbehavior detection. Henceforth, the research is carried out to prevent the Sybil attack and increase the performance of the network. This paper presents the novel security mechanism and Fujisaki Okamoto algorithm and also application of the work. The Fujisaki-Okamoto (FO) algorithm is ID based cryptographic scheme and gives strong authentication against Sybil attack. By using Network simulator2 (NS2) the scheme is simulated. In this proposed scheme broadcasting key, time taken for different key sizes, energy consumption, Packet delivery ratio, Throughput were analyzed.

  4. Preventing Active Timing Attacks in Low-Latency Anonymous Communication

    Science.gov (United States)

    2010-04-26

    measured routers with the modifiers “Exit”, “Fast”, “Running”, “Stable”, and “Valid”. The routers also had to be non- hibernating and could not have exit...Tor client was a custom client written in Java . Packet traces were recorded using tcpdump. The timestamps on these were used to determine the timing of

  5. Development of nitric oxide sensor for asthma attack prevention

    International Nuclear Information System (INIS)

    Vilar, M. Rei; El-Beghdadi, J.; Debontridder, F.; Naaman, R.; Arbel, A.; Ferraria, A.M.; Do Rego, A.M. Botelho

    2006-01-01

    The aim of this work is the development of a NO sensor for asthma control and medication monitoring. The transducer is a Molecular Controlled Semiconductor Resistor (MOCSER), which is a GaAs based heterostructure. Protoporphyrins IX, containing carboxylic groups to chemisorb on GaAs, were used as sensing molecules. Characterization of the protoporphyrin monolayers was held using Attenuated Total Reflection in Multiple Internal Reflection (ATR/MIR), High Resolution Electron Energy Loss Spectroscopy (HREELS) in the vibrational and electronic domain and X-ray Photoelectron Spectroscopy (XPS). Degreasing and etching of the GaAs substrates were accomplished before adsorption. Interfacial bonding investigated by ATR/MIR shows that protoporphyrin adsorbs to the GaAs (100) through a unidentate complex and remains mostly vertically oriented. The electronic domain of the HREELS spectra exhibits the Q band with α and β components on the same position as in the UV/Vis spectrum. Soret band is blue shifted showing a face to face stacking of the protoporphyrin molecules on the GaAs substrates. XPS spectra reveal the presence of Cobalt in monolayers prepared with 8 x 10 -5 M CoPP solutions. Kinetics is best fitted by an Elovich equation, showing some hindrance due to the previous adsorbed molecules. Thickness found from XPS data ranges from 1.3 to 1.5 nm, which fits with the molecular dimensions. Using the GaAs preparation methods developed here, an NO sensor prototype was assembled and tested for NO sensitivity and repeatability. Relative to NO, tests reveal a good sensitivity between 1.6 and 200 ppb. NO sensitivity was also measured towards CO, CO 2 and O 2 . Pure nitrogen sweeps NO from the porphyrin layer, opening the possibility of the sensor reutilization

  6. Development of nitric oxide sensor for asthma attack prevention

    Energy Technology Data Exchange (ETDEWEB)

    Vilar, M. Rei [ITODYS, CNRS-Universite Denis Diderot, Paris (France)]. E-mail: reivilar@paris7.jussieu.fr; El-Beghdadi, J. [ITODYS, CNRS-Universite Denis Diderot, Paris (France); Debontridder, F. [ITODYS, CNRS-Universite Denis Diderot, Paris (France); Naaman, R. [Department of Chemical Physics, Weizmann Institute, Rehovot (Israel); Arbel, A. [Chiaro Networks, Jerusalem (Israel); Ferraria, A.M. [CQFM, Instituto Superior Tecnico, Lisboa (Portugal); Do Rego, A.M. Botelho [CQFM, Instituto Superior Tecnico, Lisbon (Portugal)

    2006-03-15

    The aim of this work is the development of a NO sensor for asthma control and medication monitoring. The transducer is a Molecular Controlled Semiconductor Resistor (MOCSER), which is a GaAs based heterostructure. Protoporphyrins IX, containing carboxylic groups to chemisorb on GaAs, were used as sensing molecules. Characterization of the protoporphyrin monolayers was held using Attenuated Total Reflection in Multiple Internal Reflection (ATR/MIR), High Resolution Electron Energy Loss Spectroscopy (HREELS) in the vibrational and electronic domain and X-ray Photoelectron Spectroscopy (XPS). Degreasing and etching of the GaAs substrates were accomplished before adsorption. Interfacial bonding investigated by ATR/MIR shows that protoporphyrin adsorbs to the GaAs (100) through a unidentate complex and remains mostly vertically oriented. The electronic domain of the HREELS spectra exhibits the Q band with {alpha} and {beta} components on the same position as in the UV/Vis spectrum. Soret band is blue shifted showing a face to face stacking of the protoporphyrin molecules on the GaAs substrates. XPS spectra reveal the presence of Cobalt in monolayers prepared with 8 x 10{sup -5} M CoPP solutions. Kinetics is best fitted by an Elovich equation, showing some hindrance due to the previous adsorbed molecules. Thickness found from XPS data ranges from 1.3 to 1.5 nm, which fits with the molecular dimensions. Using the GaAs preparation methods developed here, an NO sensor prototype was assembled and tested for NO sensitivity and repeatability. Relative to NO, tests reveal a good sensitivity between 1.6 and 200 ppb. NO sensitivity was also measured towards CO, CO{sub 2} and O{sub 2}. Pure nitrogen sweeps NO from the porphyrin layer, opening the possibility of the sensor reutilization.

  7. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  8. The work-averse cyber attacker model : theory and evidence from two million attack signatures

    NARCIS (Netherlands)

    Allodi, L.; Massacci, F.; Williams, J.

    The typical cyber attacker is assumed to be all powerful and to exploit all possible vulnerabilities. In this paper we present, and empirically validate, a novel and more realistic attacker model. The intuition of our model is that an attacker will optimally choose whether to act and weaponize a new

  9. Attack Tree Generation by Policy Invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identi﬿cation. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identi﬿ed

  10. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  11. Drammer : Deterministic Rowhammer attacks on mobile platforms

    NARCIS (Netherlands)

    Van Der Veen, Victor; Fratantonio, Yanick; Lindorfer, Martina; Gruss, Daniel; Maurice, Clémentine; Vigna, Giovanni; Bos, Herbert; Razavi, Kaveh; Giuffrida, Cristiano

    2016-01-01

    Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and completely subvert a system. However, existing efforts either describe probabilistic (and thus unreliable) attacks or rely on special (and often unavailable) memory management features to place victim objects

  12. Collaborative Attack Mitigation and Response: A survey

    NARCIS (Netherlands)

    Steinberger, Jessica; Sperotto, Anna; Baier, Harald; Pras, Aiko

    2015-01-01

    Over recent years, network-based attacks have become to one of the top causes of network infrastructure and service outages. To counteract a network-based attack, an approach is to move mitigation from the target network to the networks of Internet Service Providers (ISP). However, it remains

  13. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...

  14. A plasma membrane localization signal in the HIV-1 envelope cytoplasmic domain prevents localization at sites of vesicular stomatitis virus budding and incorporation into VSV virions.

    Science.gov (United States)

    Johnson, J E; Rodgers, W; Rose, J K

    1998-11-25

    Previous studies showed that the HIV-1 envelope (Env) protein was not incorporated into vesicular stomatitis virus (VSV) virions unless its cytoplasmic tail was replaced with that of the VSV glycoprotein (G). To determine whether the G tail provided a positive incorporation signal for Env, or if sequences in the Env tail prevented incorporation, we generated mutants of Env with its 150-amino-acid tail shortened to 29, 10, or 3 amino acids (Envtr mutants). Cells infected with VSV recombinants expressing these proteins or an Env-G tail hybrid showed similar amounts of Env protein at the surface. The Env-G tail hybrid or the Envtr3 mutant were incorporated at the highest levels into budding VSV virions. In contrast, the Envtr29 or Envtr10 mutants were incorporated poorly. These results defined a signal preventing incorporation within the 10 membrane-proximal amino acids of the Env tail. Confocal microscopy revealed that this signal functioned by causing localization of human immunodeficiency virus type 1 Env to plasma membrane domains distinct from the VSV budding sites, where VSV proteins were concentrated. Copyright 1998 Academic Press.

  15. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  16. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  17. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  18. Effect-site concentration of remifentanil for preventing cough during emergence in elderly patients undergoing nasal surgery: a comparison with adult patients

    Directory of Open Access Journals (Sweden)

    Yoo JY

    2016-09-01

    Full Text Available Ji Young Yoo,1 Jong Yeop Kim,1 Hyun Jeong Kwak,2 Dong Chul Lee,2 Go Wun Kim,1 Sook Young Lee,1 Yun Jeong Chae1 1Department of Anaesthesiology and Pain Medicine, Ajou University School of Medicine, Suwon, 2Department of Anaesthesiology and Pain Medicine, Gachon University, Gil Medical Center, Incheon, Korea Purpose: Prevention of cough during emergence after nasal surgery is important for avoiding surgical site bleeding. We investigated the remifentanil effect-site concentration in 50% (EC50 of the elderly patients undergoing nasal surgery for smooth emergence without cough and compared it with that of adult patients.Methods: Twenty-two elderly (aged 65–80 years and 25 adult patients (aged 20–60 years with an American Society of Anesthesiologists physical status I/II undergoing nasal surgery were enrolled. Anesthesia was maintained with sevoflurane and remifentanil. Remifentanil EC50 and EC95 for preventing cough were determined using the modified Dixon’s up-and-down method and isotonic regression with bootstrapping approach. Recovery profiles were also recorded.Results: With Dixon’s up-and-down method, the EC50 of remifentanil in elderly patients (2.40±0.25 ng/mL was not significantly different from that of adults (2.33±0.30 ng/mL (P=0.687. With isotonic regression, the EC95 of remifentanil in elderly patients (3.32 [95% confidence interval: 3.06–3.38] ng/mL was not significantly different from that of adults (3.30 [95% confidence interval: 2.96–3.37] ng/mL. However, eye opening time (14.1±3.8 vs 12.0±2.9 seconds, extubation time (17.2±4.1 vs 14.0±3.0 seconds, and postanesthesia care unit duration (44.5±7.6 vs 38.7±3.4 minutes in elderly patients were significantly longer than those in adults (P<0.05.Conclusion: Remifentanil EC50 for preventing cough after nasal surgery with sevoflurane anesthesia did not differ between elderly and adult patients. However, delayed awakening and respiratory adverse events may warrant attention

  19. GA-DoSLD: Genetic Algorithm Based Denial-of-Sleep Attack Detection in WSN

    Directory of Open Access Journals (Sweden)

    Mahalakshmi Gunasekaran

    2017-01-01

    Full Text Available Denial-of-sleep (DoSL attack is a special category of denial-of-service attack that prevents the battery powered sensor nodes from going into the sleep mode, thus affecting the network performance. The existing schemes used for the DoSL attack detection do not provide an optimal energy conservation and key pairing operation. Hence, in this paper, an efficient Genetic Algorithm (GA based denial-of-sleep attack detection (GA-DoSLD algorithm is suggested for analyzing the misbehaviors of the nodes. The suggested algorithm implements a Modified-RSA (MRSA algorithm in the base station (BS for generating and distributing the key pair among the sensor nodes. Before sending/receiving the packets, the sensor nodes determine the optimal route using Ad Hoc On-Demand Distance Vector Routing (AODV protocol and then ensure the trustworthiness of the relay node using the fitness calculation. The crossover and mutation operations detect and analyze the methods that the attackers use for implementing the attack. On determining an attacker node, the BS broadcasts the blocked information to all the other sensor nodes in the network. Simulation results prove that the suggested algorithm is optimal compared to the existing algorithms such as X-MAC, ZKP, and TE2P schemes.

  20. Detecting and Mitigating Smart Insider Jamming Attacks in MANETs Using Reputation-Based Coalition Game

    Directory of Open Access Journals (Sweden)

    Ashraf Al Sharah

    2016-01-01

    Full Text Available Security in mobile ad hoc networks (MANETs is challenging due to the ability of adversaries to gather necessary intelligence to launch insider jamming attacks. The solutions to prevent external attacks on MANET are not applicable for defense against insider jamming attacks. There is a need for a formal framework to characterize the information required by adversaries to launch insider jamming attacks. In this paper, we propose a novel reputation-based coalition game in MANETs to detect and mitigate insider jamming attacks. Since there is no centralized controller in MANETs, the nodes rely heavily on availability of transmission rates and a reputation for each individual node in the coalition to detect the presence of internal jamming node. The nodes will form a stable grand coalition in order to make a strategic security defense decision, maintain the grand coalition based on node reputation, and exclude any malicious node based on reputation value. Simulation results show that our approach provides a framework to quantify information needed by adversaries to launch insider attacks. The proposed approach will improve MANET’s defense against insider attacks, while also reducing incorrect classification of legitimate nodes as jammers.

  1. Post-attack aposematic display in prey facilitates predator avoidance learning

    Directory of Open Access Journals (Sweden)

    Changku eKang

    2016-04-01

    Full Text Available Warning signals protect unpalatable prey from predation because predators who learn the association between the warning signal and prey unprofitability decrease attacks on the prey. Most of the research have focused on visual aposematic signals that are constantly presented and visible to the predators. But a variety of chemically defended insects are rather cryptic when resting, and only in response to predator attacks (post-attack they perform displays of conspicuous abdomens or hindwings normally hidden under forewings. The function of those displays in unpalatable insects is not well understood. We examined two adaptive hypotheses on this facultative aposematic display using wild-caught oriental tits (Parus minor as predators. First, we tested whether the display increases the rejection of the prey by predators upon seeing the display (i.e. at the moment of attack through learning trials (aposematic signaling hypothesis. Second, we tested whether the display facilitates the memory formation between cryptic visible form of the prey and prey defense so that it prevents the predators initiate an attack upon seeing the cryptic form (facilitation hypothesis. We found that predators learned to avoid attacking the prey which supports the facilitation hypothesis. However, the support for the aposematic signaling hypothesis was equivocal. Our results open new directions of research by highlighting the possibility that similar facilitation effects may contribute to the evolution of various forms of post-attack visual displays in chemically, or otherwise, defended animals.

  2. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  3. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Sakuta, Hidenari

    2007-01-01

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  4. Time-Efficient Cloning Attacks Identification in Large-Scale RFID Systems

    Directory of Open Access Journals (Sweden)

    Ju-min Zhao

    2017-01-01

    Full Text Available Radio Frequency Identification (RFID is an emerging technology for electronic labeling of objects for the purpose of automatically identifying, categorizing, locating, and tracking the objects. But in their current form RFID systems are susceptible to cloning attacks that seriously threaten RFID applications but are hard to prevent. Existing protocols aimed at detecting whether there are cloning attacks in single-reader RFID systems. In this paper, we investigate the cloning attacks identification in the multireader scenario and first propose a time-efficient protocol, called the time-efficient Cloning Attacks Identification Protocol (CAIP to identify all cloned tags in multireaders RFID systems. We evaluate the performance of CAIP through extensive simulations. The results show that CAIP can identify all the cloned tags in large-scale RFID systems fairly fast with required accuracy.

  5. Current and potential cyber attacks on medical journals; guidelines for improving security.

    Science.gov (United States)

    Dadkhah, Mehdi; Seno, Seyed Amin Hosseini; Borchardt, Glenn

    2017-03-01

    At the moment, scholarly publishing is faced with much academic misconduct and threats such as predatory journals, hijacked journals, phishing, and other scams. In response, we have been discussing this misconduct and trying to increase the awareness of researchers, but it seems that there is a lack of research that presents guidelines for editors to help them protect themselves against these threats. It seems that information security is missing in some parts of scholarly publishing that particularly involves medical journals. In this paper, we explain different types of cyber-attacks that especially threaten editors and academic journals. We then explain the details involved in each type of attack. Finally, we present general guidelines for detection and prevention of the attacks. In some cases, we use small experiments to show that our claim is true. Finally, we conclude the paper with a prioritization of these attacks. Copyright © 2016 European Federation of Internal Medicine. Published by Elsevier B.V. All rights reserved.

  6. Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses

    Directory of Open Access Journals (Sweden)

    Stephen Herzog

    2011-01-01

    Full Text Available In April 2007, the Estonian Government moved a memorial commemorating the Soviet liberation of the country from the Nazis to a less prominent and visible location in Tallinn. This decision triggered rioting among Russian-speaking minorities and cyber terrorism targeting Estonia's critical economic and political infrastructure. Drawing upon the Estonian cyber attacks, this article argues that globalization and the Internet have enabled transnational groups—such as the Russian diaspora—to avenge their grievances by threatening the sovereignty of nation-states in cyberspace. Sophisticated and virtually untraceable political "hacktivists" may now possess the ability to disrupt or destroy government operations, banking transactions, city power grids, and even military weapon systems. Fortunately, western countries banded together to effectively combat the Estonian cyber attacks and minimize their effects. However, this article concludes that in the age of globalization, interdependence, and digital interconnectedness, nation-states must engage in increased cooperative cyber-defense activities to counter and prevent devastating Internet attacks and their implications.

  7. Detection of attack-targeted scans from the Apache HTTP Server access logs

    Directory of Open Access Journals (Sweden)

    Merve Baş Seyyar

    2018-01-01

    Full Text Available A web application could be visited for different purposes. It is possible for a web site to be visited by a regular user as a normal (natural visit, to be viewed by crawlers, bots, spiders, etc. for indexing purposes, lastly to be exploratory scanned by malicious users prior to an attack. An attack targeted web scan can be viewed as a phase of a potential attack and can lead to more attack detection as compared to traditional detection methods. In this work, we propose a method to detect attack-oriented scans and to distinguish them from other types of visits. In this context, we use access log files of Apache (or ISS web servers and try to determine attack situations through examination of the past data. In addition to web scan detections, we insert a rule set to detect SQL Injection and XSS attacks. Our approach has been applied on sample data sets and results have been analyzed in terms of performance measures to compare our method and other commonly used detection techniques. Furthermore, various tests have been made on log samples from real systems. Lastly, several suggestions about further development have been also discussed.

  8. Attacker Modelling in Ubiquitous Computing Systems

    DEFF Research Database (Denmark)

    Papini, Davide

    in with our everyday life. This future is visible to everyone nowadays: terms like smartphone, cloud, sensor, network etc. are widely known and used in our everyday life. But what about the security of such systems. Ubiquitous computing devices can be limited in terms of energy, computing power and memory...... attacker remain somehow undened and still under extensive investigation. This Thesis explores the nature of the ubiquitous attacker with a focus on how she interacts with the physical world and it denes a model that captures the abilities of the attacker. Furthermore a quantitative implementation...

  9. Chemical Accident Prevention: Site Security

    Science.gov (United States)

    This chemical safety alert assists facilities that routinely handle extremely hazardous substances, along with SERCs, LEPCs, and emergency responders, in their efforts to reduce criminally caused releases and vulnerability to terrorist activity.

  10. Glycopeptides versus β-lactams for the prevention of surgical site infections in cardiovascular and orthopedic surgery: a meta-analysis.

    Science.gov (United States)

    Saleh, Anas; Khanna, Ashish; Chagin, Kevin M; Klika, Alison K; Johnston, Douglas; Barsoum, Wael K

    2015-01-01

    To compare the efficacy of glycopeptides and β-lactams in preventing surgical site infections (SSIs) in cardiac, vascular, and orthopedic surgery. The cost-effectiveness of switching from β-lactams to glycopeptides for preoperative antibiotic prophylaxis has been controversial. β-Lactams are generally recommended in clean surgical procedures, but they are ineffective against resistant gram-positive bacteria. PubMed, International Pharmaceuticals Abstracts, Scopus, and Cochrane were searched for randomized clinical trials comparing glycopeptides and β-lactams for prophylaxis in adults undergoing cardiac, vascular, or orthopedic surgery. Abstracts and conference proceedings were included. Two independent reviewers performed study selection, data extraction, and assessment of risk of bias. Fourteen studies with a total of 8952 patients were analyzed. No difference was detected in overall SSIs between antibiotic types. However, compared with β-lactams, glycopeptides reduced the risk of resistant staphylococcal SSIs by 48% (relative risk, 0.52; 95% confidence interval, 0.29-0.93; P = 0.03) and enterococcal SSIs by 64% (relative risk, 0.36; 95% confidence interval, 0.16-0.80; P = 0.01), but increased respiratory tract infections by 54% (relative risk, 1.54; 95% confidence interval, 1.19-2.01; P ≤ 0.01). Subgroup analysis of cardiac procedures showed superiority of β-lactams in preventing superficial and deep chest SSIs, susceptible staphylococcal SSIs, and respiratory tract infections. Glycopeptides reduce the risk of resistant staphylococcal SSIs and enterococcal SSIs, but increase the risk of respiratory tract infections. Additional high-quality randomized clinical trials are needed as these results are limited by high risk of bias.

  11. Systematic Review and Meta-Analysis of Randomized Controlled Trials Evaluating Prophylactic Intra-Operative Wound Irrigation for the Prevention of Surgical Site Infections.

    Science.gov (United States)

    de Jonge, Stijn W; Boldingh, Quirine J J; Solomkin, Joseph S; Allegranzi, Benedetta; Egger, Matthias; Dellinger, E Patchen; Boermeester, Marja A

    Surgical site infections (SSIs) are one of the most common hospital-acquired infections. To reduce SSIs, prophylactic intra-operative wound irrigation (pIOWI) has been advocated, although the results to date are equivocal. To develop recommendations for the new World Health Organization (WHO) SSI prevention guidelines, a systematic literature review and a meta-analysis were conducted on the effectiveness of pIOWI using different agents as a means of reducing SSI. The PUBMED, Embase, CENTRAL, CINAHL, and WHO databases were searched. Randomized controlled trials (RCTs) comparing either pIOWI with no pIOWI or with pIOWI using different solutions and techniques were retrieved with SSI as the primary outcome. Meta-analyses were performed, and odds ratios (OR) and the mean difference with 95% confidence intervals (CI) were extracted and pooled with a random effects model. Twenty-one studies were suitable for analysis, and a distinction was made between intra-peritoneal, mediastinal, and incisional wound irrigation. A low quality of evidence demonstrated a statistically significant benefit for incisional wound irrigation with an aqueous povidone-iodine (PVP-I) solution in clean and clean contaminated wounds (OR 0.31; 95% CI 0.13-0.73; p = 0.007); 50 fewer SSIs per 1,000 procedures (from 19 fewer to 64 fewer)). Antibiotic irrigation had no significant effect in reducing SSIs (OR 1.16; 95% CI 0.64-2.12; p = 0.63). Low-quality evidence suggests considering the use of prophylactic incisional wound irrigation to prevent SSI with an aqueous povidone-iodine solution. Antibiotic irrigation does not show a benefit and therefore is discouraged.

  12. [Vocal cord functions in patients with asthma attack].

    Science.gov (United States)

    Oktay, Burcu; Selçuk, Omer Tarik; Ardiç, Sadik; Saylam, Güleser; Yüceege, Melike; Bilgin, Esra; Korkmaz, Hakan

    2009-01-01

    This study was planned to evaluate vocal cord functions and to establish underlying vocal cord dysfunctions (VCD) in patients with asthma attack. All patients admitted to emergency service of our hospital with asthma attack between February 01, 2007 and June 01, 2007 were included in the evaluation. After the evaluation, all patients regarded to have asthma attacks based on GINA 2006 guide were enrolled in the study. After first intervention, patients underwent endoscopic larynx examination for the evaluation of vocal cord functions. Twenty four (65.7%) male and 11 female (31.4%), overall 35 patients diagnosed with asthma and who did not have the history of another disease were included in the study. At endoscopic larynx examination carried out after first medical examination, at the moment of asthma attack, tongue, tongue base, epiglottis and arytenoid were observed to be within normal limits. In 9 (25.7%) patients, upper respiratory tract was hyperemic and in 2 (5.7%) odematous. One patient had nasal polyposis (p> 0.05). In the evaluation of vocal cord functions, restriction in adduction was observed in merely one patient. All other functions were normal. Rima opening width was established to be mean 8.34 + or - 0.725. VCD was deteced in none of the patients included in the study. Although we did not detect VCD in any patient, VCD should be borne in mind in cases which presents with the clinical picture of asthma and responds weakly to the treatment or in cases of unexplained shortness of breath. This may prevent many unnecessary procedures such as medication, entubation, tracheostomy and iatrogenic mortality. Further longutudial studies are required in order to shed light on the assocation of asthma with VCD.

  13. Predictors of Bisexual Behaviour among MSM Attending Intervention Sites May Help in Prevention Interventions for This Bridge to the Heterosexual Epidemic in India: Data from HIV Sentinel Surveillance

    Science.gov (United States)

    Godbole, Sheela; Sane, Suvarna; Kamble, Pranil; Raj, Yujwal; Dulhani, Nisha; Venkatesh, Srinivasan; Reddy, D. C. S.; Chavan, Laxmikant; Bhattacharya, Madhulekha; Bindoria, Suchitra; Kadam, Dilip; Thakur, Savita; Narwani, Prakash; Pereira, Elmira; Paranjape, Ramesh; Risbud, Arun

    2014-01-01

    Background Indian cultural tradition demanding marriage, many MSM howsoever they self-identify are likely to be married or have sex with women. To consolidate India's HIV prevention gains, it is important to understand and address the interaction between the MSM and heterosexual epidemics in India and create specific interventions for bisexual MSM. The challenge is to identify and intervene this hard to reach population. Data from HIV Sentinel Surveillance 2011 among MSM in four Indian states were analyzed to assess predictors and prevalence of bisexual behaviour in MSM. Methods Between March-May 2011, 4682 men (15–49 years) who had anal/oral sex with a male partner in the past month, attending intervention sites and consenting for an un-linked anonymous survey answered an 11- item questionnaire and provided blood for HIV test by finger stick at 19 designated surveillance sites. Results Of 4682 MSM tested overall, 5% were illiterate, 51% reported only receptive anal intercourse, 21% only penetrative and 28% both. 36% MSM had ever received money for sex. Overall 6.8% were HIV infected. 44% MSM were bisexual in the last six months. On multivariate analysis, ‘being bisexual’ was found to be independently associated with ‘older age’: 26–30 years [AOR = 3.1, 95% CI(2.7, 3.7)], >30 years [AOR = 6.5, 95% CI(5.5, 7.7)]; ‘reporting penetrative behaviour alone’ with other men [AOR = 5.8, 95% CI(4.8, 7.0), pbehaviour’ [AOR = 2.7, 95% CI(2.3, 3.1) pbehaviour with other men, could help in reaching this population. PMID:25211511

  14. YET ANOTHER ATTACK ON WAGES AND CONDITIONS.

    Science.gov (United States)

    McCarthy, Andrew

    2016-10-01

    An unobjectionable-sounding title obscures the real intent of the latest in a series of Bills which the federal Coalition government is attempting to legislate in its ongoing attempts to undermine employee wages and conditions and attack unions.

  15. A Unique Fatal Moose Attack Mimicking Homicide.

    Science.gov (United States)

    Gudmannsson, Petur; Berge, Johan; Druid, Henrik; Ericsson, Göran; Eriksson, Anders

    2018-03-01

    Fatalities caused by animal attacks are rare, but have the potential to mimic homicide. We present a case in which a moose attacked and killed a woman who was walking her dog in a forest. Autopsy showed widespread blunt trauma with a large laceration on one leg in which blades of grass were embedded. Flail chest was the cause of death. The case was initially conceived as homicide by means of a riding lawn mower. A review of the case by moose experts and analyses of biological trace material that proved to originate from moose, established the true source of injury. The dog probably provoked a moose, which, in response, stomped and gored the victim to death. The injuries resembled those previously reported from attacks by cattle and water buffalo. Fatal moose attacks constitute an extremely rare threat in boreal areas, but can be considered in traumatic deaths of unknown cause. © 2017 American Academy of Forensic Sciences.

  16. Marine Attack on Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Ad

    2002-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  17. Heuristic attacks against graphical password generators

    CSIR Research Space (South Africa)

    Peach, S

    2010-05-01

    Full Text Available In this paper the authors explore heuristic attacks against graphical password generators. A new trend is emerging to use user clickable pictures to generate passwords. This technique of authentication can be successfully used for - for example...

  18. On localization attacks against cloud infrastructure

    Science.gov (United States)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  19. Social engineering attack examples, templates and scenarios

    CSIR Research Space (South Africa)

    Mouton, Francois

    2016-06-01

    Full Text Available that are representative of real-world examples, whilst still being general enough to encompass several different real-world examples. The proposed social engineering attack templates cover all three types of communication, namely bidirectional communication...

  20. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  1. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  2. Role of the carbohydrate-binding sites of griffithsin in the prevention of DC-SIGN-mediated capture and transmission of HIV-1.

    Directory of Open Access Journals (Sweden)

    Bart Hoorelbeke

    Full Text Available BACKGROUND: The glycan-targeting C-type DC-SIGN lectin receptor is implicated in the transmission of the human immunodeficiency virus (HIV by binding the virus and transferring the captured HIV-1 to CD4(+ T lymphocytes. Carbohydrate binding agents (CBAs have been reported to block HIV-1 infection. We have now investigated the potent mannose-specific anti-HIV CBA griffithsin (GRFT on its ability to inhibit the capture of HIV-1 to DC-SIGN, its DC-SIGN-directed transmission to CD4(+ T-lymphocytes and the role of the three carbohydrate-binding sites (CBS of GRFT in these processes. FINDINGS: GRFT inhibited HIV-1(IIIB infection of CEM and HIV-1(NL4.3 infection of C8166 CD4(+ T-lymphocytes at an EC50 of 0.059 and 0.444 nM, respectively. The single mutant CBS variants of GRFT (in which a key Asp in one of the CBS was mutated to Ala were about ∼20 to 60-fold less potent to prevent HIV-1 infection and ∼20 to 90-fold less potent to inhibit syncytia formation in co-cultures of persistently HIV-1 infected HuT-78 and uninfected C8166 CD4(+ T-lymphocytes. GRFT prevents DC-SIGN-mediated virus capture and HIV-1 transmission to CD4(+ T-lymphocytes at an EC50 of 1.5 nM and 0.012 nM, respectively. Surface plasmon resonance (SPR studies revealed that wild-type GRFT efficiently blocked the binding between DC-SIGN and immobilized gp120, whereas the point mutant CBS variants of GRFT were ∼10- to 15-fold less efficient. SPR-analysis also demonstrated that wild-type GRFT and its single mutant CBS variants have the capacity to expel bound gp120 from the gp120-DC-SIGN complex in a dose dependent manner, a property that was not observed for HHA, another mannose-specific potent anti-HIV-1 CBA. CONCLUSION: GRFT is inhibitory against HIV gp120 binding to DC-SIGN, efficiently prevents DC-SIGN-mediated transfer of HIV-1 to CD4(+ T-lymphocytes and is able to expel gp120 from the gp120-DC-SIGN complex. Functionally intact CBS of GRFT are important for the optimal action of

  3. ATTACK WARNING: Costs to Modernize NORAD's Computer System Significantly Understated

    National Research Council Canada - National Science Library

    Cross, F

    1991-01-01

    ...) Integrated Tactical Warning and Attack Assessment (ITW/AA) system. These subsystems provide critical strategic surveillance and attack warning and assessment information to United States and Canadian leaders...

  4. RAPTOR: Ransomware Attack PredicTOR

    OpenAIRE

    Quinkert, Florian; Holz, Thorsten; Hossain, KSM Tozammel; Ferrara, Emilio; Lerman, Kristina

    2018-01-01

    Ransomware, a type of malicious software that encrypts a victim's files and only releases the cryptographic key once a ransom is paid, has emerged as a potentially devastating class of cybercrimes in the past few years. In this paper, we present RAPTOR, a promising line of defense against ransomware attacks. RAPTOR fingerprints attackers' operations to forecast ransomware activity. More specifically, our method learns features of malicious domains by looking at examples of domains involved in...

  5. Attack Helicopter Operations: Art or Science

    Science.gov (United States)

    1991-05-13

    ATTACK HELICOPTER OPERATIONS: ART OR SCIENCE ? BY LIEUTENANT COLONEL JAN CALLEN United States Army DISTRIBUTION STATEMENT A: Approved for public release...TASK IWORK UNIT ELEMENT NO. NO. NO. ACCESSION NC 11. TITLE (Include Socurity Classification) Attack Helicopter Operations: Art or Science ? 12. PERSONAL...OPERATIONS: ART OR SCIENCE ? AN INDIVIDUAL STUDY PROJECT by Lieutenant Colonel Jan Callen United States Army Colonel Greg Snelgrove Project Adviser U.S

  6. Semantic Identification Attacks on Web Browsing

    OpenAIRE

    Guha, Neel

    2016-01-01

    We introduce a Semantic Identification Attack, in which an adversary uses semantic signals about the pages visited in one browsing session to identify other browsing sessions launched by the same user. This attack allows an adver- sary to determine if two browsing sessions originate from the same user regardless of any measures taken by the user to disguise their browser or network. We use the MSNBC Anonymous Browsing data set, which contains a large set of user visits (labeled by category) t...

  7. Consciousness in Non-Epileptic Attack Disorder

    OpenAIRE

    Reuber, M.; Kurthen, M.

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of\\ud consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research\\ud literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context\\ud of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consci...

  8. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  9. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  10. Combined Heuristic Attack Strategy on Complex Networks

    Directory of Open Access Journals (Sweden)

    Marek Šimon

    2017-01-01

    Full Text Available Usually, the existence of a complex network is considered an advantage feature and efforts are made to increase its robustness against an attack. However, there exist also harmful and/or malicious networks, from social ones like spreading hoax, corruption, phishing, extremist ideology, and terrorist support up to computer networks spreading computer viruses or DDoS attack software or even biological networks of carriers or transport centers spreading disease among the population. New attack strategy can be therefore used against malicious networks, as well as in a worst-case scenario test for robustness of a useful network. A common measure of robustness of networks is their disintegration level after removal of a fraction of nodes. This robustness can be calculated as a ratio of the number of nodes of the greatest remaining network component against the number of nodes in the original network. Our paper presents a combination of heuristics optimized for an attack on a complex network to achieve its greatest disintegration. Nodes are deleted sequentially based on a heuristic criterion. Efficiency of classical attack approaches is compared to the proposed approach on Barabási-Albert, scale-free with tunable power-law exponent, and Erdős-Rényi models of complex networks and on real-world networks. Our attack strategy results in a faster disintegration, which is counterbalanced by its slightly increased computational demands.

  11. An animal study of a newly developed skin-penetrating pad and covering material for catheters to prevent exit-site infection in continuous ambulatory peritoneal dialysis.

    Science.gov (United States)

    Aoyama, Masato; Mizuno, Toshihide; Tatsumi, Eisuke; Taenaka, Yoshiyuki; Nemoto, Yasushi; Okamoto, Yoshihiro; Takemoto, Yoshiaki; Naganuma, Toshihide; Nakatani, Tatsuya

    2009-12-01

    goat skin throughout the 2-year experimental period without any special wound care such as cleansing or disinfection. The performance of the skin-penetrating pad was similarly favorable when attached to a commercial continuous ambulatory peritoneal dialysis catheter. The newly developed segmented polyurethane porous material had excellent tissue biocompatibility and tissue ingrowth. The skin-penetrating pad devised by using this porous material did not cause epidermal downgrowth, suggesting that it may be effective for the prevention of exit-site infection.

  12. Design and construction of landslide preventive construction at Yamasubara hydroelectric power plant site. Yamasubata hatsudensho chiten ni okeru jisuberi taisaku koji no sekkei seko ni tsuite

    Energy Technology Data Exchange (ETDEWEB)

    Takase, H; Ito, M; Sakata, M [The Kyushu Electric Power Co. Inc., Fukuoka (Japan)

    1993-07-30

    This paper reports the design and construction of landslide preventive construction at the site of the Yamasubara hydroelectric power plant (with a maximum output of 40,700 kW) and the result of slope stability verification after completion of the construction. The moderate slope on top of the primary slide has sands presumed to be colluvial deposit distributed with a depth of 10 m or more, where occurrence of a secondary slip was feared as triggered by the primary slide. The power plant protective constructions consisted of concrete walls to protect the entire power plant including buildings, and falling stone protective fences installed around the surge tanks. The temporary measures were so set that groundwater levels are lowered to a level that can assure the slide safety factor of 1.0 or more by means of drain boring using the down-the-hole hammer type. The permanent protective construction used rock anchors that are superior in constructability and economy. The stability of sliding slope faces was verified to confirm effects of the protective constructions. The verification included observations of groundwater level behavior, water well-up from drain holes, and movements in the slopes. The result showed that the protective constructions have give sufficient effects. Continued slope stability control is important. 16 figs., 7 tabs.

  13. New perspectives on the occupation of Hatuana dune site, Ua Huka, Marquesas Islands

    International Nuclear Information System (INIS)

    Molle, G.; Conte, E.

    2011-01-01

    New archaeological excavations were conducted in 2009 in the Hatuana dune site, Ua Huka, Marquesas archipelago (French Polynesia). The objectives of this research were to determine the complete stratigraphy of the western section of the site, and to obtain charcoal samples for radiocarbon dating. The results are presented here, updating previous dates by E. Conte, and enhancing our understanding of the place of the Hatuana coastal area in the island's prehistory. The main occupation occurred during a period of warfare, suggesting that the place was used to control and prevent enemy attacks. (author). 24 refs., 5 figs., 1 tab.

  14. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  15. Predicting Factors of Zone 4 Attack in Volleyball.

    Science.gov (United States)

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  16. Development and Validation of a Model to Predict Absolute Vascular Risk Reduction by Moderate-Intensity Statin Therapy in Individual Patients With Type 2 Diabetes Mellitus: The Anglo Scandinavian Cardiac Outcomes Trial, Antihypertensive and Lipid-Lowering Treatment to Prevent Heart Attack Trial, and Collaborative Atorvastatin Diabetes Study.

    Science.gov (United States)

    Kaasenbrood, Lotte; Poulter, Neil R; Sever, Peter S; Colhoun, Helen M; Livingstone, Shona J; Boekholdt, S Matthijs; Pressel, Sara L; Davis, Barry R; van der Graaf, Yolanda; Visseren, Frank L J

    2016-05-01

    In this study, we aimed to translate the average relative effect of statin therapy from trial data to the individual patient with type 2 diabetes mellitus by developing and validating a model to predict individualized absolute risk reductions (ARR) of cardiovascular events. Data of 2725 patients with type 2 diabetes mellitus from the Lipid Lowering Arm of the Anglo Scandinavian Cardiac Outcomes Trial (ASCOT-LLA) study (atorvastatin 10 mg versus placebo) were used for model derivation. The model was based on 8 clinical predictors including treatment allocation (statin/placebo). Ten-year individualized ARR on major cardiovascular events by statin therapy were calculated for each patient by subtracting the estimated on-treatment risk from the estimated off-treatment risk. Predicted 10-year ARR by statin therapy was 4% (median ARR, 3.2%; interquartile range, 2.5%-4.3%; 95% confidence interval for 3.2% ARR, -1.4% to 6.8%). Addition of treatment interactions did not improve model performance. Therefore, the wide distribution in ARR was a consequence of the underlying distribution in cardiovascular risk enrolled in these trials. External validation of the model was performed in data from the Antihypertensive and Lipid-Lowering Treatment to Prevent Heart Attack Trial (ALLHAT-LLT; pravastatin 40 mg versus usual care) and Collaborative Atorvastatin Diabetes Study (CARDS; atorvastatin 10 mg versus placebo) of 3878 and 2838 patients with type 2 diabetes mellitus, respectively. Model calibration was adequate in both external data sets, discrimination was moderate (ALLHAT-LLT: c-statistics, 0.64 [95% confidence interval, 0.61-0.67] and CARDS: 0.68 [95% confidence interval, 0.64-0.72]). ARRs of major cardiovascular events by statin therapy can be accurately estimated for individual patients with type 2 diabetes mellitus using a model based on routinely available patient characteristics. There is a wide distribution in ARR that may complement informed decision making. URL: http

  17. Nonepileptic attack disorder among married women.

    Science.gov (United States)

    Dhanaraj, M; Rangaraj, R; Arulmozhi, T; Vengatesan, A

    2005-06-01

    To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD) among married women. Prospective cohort study with 1-year follow-up. A tertiary care teaching hospital. Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the generalized 'attack.' The data collected included clinical characteristics, semiology of the attacks, precipitating stressful events, and co-morbid psychiatric disorders. The control group included 30 age-matched married women with generalized tonic-clonic seizures. The long-term outcome and factors influencing the outcomes were analyzed. The mean duration of illness was 18 months, and the pattern of the attack was 'fall and lying still' in 53% and 'fall with generalized motor movements' in 47%. The frequency was one or more per week in 57% and occasionally in 43%. The important stressful events were matrimonial discord following illegal relationship of the husband with another woman (chi2 = 9.02, P = 0.003) and constant quarrel with other family members (chi2 = 5.19, P = 0.02). The prevalence of sexual abuse was low (7%). Co-morbid psychiatric disorder was observed in 70%. At the end of 1 year, 39% were free from the attack. Resolution of the stressful life events (chi2 = 4.52, P = 0.03) and lower frequency of attack at the time of reporting (chi2 = 3.88, P = 0.05) correlated with good outcomes. Among patients with NEAD in India, the major precipitating factors were matrimonial discord following illegal relationship of the husband with another woman and constant quarrel with other family members and not sexual abuse. Women with low frequency of attack at the time of reporting and the remission of the stressful events had better outcomes.

  18. Smoking Cessation Intervention After Ischemic Stroke or Transient Ischemic Attack. A Randomized Controlled Pilot Trial

    DEFF Research Database (Denmark)

    Brunner Frandsen, Nicole; Sørensen, Margit; Hyldahl, Tanja Kirstine

    2012-01-01

    BACKGROUND: Smoking cessation is widely recommended for secondary stroke prevention. However, little is known about the efficacy of smoking cessation intervention after stroke or transient ischemic attack (TIA). METHODS: Ninety-four smokers under age 76, admitted with ischemic stroke or TIA were ...

  19. DNSSEC and Its Potential for DDoS Attacks - A Comprehensive Measurement Study

    NARCIS (Netherlands)

    van Rijswijk, Roland M.; Sperotto, Anna; Pras, Aiko

    2014-01-01

    Over the past five years we have witnessed the introduction of DNSSEC, a security extension to the DNS that relies on digital signatures. DNSSEC strengthens DNS by preventing attacks such as cache poisoning. However, a common argument against the deployment of DNSSEC is its potential for abuse in

  20. Evaluation of insecticides for protecting southwestern ponderosa pines from attack by engraver beetles (Coleoptera: Curculionidae: Scolytinae)

    Science.gov (United States)

    Tom E. DeGomez; Christopher J. Hayes; John A. Anhold; Joel D. McMillin; Karen M. Clancy; Paul P. Bosu

    2006-01-01

    Insecticides that might protect pine trees from attack by engraver beetles (Ips spp.) have not been rigorously tested in the southwestern United States. We conducted two field experiments to evaluate the efficacy of several currently and potentially labeled preventative insecticides for protecting high-value ponderosa pine, Pinus ponderosa...

  1. PKI Layer Cake: New Collision Attacks against the Global X.509 Infrastructure

    Science.gov (United States)

    Kaminsky, Dan; Patterson, Meredith L.; Sassaman, Len

    Research unveiled in December of 2008 [15] showed how MD5's long-known flaws could be actively exploited to attack the real-worldCertification Authority infrastructure. In this paper, we demonstrate two new classes of collision, which will be somewhat trickier to address than previous attacks against X.509: the applicability of MD2 preimage attacks against the primary root certificate for Verisign, and the difficulty of validating X.509 Names contained within PKCS#10 Certificate Requests.We also draw particular attention to two possibly unrecognized vectors for implementation flaws that have been problematic in the past: the ASN.1 BER decoder required to parsePKCS#10, and the potential for SQL injection fromtext contained within its requests. Finally, we explore why the implications of these attacks are broader than some have realized - first, because Client Authentication is sometimes tied to X.509, and second, because Extended Validation certificates were only intended to stop phishing attacks from names similar to trusted brands. As per the work of Adam Barth and Collin Jackson [4], EV does not prevent an attacker who can synthesize or acquire a "low assurance" certificate for a given name from acquiring the "green bar" EV experience.

  2. Security attack detection algorithm for electric power gis system based on mobile application

    Science.gov (United States)

    Zhou, Chao; Feng, Renjun; Wang, Liming; Huang, Wei; Guo, Yajuan

    2017-05-01

    Electric power GIS is one of the key information technologies to satisfy the power grid construction in China, and widely used in power grid construction planning, weather, and power distribution management. The introduction of electric power GIS based on mobile applications is an effective extension of the geographic information system that has been widely used in the electric power industry. It provides reliable, cheap and sustainable power service for the country. The accurate state estimation is the important conditions to maintain the normal operation of the electric power GIS. Recent research has shown that attackers can inject the complex false data into the power system. The injection attack of this new type of false data (load integrity attack LIA) can successfully bypass the routine detection to achieve the purpose of attack, so that the control center will make a series of wrong decision. Eventually, leading to uneven distribution of power in the grid. In order to ensure the safety of the electric power GIS system based on mobile application, it is very important to analyze the attack mechanism and propose a new type of attack, and to study the corresponding detection method and prevention strategy in the environment of electric power GIS system based on mobile application.

  3. Anti-spoofing for display and print attacks on palmprint verification systems

    Science.gov (United States)

    Kanhangad, Vivek; Bhilare, Shruti; Garg, Pragalbh; Singh, Pranjalya; Chaudhari, Narendra

    2015-05-01

    A number of approaches for personal authentication using palmprint features have been proposed in the literature, majority of which focus on improving the matching performance. However, of late, preventing potential attacks on biometric systems has become a major concern as more and more biometric systems get deployed for wide range of applications. Among various types of attacks, sensor level attack, commonly known as spoof attack, has emerged as the most common attack due to simplicity in its execution. In this paper, we present an approach for detection of display and print based spoof attacks on palmprint verifcation systems. The approach is based on the analysis of acquired hand images for estimating surface re ectance. First and higher order statistical features computed from the distributions of pixel intensities and sub-band wavelet coeefficients form the feature set. A trained binary classifier utilizes the discriminating information to determine if the acquired image is of real hand or a fake one. Experiments are performed on a publicly available hand image dataset, containing 1300 images corresponding to 230 subjects. Experimental results show that the real hand biometrics samples can be substituted by the fake digital or print copies with an alarming spoof acceptance rate as high as 79.8%. Experimental results also show that the proposed spoof detection approach is very effective for discriminating between real and fake palmprint images. The proposed approach consistently achieves over 99% average 10-fold cross validation classification accuracy in our experiments.

  4. [A survey of perioperative asthmatic attack among patients with bronchial asthma underwent general anesthesia].

    Science.gov (United States)

    Ie, Kenya; Yoshizawa, Atsuto; Hirano, Satoru; Izumi, Sinyuu; Hojo, Masaaki; Sugiyama, Haruhito; Kobayasi, Nobuyuki; Kudou, Kouichirou; Maehara, Yasuhiro; Kawachi, Masaharu; Miyakoshi, Kouichi

    2010-07-01

    We investigated the risk factor of perioperative asthmatic attack and effectiveness of preventing treatment for asthmatic attack before operation. We performed retrospective chart review of one hundred eleven patients with asthma underwent general anesthesia and surgical intervention from January 2006 to October 2007 in our hospital. The rate of perioperative asthmatic attack were as follows; 10.2% (5 in 49 cases) in no pretreatment group, 7.5% (3 in 40 cases) in any pretreatments except for systemic steroid, and 4.5% (1 in 22 cases) in systemic steroid pretreatment group. Neither preoperative asthma severity nor duration from the last attack had significant relevancy to perioperative attack rate. The otolaryngological surgery, especially those have nasal polyp and oral surgery had high perioperative asthma attack rate, although there was no significant difference. We recommend the systemic steroid pretreatment for asthmatic patients, especially when they have known risk factor such as administration of the systemic steroid within 6 months, or possibly new risk factor such as nasal polyp, otolaryngological and oral surgery.

  5. Defending a single object against an attacker trying to detect a subset of false targets

    International Nuclear Information System (INIS)

    Peng, R.; Zhai, Q.Q.; Levitin, G.

    2016-01-01

    Deployment of false targets can be a very important and effective measure for enhancing the survivability of an object subjected to intentional attacks. Existing papers have assumed that false targets are either perfect or can be detected with a constant probability. In practice, the attacker may allocate part of its budget into intelligence actions trying to detect a subset of false targets. Analogously, the defender can allocate part of its budget into disinformation actions to prevent the false targets from being detected. In this paper, the detection probability of each false target is assumed to be a function of the intelligence and disinformation efforts allocated on the false target. The optimal resource distribution between target identification/disinformation and attack/protection efforts is studied as solutions of a non-cooperative two period min–max game between the two competitors for the case of constrained defense and attack resources. - Highlights: • A defense-attack problem is studied as a two-period min–max game. • Both intelligence contest over false targets and impact contest are considered. • Optimal defense and attack strategies are investigated with different parameters.

  6. The Importance of Perioperative Prophylaxis with Cefuroxime or Ceftriaxone in the Surgical Site Infections Prevention after Cranial and Spinal Neurosurgical Procedures.

    Science.gov (United States)

    Dimovska-Gavrilovska, Aleksandra; Chaparoski, Aleksandar; Gavrilovski, Andreja; Milenkovikj, Zvonko

    2017-09-01

    Introduction Surgical site infections pose a significant problem in the treatment of neurosurgical procedures, regardless of the application of perioperative prophylaxis with systemic antibiotics. The infection rate in these procedures ranges from less than 1% to above 15%. Different antibiotics and administration regimes have been used in the perioperative prophylaxis so far, and there are numerous comparative studies regarding their efficiency, however, it is generally indicated that the choice thereof should be based on information and local specifics connected to the most probable bacterial causers, which would possibly contaminate the surgical site and cause infection, and moreover, the mandatory compliance with the principles of providing adequate concentration of the drug at the time of the anticipated contamination. Objective Comparing the protective effect of two perioperative prophylactic antibiotic regimes using cefuroxime (second generation cephalosporin) and ceftriaxone (third generation cephalosporin) in the prevention of postoperative surgical site infections after elective and urgent cranial and spinal neurosurgical procedures at the University Clinic for Neurosurgery in Skopje in the period of the first three months of 2016. Design of the study Prospective randomized comparative study. Outcome measures Establishing the clinical outcome represented as prevalence of superficial and deep incision and organ/space postoperative surgical site infections. Material and method We analyzed prospectively 40 patients who received parenteral antibiotic prophylaxis with two antibiotic regimes one hour before the routine neurosurgical cranial and spinal surgical procedures; the patients were randomized in two groups, according to the order of admission and participation in the study, alternately, non-selectively, those persons who fulfilled inclusion criteria were placed in one of the two programmed regimes with cefuroxime in the first, and cefotaxime in the

  7. Systematic Review and Cost Analysis Comparing Use of Chlorhexidine with Use of Iodine for Preoperative Skin Antisepsis to Prevent Surgical Site Infection

    Science.gov (United States)

    Lee, Ingi; Agarwal, Rajender K.; Lee, Bruce Y.; Fishman, Neil O.; Umscheid, Craig A.

    2013-01-01

    Objective To compare use of chlorhexidine with use of iodine for preoperative skin antisepsis with respect to effectiveness in preventing surgical site infections (SSIs) and cost. Methods We searched the Agency for Healthcare Research and Quality website, the Cochrane Library, Medline, and EMBASE up to January 2010 for eligible studies. Included studies were systematic reviews, meta-analyses, or randomized controlled trials (RCTs) comparing preoperative skin antisepsis with chlorhexidine and with iodine and assessing for the outcomes of SSI or positive skin culture result after application. One reviewer extracted data and assessed individual study quality, quality of evidence for each outcome, and publication bias. Meta-analyses were performed using a fixed-effects model. Using results from the meta-analysis and cost data from the Hospital of the University of Pennsylvania, we developed a decision analytic cost-benefit model to compare the economic value, from the hospital perspective, of antisepsis with iodine versus antisepsis with 2 preparations of chlorhexidine (ie, 4% chlorhexidine bottle and single-use applicators of a 2% chlorhexidine gluconate [CHG] and 70% isopropyl alcohol [IPA] solution), and also performed sensitivity analyses. Results Nine RCTs with a total of 3,614 patients were included in the meta-analysis. Meta-analysis revealed that chlorhexidine antisepsis was associated with significantly fewer SSIs (adjusted risk ratio, 0.64 [95% confidence interval, [0.51–0.80]) and positive skin culture results (adjusted risk ratio, 0.44 [95% confidence interval, 0.35–0.56]) than was iodine antisepsis. In the cost-benefit model baseline scenario, switching from iodine to chlorhexidine resulted in a net cost savings of $16–$26 per surgical case and $349,904–$568,594 per year for the Hospital of the University of Pennsylvania. Sensitivity analyses showed that net cost savings persisted under most circumstances. Conclusions Preoperative skin antisepsis

  8. A COMPREHENSIVE SURVEY ON DETECTING BLACK HOLE ATTACK IN MOBILE AD-HOC NETWORK (MANET

    Directory of Open Access Journals (Sweden)

    Pascal Maniriho

    2018-01-01

    Full Text Available The infrastructure-less nature and mobility of nodes in mobile ad-hoc network (MANET make it to be very susceptible to various attacks. Besides, owing to its flexibility and simplicity, there is no predefined time or permission set for nodes to leave or join the network and each node can act as a client or server.  Nevertheless, securing communication between nodes has become a challenging problem than in other types of network. Attacks in MANET range into different categories. Black hole attack is one of the attacks that has been addressed by many researchers in the recent years. It does occur when a harmful mobile node called black hole becomes a part of the network and tries to use its malicious behaviors by sending fake route reply packets (RREP for any received route request packets (RREQ. When these faked packets arrive to the source node, it does reply to them by sending data packet via the established route. Once the packets are received by the black hole, it drops them before reaching the destination.  Hence, preventing the source node from reaching the intended destination. In this paper, we present an overview of a wide range of techniques suggested in the literature for detecting and preventing black hole attacks in mobile ad hoc network. Additionally, the effect of each approach on the network performance is also presented.

  9. 12 CFR 263.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  10. 12 CFR 509.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding....17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  11. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  12. Designing a Mobile Game for Home Computer Users to Protect Against Phishing Attacks

    OpenAIRE

    Arachchilage, Nalin Asanka Gamagedara; Cole, Melissa

    2016-01-01

    This research aims to design an educational mobile game for home computer users to prevent from phishing attacks. Phishing is an online identity theft which aims to steal sensitive information such as username, password and online banking details from victims. To prevent this, phishing education needs to be considered. Mobile games could facilitate to embed learning in a natural environment. The paper introduces a mobile game design based on a story which is simplifying and exaggerating real ...

  13. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  14. Modeling attacking of high skills volleyball players

    Directory of Open Access Journals (Sweden)

    Vladimir Gamaliy

    2014-12-01

    Full Text Available Purpose: to determine the model indicators of technical and tactical actions in the attack highly skilled volleyball players. Material and Methods: the study used statistical data of major international competitions: Olympic Games – 2012 World Championships – 2010, World League – 2010–2014 European Championship – 2010–2014. A total of 130 analyzed games. Methods were used: analysis and generalization of scientific and methodological literature, analysis of competitive activity highly skilled volleyball players, teacher observation, modeling technical and tactical actions in attacking highly skilled volleyball players. Results: it was found that the largest volume application of technical and tactical actions in the attack belongs to the group tactics «supple movement», whose indicator is 21,3%. The smallest amount of application belongs to the group tactics «flight level» model whose indicators is 5,4%, the efficiency of 3,4%, respectively. It is found that the power service in the jump from model parameters used in 51,6% of cases, the planning targets – 21,7% and 4,4% planning to reduce. Attacks performed with the back line, on model parameters used in the amount of 20,8% efficiency –13,7%. Conclusions: we prove that the performance of technical and tactical actions in the attack can be used as model in the control system of training and competitive process highly skilled volleyball players

  15. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing

  16. Attacks on public telephone networks: technologies and challenges

    Science.gov (United States)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  17. Elongation Factor Tu Prevents Misediting of Gly-tRNA(Gly Caused by the Design Behind the Chiral Proofreading Site of D-Aminoacyl-tRNA Deacylase.

    Directory of Open Access Journals (Sweden)

    Satya Brata Routh

    2016-05-01

    Full Text Available D-aminoacyl-tRNA deacylase (DTD removes D-amino acids mischarged on tRNAs and is thus implicated in enforcing homochirality in proteins. Previously, we proposed that selective capture of D-aminoacyl-tRNA by DTD's invariant, cross-subunit Gly-cisPro motif forms the mechanistic basis for its enantioselectivity. We now show, using nuclear magnetic resonance (NMR spectroscopy-based binding studies followed by biochemical assays with both bacterial and eukaryotic systems, that DTD effectively misedits Gly-tRNAGly. High-resolution crystal structure reveals that the architecture of DTD's chiral proofreading site is completely porous to achiral glycine. Hence, L-chiral rejection is the only design principle on which DTD functions, unlike other chiral-specific enzymes such as D-amino acid oxidases, which are specific for D-enantiomers. Competition assays with elongation factor thermo unstable (EF-Tu and DTD demonstrate that EF-Tu precludes Gly-tRNAGly misediting at normal cellular concentrations. However, even slightly higher DTD levels overcome this protection conferred by EF-Tu, thus resulting in significant depletion of Gly-tRNAGly. Our in vitro observations are substantiated by cell-based studies in Escherichia coli that show that overexpression of DTD causes cellular toxicity, which is largely rescued upon glycine supplementation. Furthermore, we provide direct evidence that DTD is an RNA-based catalyst, since it uses only the terminal 2'-OH of tRNA for catalysis without the involvement of protein side chains. The study therefore provides a unique paradigm of enzyme action for substrate selection/specificity by DTD, and thus explains the underlying cause of DTD's activity on Gly-tRNAGly. It also gives a molecular and functional basis for the necessity and the observed tight regulation of DTD levels, thereby preventing cellular toxicity due to misediting.

  18. Meta-analysis of randomized and quasi-randomized clinical trials of topical antibiotics after primary closure for the prevention of surgical-site infection.

    Science.gov (United States)

    Heal, C F; Banks, J L; Lepper, P; Kontopantelis, E; van Driel, M L

    2017-08-01

    Surgical-site infections (SSIs) increase patient morbidity and costs. The aim was to identify and synthesize all RCTs evaluating the effect of topical antibiotics on SSI in wounds healing by primary intention. The search included Ovid MEDLINE, Ovid Embase, the Cochrane Wounds Specialized Register, Central Register of Controlled Trials and EBSCO CINAHL from inception to May 2016. There was no restriction of language, date or setting. Two authors independently selected studies, extracted data and assessed risk of bias. When sufficient numbers of comparable trials were available, data were pooled in meta-analysis. Fourteen RCTs with 6466 participants met the inclusion criteria. Pooling of eight trials (5427 participants) showed that topical antibiotics probably reduced the risk of SSI compared with no topical antibiotic (risk ratio (RR) 0·61, 95 per cent c.i. 0·42 to 0·87; moderate-quality evidence), equating to 20 fewer SSIs per 1000 patients treated. Pooling of three trials (3012 participants) for risk of allergic contact dermatitis found no clear difference between antibiotics and no antibiotic (RR 3·94, 0·46 to 34·00; very low-quality evidence). Pooling of five trials (1299 participants) indicated that topical antibiotics probably reduce the risk of SSI compared with topical antiseptics (RR 0·49, 0·30 to 0·80; moderate-quality evidence); 43 fewer SSIs per 1000 patients treated. Pooling of two trials (541 participants) showed no clear difference in the risk of allergic contact dermatitis with antibiotics or antiseptic agents (RR 0·97, 0·52 to 1·82; very low-quality evidence). Topical antibiotics probably prevent SSI compared with no topical antibiotic or antiseptic. No conclusion can be drawn regarding whether they cause allergic contact dermatitis. © 2017 BJS Society Ltd Published by John Wiley & Sons Ltd.

  19. The application research of MACCS in consequence assessment of the attacked Dayabay Nuclear Power Station

    International Nuclear Information System (INIS)

    Zhao Yuan; Dong Binjiang

    2003-01-01

    The method of radiological consequence assessment as Dayabay nuclear power station being attacked in war is studied in this paper. The Models and software of calculation and the parameters which have been chosen are also studied in this paper. This study estimates the off-site consequences of two different types of being attack accidents spectrum and the spent fuel pool being attacked accidents spectrum. This study calculated the distributing of radiological consequence in different weather. According to the analyse of the consequence, we get such result that the radiate consequence of nuclear reactor of Daya Bay nuclear power plant being attack in war is the same as the consequence of nuclear accident, but the consequence of spent fuel pool being attacked is very serious. If the spent fuel pool was attacked by the enemy, the contaminated area is very large. The effective dose within 30 km under the wind will exceed 1 Sv. Based in part upon the above information the recommendation is made that the Daya Bay nuclear power plant should be closed or run in low power. and the nuclear island should be protected in war. (authors)

  20. A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

    Directory of Open Access Journals (Sweden)

    S.Seetha

    2010-06-01

    Full Text Available Distributed Denial of service is a major threat to the availability of internet services. Due to the distributed, large scale nature of the Internet makes DDoS (Distributed Denial-of-Service attacks stealthy and difficult to counter. Defense against Distributed Denial- of -Service attacks is one of the hardest security problems on the Internet. Recently these network attacks have been increasing. Therefore more effective countermeasures are required to counter the threat. This requirement has motivated us to propose a novel mechanism against DDoS attack. This paper presents the design details of a distributed defense mechanism against DDoS attack. In our approach, the egress routers of the intermediate network coordinate with each other to provide the information necessary to detect and respond to the attack. Thus, a detection system based on single site will have either high positive or high negative rates. Unlike the traditional IDSs (Intrusion Detection System this method has the potential to achieve high true positive ratio. This work has been done by using consensus algorithms for exchanging the information between the detection systems. So the overall detection time would be reduced for global decision making.

  1. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

    Directory of Open Access Journals (Sweden)

    Željko Gavrić

    2018-01-01

    Full Text Available Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.

  2. A Novel Protective Framework for Defeating HTTP-Based Denial of Service and Distributed Denial of Service Attacks

    Directory of Open Access Journals (Sweden)

    Mohammed A. Saleh

    2015-01-01

    Full Text Available The growth of web technology has brought convenience to our life, since it has become the most important communication channel. However, now this merit is threatened by complicated network-based attacks, such as denial of service (DoS and distributed denial of service (DDoS attacks. Despite many researchers’ efforts, no optimal solution that addresses all sorts of HTTP DoS/DDoS attacks is on offer. Therefore, this research aims to fix this gap by designing an alternative solution called a flexible, collaborative, multilayer, DDoS prevention framework (FCMDPF. The innovative design of the FCMDPF framework handles all aspects of HTTP-based DoS/DDoS attacks through the following three subsequent framework’s schemes (layers. Firstly, an outer blocking (OB scheme blocks attacking IP source if it is listed on the black list table. Secondly, the service traceback oriented architecture (STBOA scheme is to validate whether the incoming request is launched by a human or by an automated tool. Then, it traces back the true attacking IP source. Thirdly, the flexible advanced entropy based (FAEB scheme is to eliminate high rate DDoS (HR-DDoS and flash crowd (FC attacks. Compared to the previous researches, our framework’s design provides an efficient protection for web applications against all sorts of DoS/DDoS attacks.

  3. Counteracting Power Analysis Attacks by Masking

    Science.gov (United States)

    Oswald, Elisabeth; Mangard, Stefan

    The publication of power analysis attacks [12] has triggered a lot of research activities. On the one hand these activities have been dedicated toward the development of secure and efficient countermeasures. On the other hand also new and improved attacks have been developed. In fact, there has been a continuous arms race between designers of countermeasures and attackers. This chapter provides a brief overview of the state-of-the art in the arms race in the context of a countermeasure called masking. Masking is a popular countermeasure that has been extensively discussed in the scientific community. Numerous articles have been published that explain different types of masking and that analyze weaknesses of this countermeasure.

  4. The WOMBAT Attack Attribution Method: Some Results

    Science.gov (United States)

    Dacier, Marc; Pham, Van-Hau; Thonnard, Olivier

    In this paper, we present a new attack attribution method that has been developed within the WOMBAT project. We illustrate the method with some real-world results obtained when applying it to almost two years of attack traces collected by low interaction honeypots. This analytical method aims at identifying large scale attack phenomena composed of IP sources that are linked to the same root cause. All malicious sources involved in a same phenomenon constitute what we call a Misbehaving Cloud (MC). The paper offers an overview of the various steps the method goes through to identify these clouds, providing pointers to external references for more detailed information. Four instances of misbehaving clouds are then described in some more depth to demonstrate the meaningfulness of the concept.

  5. What Do Firewalls Protect?An Empirical Study of Firewalls, Vulnerabilities, and Attacks

    OpenAIRE

    Peisert, Sean; Bishop, Matt; Marzullo, Keith

    2010-01-01

    Firewalls are a cornerstone of how sites implement "defense in depth." Many security policies assume that outside attackers must first penetrate a firewall configured to block their access. This paper examines what firewalls protect against, and whether those protections are sufficient to warrant placing the current level of trust in firewalls.

  6. Playing Attack and Defense with Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe; Bouganim, Luc

    2014-01-01

    It is often convenient to assume in a data management platform that one or several computing devices are trusted, specially when the goal is to provide privacy guarantees over personal data. But what does it take for a computing device to be trusted? More specifically, how can a personal device...... provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service...... running on a secure device, than to attack the same service running on a general purpose device....

  7. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian

    2014-01-01

    ciphers, including the new standard SHA-3 (Keccak). The rebound attack is a start-from-the-middle approach for finding differential paths and conforming pairs in byte-oriented designs like Substitution-Permutation networks and AES. We apply our new compositional attack to the reduced version of the hash...... number of rounds. We also use neutral bits and message modification methods from the practice of collision search in MD5 and SHA-1 hash functions. These methods push the rotational property through more rounds than previous analysis suggested, and eventually establish a distinguishing property...

  8. A Distinguish Attack on COSvd Cipher

    OpenAIRE

    Mohammad Ali Orumiehchi ha; R. Mirghadri

    2007-01-01

    The COSvd Ciphers has been proposed by Filiol and others (2004). It is a strengthened version of COS stream cipher family denoted COSvd that has been adopted for at least one commercial standard. We propose a distinguish attack on this version, and prove that, it is distinguishable from a random stream. In the COSvd Cipher used one S-Box (10×8) on the final part of cipher. We focus on S-Box and use weakness this S-Box for distinguish attack. In addition, found a leak on HNLL that the sub s-bo...

  9. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  10. An Enhancing Security Research of Tor Anonymous Communication to Against DDos Attacks

    Directory of Open Access Journals (Sweden)

    Feng Tao

    2017-01-01

    Full Text Available Tor (The Second Onion Router is modified by the first generation onion router and known as the most prevalent anonymous communication system. According to the advantage of low latency, high confidentiality of transmission content, high security of communication channels and et al., Tor is widely used in anonymous Web browsing, instant message and so on. However, the vulnerability and blemish of Tor affect system security. An identity and Signcryption-based concurrent signature scheme was used to prevent the behaviors of attackers from inserting controlled nodes and conspiring to make DDos attacks. The integrated security of Tor system was enhanced in our scheme. In addition we have proved the scheme.

  11. Multiplayer Game for DDoS Attacks Resilience in Ad Hoc Networks

    DEFF Research Database (Denmark)

    Mikalas, Antonis; Komninos, Nikos; Prasad, Neeli R.

    2011-01-01

    This paper proposes a multiplayer game to prevent Distributed Denial of Service attack (DDoS) in ad hoc networks. The multiplayer game is based on game theory and cryptographic puzzles. We divide requests from nodes into separate groups which decreases the ability of malicious nodes to cooperate...... with one another in order to effectively make a DDoS attack. Finally, through our experiments we have shown that the total overhead of the multiplayer game as well as the the total time that each node needs to be served is affordable for devices that have limited resources and for environments like ad hoc...

  12. Game Theory for Proactive Dynamic Defense and Attack Mitigation in Cyber-Physical Systems

    Energy Technology Data Exchange (ETDEWEB)

    Letchford, Joshua [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-09-01

    While there has been a great deal of security research focused on preventing attacks, there has been less work on how one should balance security and resilience investments. In this work we developed and evaluated models that captured both explicit defenses and other mitigations that reduce the impact of attacks. We examined these issues both in more broadly applicable general Stackelberg models and in more specific network and power grid settings. Finally, we compared these solutions to existing work in terms of both solution quality and computational overhead.

  13. PRIVACY CONCERNS IN FACEBOOK SITE

    OpenAIRE

    Vandana Singh

    2014-01-01

    Today social networking sites play an important role and inexpensive way to maintain existing relationships and present oneself. However, the increasing use of online sites give rise to privacy concerns and risks. All Internet sites are also under attack from phishers, fraudsters, and spammers. They aim to steal user information and expose users to unwanted spam. They have so many resources at their disposal.This paper studies the awareness of college students regarding the privacy in Faceboo...

  14. Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics

    Directory of Open Access Journals (Sweden)

    Sárkány Zoltán

    2016-03-01

    Full Text Available Introduction: The objective of this study was to investigate with the help of a computerized simulation model whether the treatment of an acute asthma attack can be individualized based on the severity of the attack and the characteristics of the patient. Material and Method: A stochastic lung model was used to simulate the deposition of 1 nm - 10 μm particles during a mild and a moderate asthma attack. Breathing parameters were varied to maximize deposition, and simulation results were compared with those obtained in the case of a severe asthma attack. In order to investigate the effect of height on the deposition of inhaled particles, another series of simulations was carried out with identical breathing parameters, comparing patient heights of 155 cm, 175 cm and 195 cm. Results: The optimization process yielded an increase in the maximum deposition values of around 6-7% for each type of investigated asthma attack, and the difference between attacks of different degree of severity was around 5% for both the initial and the optimized values, a higher degree of obstruction increasing the amount of deposited particles. Conclusions: Our results suggest that the individualization of asthma attack treatment cannot be based on particles of different size, as the highest deposited fraction in all three types of attacks can be obtained using 0.01 μm particles. The use of a specific set of breathing parameters yields a difference between a mild and a moderate, as well as a moderate and a severe asthma attack of around 5%.

  15. Safety and feasibility of post-stroke care and exercise after minor ischemic stroke or transient ischemic attack: MotiveS & MoveIT

    NARCIS (Netherlands)

    Boss, H.M.; Van Schaik, S.M.; Deijle, I.A.; de Melker, E.C.; van den Berg, B.M.; Scherder, E.J.A.; Bosboom, W.M.J.; Weinstein, H.C.; van den Berg-Vos, R.M.

    2014-01-01

    Background: Despite the beneficial effect of cardiac rehabilitation after myocardial infarction, a rehabilitation program to improve cardiorespiratory fitness and influence secondary prevention has not been implemented for ischemic stroke and transient ischemic attack (TIA). Objective: To

  16. Sequential and Parallel Attack Tree Modelling

    NARCIS (Netherlands)

    Arnold, Florian; Guck, Dennis; Kumar, Rajesh; Stoelinga, Mariëlle Ida Antoinette; Koornneef, Floor; van Gulijk, Coen

    The intricacy of socio-technical systems requires a careful planning and utilisation of security resources to ensure uninterrupted, secure and reliable services. Even though many studies have been conducted to understand and model the behaviour of a potential attacker, the detection of crucial

  17. Network overload due to massive attacks

    Science.gov (United States)

    Kornbluth, Yosef; Barach, Gilad; Tuchman, Yaakov; Kadish, Benjamin; Cwilich, Gabriel; Buldyrev, Sergey V.

    2018-05-01

    We study the cascading failure of networks due to overload, using the betweenness centrality of a node as the measure of its load following the Motter and Lai model. We study the fraction of survived nodes at the end of the cascade pf as a function of the strength of the initial attack, measured by the fraction of nodes p that survive the initial attack for different values of tolerance α in random regular and Erdös-Renyi graphs. We find the existence of a first-order phase-transition line pt(α ) on a p -α plane, such that if p pt , pf is large and the giant component of the network is still present. Exactly at pt, the function pf(p ) undergoes a first-order discontinuity. We find that the line pt(α ) ends at a critical point (pc,αc) , in which the cascading failures are replaced by a second-order percolation transition. We find analytically the average betweenness of nodes with different degrees before and after the initial attack, we investigate their roles in the cascading failures, and we find a lower bound for pt(α ) . We also study the difference between localized and random attacks.

  18. Attack Classification Schema for Smart City WSNs

    Directory of Open Access Journals (Sweden)

    Victor Garcia-Font

    2017-04-01

    Full Text Available Urban areas around the world are populating their streets with wireless sensor networks (WSNs in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  19. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  20. Intrusion-Tolerant Replication under Attack

    Science.gov (United States)

    Kirsch, Jonathan

    2010-01-01

    Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…

  1. Strengthening Crypto-1 Cipher Against Algebraic Attacks

    Directory of Open Access Journals (Sweden)

    Farah Afianti

    2015-08-01

    Full Text Available In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. In order to strengthen Crypto-1 against SAT solver attacks, a modification of the feedback function with better cryptographic properties is proposed. It applies a primitive polynomial companion matrix. SAT solvers cannot directly attack the feedback shift register that uses the modified Boolean feedback function, the register has to be split into smaller groups. Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function. In addition, another modified Crypto-1, using the modified feedback function and a modified filter function, had the lowest percentage of revealed variables. It can be concluded that the security strength and performance of the modified Crypto-1 using the modified feedback function and the modified filter function are better than those of the original Crypto-1.

  2. Wrap-Attack Pack: Product Packaging Exercise

    Science.gov (United States)

    Lee, Seung Hwan; Hoffman, K. Douglas

    2016-01-01

    Although many marketing courses discuss traditional concepts pertaining to product strategy, concepts specifically relating to packaging are often glossed over. This exercise, "Wrap-Attack Pack," teaches students about the utilitarian and hedonic design elements of packaging. More specifically, the primary objective is to creatively…

  3. Social Engineering Attack Detection Model: SEADMv2

    CSIR Research Space (South Africa)

    Mouton, F

    2015-10-01

    Full Text Available link in the security chain. A social engineering attack targets this weakness by using various manipulation techniques to elicit individuals to perform sensitive requests. The field of social engineering is still in its infancy as far as formal...

  4. Attack Classification Schema for Smart City WSNs.

    Science.gov (United States)

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2017-04-05

    Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  5. Algebraic Side-Channel Attack on Twofish

    Directory of Open Access Journals (Sweden)

    Chujiao Ma

    2017-05-01

    Full Text Available While algebraic side-channel attack (ASCA has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish. Compared to other algorithms that ASCA has been used on, Twofish is more difficult to attack due to the key-dependent S-boxes as well as the complex key scheduling. In this paper, we propose the first algebraic side-channel attack on Twofish, and examine the importance of side-channel information in getting past the key-dependent S-boxes and the complex key scheduling. The cryptographic algorithm and side-channel information are both expressed as boolean equations and a SAT solver is used to recover the key. While algebraic attack by itself is not sufficient to break the algorithm, with the help of side-channel information such as Hamming weights, we are able to correctly solve for 96 bits of the 128 bits key in under 2 hours with known plaintext/ciphertext.

  6. 47 CFR 76.1612 - Personal attack.

    Science.gov (United States)

    2010-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND... issues of public importance, an attack is made upon the honesty, character, integrity, or like personal qualities of an identified person or group, the cable television system operator shall, within a reasonable...

  7. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Stux, DuQu, Nitro, Luckycat, Exploit Kits, FLAME. ADSL/SoHo Router Compromise. Botnets of compromised ADSL/SoHo Routers; User Redirection via malicious DNS entry. Web Application attacks. SQL Injection, RFI etc. More and more Webshells. More utility to hackers; Increasing complexity and evading mechanisms.

  8. Strategic defense and attack for reliability systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2008-01-01

    This article illustrates a method by which arbitrarily complex series/parallel reliability systems can be analyzed. The method is illustrated with the series-parallel and parallel-series systems. Analytical expressions are determined for the investments and utilities of the defender and the attacker, depend on their unit costs of investment for each component, the contest intensity for each component, and their evaluations of the value of system functionality. For a series-parallel system, infinitely many components in parallel benefit the defender maximally regardless of the finite number of parallel subsystems in series. Conversely, infinitely many components in series benefit the attacker maximally regardless of the finite number of components in parallel in each subsystem. For a parallel-series system, the results are opposite. With equivalent components, equal unit costs for defender and attacker, equal intensity for all components, and equally many components in series and parallel, the defender always prefers the series-parallel system rather than the parallel-series system, and converse holds for the attacker. Hence from the defender's perspective, ceteris paribus, the series-parallel system is more reliable, and has fewer 'cut sets' or failure modes

  9. Validation Method of a Telecommunications Blackout Attack

    National Research Council Canada - National Science Library

    Amado, Joao; Nunes, Paulo

    2005-01-01

    ..., and to obtain the maximum disruptive effect over the services. The proposed method uses a top-down approach, starting on the service level and ending on the different network elements that can be identified in the end as the targets for the attack.

  10. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the…

  11. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Increased frequency and intensity of DoS/DDoS. Few Gbps is now normal; Anonymous VPNs being used; Botnets being used as a vehicle for launching DDoS attacks. Large scale booking of domain names. Hundred thousands of domains registered in short duration via few registrars; Single registrant; Most of the domains ...

  12. Understanding How Components of Organisations Contribute to Attacks

    DEFF Research Database (Denmark)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors is diffi......Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors...... is difficult. Recently, system models have been used for automatically identifying possible attacks on the modelled organisation. The generated attacks consider all three layers, making the contribution of building infrastructure, computer infrastructure, and humans (insiders and outsiders) explicit. However......, this contribution is only visible in the attack trees as part of the performed steps; it cannot be mapped back to the model directly since the actions usually involve several elements (attacker and targeted actor or asset). Especially for large attack trees, understanding the relations between several model...

  13. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered...... the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure...

  14. Prevention of Surgical Site Infection After Ankle Surgery Using Vacuum-Assisted Closure Therapy in High-Risk Patients With Diabetes.

    Science.gov (United States)

    Zhou, Zhen-Yu; Liu, Ya-Ke; Chen, Hong-Lin; Liu, Fan

    2016-01-01

    Patients with diabetes have a high risk of surgical site infection (SSI) after ankle surgery. The aim of the present study was to investigate the efficacy of vacuum-assisted closure (VAC) in the prevention of SSI after ankle surgery compared with the efficacy of standard moist wound care (SMWC). A retrospective study was performed of unstable ankle fractures for surgical fixation in patients with diabetes from January 2012 to December 2014. VAC and SMWC were used for surgical incision coverage. The primary outcome was the incidence of SSI, and the secondary outcomes were the length of hospital stay and crude hospital costs. The data from 76 patients were analyzed, with 22 (28.95%) in the VAC group and 54 (71.05%) in the SMWC group. The incidence of SSI was 4.6% in the VAC group compared with 27.8% in the SMWC group (chi-square 5.076; p = .024), and the crude odds ratio for SSI in the VAC group was 0.124 (95% confidence interval 0.002 to 0.938). The length of hospital stay was lower in the VAC group than in the SMWC group (12.6 ± 2.7 days and 15.2 ± 3.5 days, respectively; t = 3.122, p = .003). The crude hospital costs were also lower in the VAC group than in the SMWC group (Chinese yuan 8643.2 ± 1195.3 and 9456.2 ± 1106.3, respectively; t = 2.839, p = .006). After logistic regression analysis, the adjusted odds ratio for the total SSI rate comparing VAC and SMWC was 0.324 (95% confidence interval 0.092 to 0.804; p = .021). Compared with SMWC, VAC can decrease the SSI rate after ankle surgery in patients with diabetes. This finding should be confirmed by prospective, randomized controlled clinical trials. Copyright © 2016 American College of Foot and Ankle Surgeons. Published by Elsevier Inc. All rights reserved.

  15. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim.

  16. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2016-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations...... approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  17. New attacks on Wi-Fi Protected Setup

    OpenAIRE

    Hamed Mohtadi; Alireza Rahimi

    2015-01-01

    Wi-Fi Protected Setup (WPS) is a network security standard that is used to secure networks in home and office, introduced in 2006 by the Wi-Fi Alliance. It provides easier configuration setup and is used in almost all recent Wi-Fi devices. In this paper we propose two attacks on this standard. The first attack is an offline brute force attack that uses imbalance on registration protocol. This attack needs user action, but it is more efficient than previous attacks. The second attack uses weak...

  18. Bush animal attacks: management of complex injuries in a resource-limited setting

    Directory of Open Access Journals (Sweden)

    Mitchell Katrina B

    2011-12-01

    important to understand the management of these attacks in resource-limited health care environment. Further, the growing population and human encroachment on previously wild habitats such as the northwestern Tanzania bush argues for increased community awareness to assist in prevention of human injuries by animals.

  19. An Attack Model Development Process for the Cyber Security of Safety Related Nuclear Digital I and C Systems

    Energy Technology Data Exchange (ETDEWEB)

    Khand, Parvaiz Ahmed; Seong, Poong Hyun [Korea Advanced Institute of Science and Technology, Daejeon (Korea, Republic of)

    2007-10-15

    Nuclear power plants (NPPs), the redundant safety related systems are designed to take automatic action to prevent and mitigate accident conditions if the operators and the non-safety systems fail to maintain the plant within normal operating conditions. Presently, there is trend of connecting computer networks of commercial NPPs to corporate local area networks (LANs) to give engineers access to plant data for economic benefits. An increase in plant efficiency of a couple percentage points can translate to millions upon millions of dollars per year. The nuclear industry is also moving in the direction of installing digital controls that would allow for remote operation of plant functions, perhaps within a few years. However, this connectivity may also cause new security problems such as: in 2003, a computer worm named as slammer penetrated a private computer network at Ohio's Davis-Besse nuclear plant and disabled a safety monitoring system called a safety parameter display system (SPDS). Moreover, the present systems were developed with consideration of reliability and safety rather than security. In present scenario, there is a need to model and understand the cyber attacks towards these systems in a systematic way, and to demonstrate that the plant specific procedures and the imposed security controls adequately protect the systems from analyzed cyber security attacks. Attack trees provide a systematic, disciplined and effective way to model and understand cyber attacks towards any type of systems, make it possible to understand risks from deliberate, malicious intrusions from attackers, and make security decisions. Using attack trees the security of large systems can be modeled by considering a security breach as a system failure, and describing it with a set of events that can lead to system failure in a combinatorial way. The attacks towards the system are represented in a tree structure, with an attack that can significantly damage the system operation

  20. An Attack Model Development Process for the Cyber Security of Safety Related Nuclear Digital I and C Systems

    International Nuclear Information System (INIS)

    Khand, Parvaiz Ahmed; Seong, Poong Hyun

    2007-01-01

    Nuclear power plants (NPPs), the redundant safety related systems are designed to take automatic action to prevent and mitigate accident conditions if the operators and the non-safety systems fail to maintain the plant within normal operating conditions. Presently, there is trend of connecting computer networks of commercial NPPs to corporate local area networks (LANs) to give engineers access to plant data for economic benefits. An increase in plant efficiency of a couple percentage points can translate to millions upon millions of dollars per year. The nuclear industry is also moving in the direction of installing digital controls that would allow for remote operation of plant functions, perhaps within a few years. However, this connectivity may also cause new security problems such as: in 2003, a computer worm named as slammer penetrated a private computer network at Ohio's Davis-Besse nuclear plant and disabled a safety monitoring system called a safety parameter display system (SPDS). Moreover, the present systems were developed with consideration of reliability and safety rather than security. In present scenario, there is a need to model and understand the cyber attacks towards these systems in a systematic way, and to demonstrate that the plant specific procedures and the imposed security controls adequately protect the systems from analyzed cyber security attacks. Attack trees provide a systematic, disciplined and effective way to model and understand cyber attacks towards any type of systems, make it possible to understand risks from deliberate, malicious intrusions from attackers, and make security decisions. Using attack trees the security of large systems can be modeled by considering a security breach as a system failure, and describing it with a set of events that can lead to system failure in a combinatorial way. The attacks towards the system are represented in a tree structure, with an attack that can significantly damage the system operation as a

  1. Guidance documents: Continued support to improve operations of fish hatcheries and field sites to reduce the impact or prevent establishment of New Zealand Mudsnails and other invasive mollusks

    Science.gov (United States)

    Moffitt, Christine M.

    2017-01-01

    Western New Zealand Mudsnail Conference in Seattle. Targeted hatchery workshops were conducted with staff at Dworshak National Fish Hatchery Complex (ID), Similkameen Pond, Oroville WA, and Ringold Springs State Hatchery (WA).As a result of communications with hatchery staff, invasive species managers, and on site assessments of hatchery facilities, the document was modified and enhanced. Additional resources were added to keep it up to date. The result is a more simplified tool that can lead hatchery or management personnel through the process of risk assessment and provide an introduction to the risk management and communication process.In addition to the typical HACCP processes, this tool adds steps to rate and consider uncertainty and the weight of evidence regarding options and monitoring results . Uncertainty of outcome exists in most tools that can be used to control or prevent NZMS or other invasive mollusks from infesting an area. In additional this document emphasizes that specific control tools and plans must be tailored to each specific setting to consider the economic, environmental and social influences. From the testing and evaluation process, there was a strong recognition that a number of control and prevention tools previously suggested and reported in the literature from laboratory and small scale trials may not be compatible with regional and national regulations, economic constraints, social or cultural constraints, engineering or water chemistry characteristics of each facility.The options for control are summarized in the second document, Review of Control Measures for Hatcheries Infested with NZMS (Appendix A) that provides sources for additional resources and specific tools, and guidance regarding the feasibility and success of each approach. This tool also emphasizes that management plans need to be adaptive and incorporate oversight from professionals familiar with measuring risks of fish diseases, and treatments (e.g. the fish health

  2. 1994 Attack Team Workshop: Phase II - Full-Scale Offensive Fog Attack Tests

    National Research Council Canada - National Science Library

    Scheffey, Joseph

    1997-01-01

    .... This report demonstrates the benefits of using a medium angle fog stream to control the overhead fire threat when conducting a direct attack on a growing/steady state fire where the sea of the fire is obstructed...

  3. The Japanese aerial attack on Hanford Engineer Works

    Science.gov (United States)

    Clark, Charles W.

    The day before the Pearl Harbor attack, December 6, 1941, the University of Chicago Metallurgical Laboratory was given four goals: design a plutonium (Pu) bomb; produce Pu by irradiation of uranium (U); extract Pu from the irradiated U; complete this in time to be militarily significant. A year later the first controlled nuclear chain reaction was attained in Chicago Pile 1 (CP-1). In January 1943, Hanford, WA was chosen as the site of the Pu factory. Neutron irradiation of 238U was to be used to make 239Pu. This was done by a larger version of CP-1, Hanford Reactor B, which went critical in September 1944. By July 1945 it had made enough Pu for two bombs: one used at the Trinity test in July; the other at Nagasaki, Japan in August. I focus on an ironic sidelight to this story: disruption of hydroelectric power to Reactor B by a Japanese fire balloon attack on March 10, 1945. This activated the costly coal-fired emergency backup plant to keep the reactor coolant water flowing, thwarting disaster and vindicating the conservative design of Hanford Engineer Works. Management of the Hanford Engineer Works in World War II, H. Thayer (ASCE Press 1996).

  4. Detection and Modeling of Cyber Attacks with Petri Nets

    Directory of Open Access Journals (Sweden)

    Bartosz Jasiul

    2014-12-01

    Full Text Available The aim of this article is to present an approach to develop and verify a method of formal modeling of cyber threats directed at computer systems. Moreover, the goal is to prove that the method enables one to create models resembling the behavior of malware that support the detection process of selected cyber attacks and facilitate the application of countermeasures. The most common cyber threats targeting end users and terminals are caused by malicious software, called malware. The malware detection process can be performed either by matching their digital signatures or analyzing their behavioral models. As the obfuscation techniques make the malware almost undetectable, the classic signature-based anti-virus tools must be supported with behavioral analysis. The proposed approach to modeling of malware behavior is based on colored Petri nets. This article is addressed to cyber defense researchers, security architects and developers solving up-to-date problems regarding the detection and prevention of advanced persistent threats.

  5. Targeting Pioglitazone Hydrochloride Therapy After Stroke or Transient Ischemic Attack According to Pretreatment Risk for Stroke or Myocardial Infarction.

    Science.gov (United States)

    Kernan, Walter N; Viscoli, Catherine M; Dearborn, Jennifer L; Kent, David M; Conwit, Robin; Fayad, Pierre; Furie, Karen L; Gorman, Mark; Guarino, Peter D; Inzucchi, Silvio E; Stuart, Amber; Young, Lawrence H

    2017-11-01

    There is growing recognition that patients may respond differently to therapy and that the average treatment effect from a clinical trial may not apply equally to all candidates for a therapy. To determine whether, among patients with an ischemic stroke or transient ischemic attack and insulin resistance, those at higher risk for future stroke or myocardial infarction (MI) derive more benefit from the insulin-sensitizing drug pioglitazone hydrochloride compared with patients at lower risk. A secondary analysis was conducted of the Insulin Resistance Intervention After Stroke trial, a double-blind, placebo-controlled trial of pioglitazone for secondary prevention. Patients were enrolled from 179 research sites in 7 countries from February 7, 2005, to January 15, 2013, and were followed up for a mean of 4.1 years through the study's end on July 28, 2015. Eligible participants had a qualifying ischemic stroke or transient ischemic attack within 180 days of entry and insulin resistance without type 1 or type 2 diabetes. Pioglitazone or matching placebo. A Cox proportional hazards regression model was created using baseline features to stratify patients above or below the median risk for stroke or MI within 5 years. Within each stratum, the efficacy of pioglitazone for preventing stroke or MI was calculated. Safety outcomes were death, heart failure, weight gain, and bone fracture. Among 3876 participants (1338 women and 2538 men; mean [SD] age, 63 [11] years), the 5-year risk for stroke or MI was 6.0% in the pioglitazone group among patients at lower baseline risk compared with 7.9% in the placebo group (absolute risk difference, -1.9% [95% CI, -4.4% to 0.6%]). Among patients at higher risk, the risk was 14.7% in the pioglitazone group vs 19.6% for placebo (absolute risk difference, -4.9% [95% CI, -8.6% to 1.2%]). Hazard ratios were similar for patients below or above the median risk (0.77 vs 0.75; P = .92). Pioglitazone increased weight less among patients at

  6. Entropy-Based Application Layer DDoS Attack Detection Using Artificial Neural Networks

    Directory of Open Access Journals (Sweden)

    Khundrakpam Johnson Singh

    2016-10-01

    Full Text Available Distributed denial-of-service (DDoS attack is one of the major threats to the web server. The rapid increase of DDoS attacks on the Internet has clearly pointed out the limitations in current intrusion detection systems or intrusion prevention systems (IDS/IPS, mostly caused by application-layer DDoS attacks. Within this context, the objective of the paper is to detect a DDoS attack using a multilayer perceptron (MLP classification algorithm with genetic algorithm (GA as learning algorithm. In this work, we analyzed the standard EPA-HTTP (environmental protection agency-hypertext transfer protocol dataset and selected the parameters that will be used as input to the classifier model for differentiating the attack from normal profile. The parameters selected are the HTTP GET request count, entropy, and variance for every connection. The proposed model can provide a better accuracy of 98.31%, sensitivity of 0.9962, and specificity of 0.0561 when compared to other traditional classification models.

  7. A Framework for Attack-Resilient Industrial Control Systems : Attack Detection and Controller Reconfiguration

    OpenAIRE

    Paridari, Kaveh; O'Mahony, Niamh; Mady, Alie El-Din; Chabukswar, Rohan; Boubekeur, Menouer; Sandberg, Henrik

    2017-01-01

    Most existing industrial control systems (ICSs), such as building energy management systems (EMSs), were installed when potential security threats were only physical. With advances in connectivity, ICSs are now, typically, connected to communications networks and, as a result, can be accessed remotely. This extends the attack surface to include the potential for sophisticated cyber attacks, which can adversely impact ICS operation, resulting in service interruption, equipment damage, safety c...

  8. Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?

    Directory of Open Access Journals (Sweden)

    Ines Goicoechea-Telleria

    2018-01-01

    Full Text Available The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or to have access to places such as the gym or the office, so we rely on the security manufacturers offer when protecting our privileges and private life. It is well known that it is possible to hack into a fingerprint sensor using fake fingers made of Play-Doh and other easy-to-obtain materials but to what extent? Is this true for all users or only for specialists with a deep knowledge on biometrics? Are smartphone fingerprint sensors as reliable as desktop sensors? To answer these questions, we performed 3 separate evaluations. First, we evaluated 4 desktop fingerprint sensors of different technologies by attacking them with 7 different fake finger materials. All of them were successfully attacked by an experienced attacker. Secondly, we carried out a similar test on 5 smartphones with embedded sensors using the most successful materials, which also hacked the 5 sensors. Lastly, we gathered 15 simulated attackers with no background in biometrics to create fake fingers of several materials, and they had one week to attack the fingerprint sensors of the same 5 smartphones, with the starting point of a short video with the techniques to create them. All 5 smartphones were successfully attacked by an inexperienced attacker. This paper will provide the results achieved, as well as an analysis on the attack potential of every case. All results are given following the metrics of the standard ISO/IEC 30107-3.

  9. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2010-01-01

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  10. Defense and attack of complex and dependent systems

    Energy Technology Data Exchange (ETDEWEB)

    Hausken, Kjell, E-mail: kjell.hausken@uis.n [Faculty of Social Sciences, University of Stavanger, N-4036 Stavanger (Norway)

    2010-01-15

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  11. Mountain pine beetle attack associated with low levels of 4-allylanisole in ponderosa pine.

    Science.gov (United States)

    Emerick, Jay J; Snyder, Aaron I; Bower, Nathan W; Snyder, Marc A

    2008-08-01

    Mountain pine beetle (Dendroctonus ponderosae) is the most important insect pest in southern Rocky Mountain ponderosa pine (Pinus ponderosa) forests. Tree mortality is hastened by the various fungal pathogens that are symbiotic with the beetles. The phenylpropanoid 4-allylanisole is an antifungal and semiochemical for some pine beetle species. We analyzed 4-allylanisole and monoterpene profiles in the xylem oleoresin from a total of 107 trees at six sites from two chemotypes of ponderosa pine found in Colorado and New Mexico using gas chromatography-mass spectroscopy (GC-MS). Although monoterpene profiles were essentially the same in attacked and nonattacked trees, significantly lower levels of 4-allylanisole were found in attacked trees compared with trees that showed no evidence of attack for both chemotypes.

  12. Use of DNA from bite marks can determine species and individual animals that attack humans

    Science.gov (United States)

    Farley, Sean; Talbot, Sandra L.; Sage, George K.; Sinnott, Rick; Coltrane, Jessica

    2014-01-01

    During the summer of 2008, 6 documented attacks and close encounters with brown bears (Ursus arctos) occurred in the greater Anchorage, Alaska (USA) area. We discuss findings from 2 incidents in which people were mauled within 2 km of each other over a 6-week period and in which it was assumed that a single animal was responsible. To ensure public safety, authorities killed a brown bear implicated in the attacks by circumstantial evidence, though it was not known a priori that the animal was responsible. We extracted DNA from hairs and bite sites on the clothing of both victims and determined species and individual identity of the animal(s) involved in both incidents. Genetic data indicated the brown bear killed by authorities was responsible for one of the maulings, but not both. This research demonstrates that DNA-based techniques, with appropriate sampling, can provide unambiguous identification of animals involved in attacks, as well as provide reasonable justification for excluding others. Because DNA-based techniques can unequivocally identify individual bears carrying out attacks, they should be considered a standard method employed in wildlife attack investigations.

  13. Information Warfare: Defining the Legal Response to An Attack

    National Research Council Canada - National Science Library

    Pottorff, James

    1999-01-01

    This paper discusses the difficulty in determining whether an information warfare attack, such as a computer virus, can be treated as an "armed attack" for purposes of national defense under the United Nations charter. As the U.S...

  14. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  15. Calcium Supplements: A Risk Factor for Heart Attack?

    Science.gov (United States)

    ... factor for heart attack? I've read that calcium supplements may increase the risk of heart attack. ... D. Some doctors think it's possible that taking calcium supplements may increase your risk of a heart ...

  16. Cyber Attacks During the War on Terrorism: A Predictive Analysis

    National Research Council Canada - National Science Library

    Vatis, Michael

    2001-01-01

    .... Just as the terrorist attacks of September 11, 2001 defied what many thought possible, cyber attacks could escalate in response to United States and allied retaliatory measures against the terrorists...

  17. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  18. Two fatal tiger attacks in zoos.

    Science.gov (United States)

    Tantius, Britta; Wittschieber, Daniel; Schmidt, Sven; Rothschild, Markus A; Banaschak, Sibylle

    2016-01-01

    Two captive tiger attacks are presented that took place in Cologne and Münster zoos. Both attacks occurred when the handlers, intent on cleaning the enclosures, entered whilst the tigers accidently retained access to the location, and thus defended their territory against the perceived intruders. Both victims suffered fatal neck injuries from the bites. At Münster, colleagues managed to lure the tiger away from its victim to enable treatment, whilst the Cologne zoo tiger had to be shot in order to allow access to be gained. Whilst it was judged that human error led to the deaths of the experienced zookeepers, the investigation in Münster was closed as no third party was found to be at fault, whereas the Cologne zoo director was initially charged with being negligent. These charges were subsequently dismissed as safety regulations were found to be up to date.

  19. RISK DISCLOSURE AGAINST ATTACK ON CRITICAL INFRASTRUCTURES

    Science.gov (United States)

    Yoshida, Mamoru; Kobayashi, Kiyoshi

    This paper analyzes the government's defensive and disclosure strategies to reduce the damage caused by terrorists that attack critical infrastructures using subjective game theory. The government recognizes a terrorist as a hidden opponent and the government's decision making about the policies against terror attacks depends on the belief about the existence of terrorist. In addition, it is not necessarily true that the government and the terrorist play the common game and make their decisions. Considering these points, the paper formulates the model in which the government and the terrorist formulate the subjective games respectively, and they induce the strategies using the equilibriums of their subjective games. The paper concluded that the government's disclosure about the implementation of the countermeasure, rather than the disclosure of warning level related with the belief about the existence of terrorist, brings about the higher increment of the subjective payoffs of the government.

  20. Marine microalgae attack and feed on metazoans

    DEFF Research Database (Denmark)

    Berge, Terje; Poulsen, Louise K.; Moldrup, Morten

    2012-01-01

    Free-living microalgae from the dinoflagellate genus Karlodinium are known to formmassive blooms in eutrophic coastal waters worldwide and are often associated with fish kills. Natural bloom populations, recently shown to consist of the two mixotrophic and toxic species Karlodinium armiger...... and Karlodinium veneficum have caused fast paralysis and mortality of finfish and copepods in the laboratory, and have been associated with reduced metazooplankton biomass in-situ. Here we show that a strain of K. armiger (K-0688) immobilises the common marine copepod Acartia tonsa in a densitydependent manner...... and collectively ingests the grazer to promote its own growth rate. In contrast, four strains of K. veneficum did not attack or affect the motility and survival of the copepods. Copepod immobilisation by the K. armiger strain was fast (within 15min) and caused by attacks of swarming cells, likely through...

  1. Cascade-based attacks on complex networks

    Science.gov (United States)

    Motter, Adilson E.; Lai, Ying-Cheng

    2002-12-01

    We live in a modern world supported by large, complex networks. Examples range from financial markets to communication and transportation systems. In many realistic situations the flow of physical quantities in the network, as characterized by the loads on nodes, is important. We show that for such networks where loads can redistribute among the nodes, intentional attacks can lead to a cascade of overload failures, which can in turn cause the entire or a substantial part of the network to collapse. This is relevant for real-world networks that possess a highly heterogeneous distribution of loads, such as the Internet and power grids. We demonstrate that the heterogeneity of these networks makes them particularly vulnerable to attacks in that a large-scale cascade may be triggered by disabling a single key node. This brings obvious concerns on the security of such systems.

  2. Research About Attacks Over Cloud Environment

    Directory of Open Access Journals (Sweden)

    Li Jie

    2017-01-01

    Full Text Available Cloud computing is expected to continue expanding in the next few years and people will start to see some of the following benefits in their real lives. Security of cloud computing environments is the set of control-based technologies and policies absolute to adhere regulatory compliance rules and protect information data applications and infrastructure related with cloud use. In this paper we suggest a model to estimating the cloud computing security and test the services provided to users. The simulator NG-Cloud Next Generation Secure Cloud Storage is used and modified to administer the proposed model. This implementation achieved security functions potential attacks as defined in the proposed model. Finally we also solve some attacks over cloud computing to provide the security and safety of the cloud.

  3. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  4. Blind Data Attack on BGP Routers

    Science.gov (United States)

    2017-03-01

    Second Reader Dr. Cynthia Irvine Chair, Cyber Academic Group iii THIS PAGE INTENTIONALLY LEFT BLANK iv ABSTRACT Transport Communication Protocol (TCP...Postgraduate School. The experience of higher learning at this institution was incredible, and I would whole-heartedly recommend it to any of my peers and...data attack packets to the victim device. Scapy is a Python library that is used to craft and send packets [28]. BGP is supported in Python through

  5. Fighting Through a Logistics Cyber Attack

    Science.gov (United States)

    2015-06-19

    cumulative cost of cyber-attacks was more than the combined global black market cost of cocaine, heroin and marijuana. These alarming figures raised...the country to its knees. The Luftwaffe was uncontested in the Battle of Britain until radar’s ability to detect inbound aircraft provided the...manifest information in IGC and provides inbound passenger manifest data to the aerial port of debarkation (APOD) and other receiving activities for

  6. An Explanation of Nakamoto's Analysis of Double-spend Attacks

    OpenAIRE

    Ozisik, A. Pinar; Levine, Brian Neil

    2017-01-01

    The fundamental attack against blockchain systems is the double-spend attack. In this tutorial, we provide a very detailed explanation of just one section of Satoshi Nakamoto's original paper where the attack's probability of success is stated. We show the derivation of the mathematics relied upon by Nakamoto to create a model of the attack. We also validate the model with a Monte Carlo simulation, and we determine which model component is not perfect.

  7. How oxygen attacks [FeFe] hydrogenases from photosynthetic organisms

    Science.gov (United States)

    Stripp, Sven T.; Goldet, Gabrielle; Brandmayr, Caterina; Sanganas, Oliver; Vincent, Kylie A.; Haumann, Michael; Armstrong, Fraser A.; Happe, Thomas

    2009-01-01

    Green algae such as Chlamydomonas reinhardtii synthesize an [FeFe] hydrogenase that is highly active in hydrogen evolution. However, the extreme sensitivity of [FeFe] hydrogenases to oxygen presents a major challenge for exploiting these organisms to achieve sustainable photosynthetic hydrogen production. In this study, the mechanism of oxygen inactivation of the [FeFe] hydrogenase CrHydA1 from C. reinhardtii has been investigated. X-ray absorption spectroscopy shows that reaction with oxygen results in destruction of the [4Fe-4S] domain of the active site H-cluster while leaving the di-iron domain (2FeH) essentially intact. By protein film electrochemistry we were able to determine the order of events leading up to this destruction. Carbon monoxide, a competitive inhibitor of CrHydA1 which binds to an Fe atom of the 2FeH domain and is otherwise not known to attack FeS clusters in proteins, reacts nearly two orders of magnitude faster than oxygen and protects the enzyme against oxygen damage. These results therefore show that destruction of the [4Fe-4S] cluster is initiated by binding and reduction of oxygen at the di-iron domain—a key step that is blocked by carbon monoxide. The relatively slow attack by oxygen compared to carbon monoxide suggests that a very high level of discrimination can be achieved by subtle factors such as electronic effects (specific orbital overlap requirements) and steric constraints at the active site. PMID:19805068

  8. Iraqi violence, Saudi attack and further bombings

    Energy Technology Data Exchange (ETDEWEB)

    Anon

    2006-03-15

    Iraq moved closer to all-out civil war following an attack on the Imam Ali al-Hadi mosque in Samarra, one of Shi'i Islam's holiest shrines, on 22nd February. In the days that followed, several hundred Iraqis died in inter-communal violence. Attacks on installations close to the Basrah Oil Terminal were reported. Earlier in the month, the main oil storage facility in Kirkuk was bombed, forcing the Northern Oil Company to shut-in the 0.3 mn bpd field. Oil and electricity supplies in southern Iraq were cut by attacks on installations some 40 miles south of Baghdad. Turkey agreed to resume product exports to Iraq after a deal was agreed on repaying Iraqi debts of $1 bn to Turkish suppliers. An official Australian inquiry into illegal payments made under the UN's oil-for-food programme is to investigate allegations involving two Australian-controlled oil firms. (author)

  9. The Current State of Screening and Decolonization for the Prevention of Staphylococcus aureus Surgical Site Infection After Total Hip and Knee Arthroplasty.

    Science.gov (United States)

    Weiser, Mitchell C; Moucha, Calin S

    2015-09-02

    The most common pathogens in surgical site infections after total hip and knee arthroplasty are methicillin-sensitive Staphylococcus aureus (MSSA), methicillin-resistant S. aureus (MRSA), and coagulase-negative staphylococci. Patients colonized with MSSA or MRSA have an increased risk for a staphylococcal infection at the site of a total hip or knee arthroplasty. Most colonized individuals who develop a staphylococcal infection at the site of a total hip or total knee arthroplasty have molecularly identical S. aureus isolates in their nares and wounds. Screening and nasal decolonization of S. aureus can potentially reduce the rates of staphylococcal surgical site infection after total hip and total knee arthroplasty. Copyright © 2015 by The Journal of Bone and Joint Surgery, Incorporated.

  10. Quantitative Attack Tree Analysis via Priced Timed Automata

    NARCIS (Netherlands)

    Kumar, Rajesh; Ruijters, Enno Jozef Johannes; Stoelinga, Mariëlle Ida Antoinette; Sankaranarayanan, Sriram; Vicario, Enrico

    The success of a security attack crucially depends on the resources available to an attacker: time, budget, skill level, and risk appetite. Insight in these dependencies and the most vulnerable system parts is key to providing effective counter measures. This paper considers attack trees, one of the

  11. Pareto Efficient Solution of Attack-Defence Trees

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as

  12. Vulnerability Assessment by Learning Attack Specifications in Graphs

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Lopes, Raul H.C.

    This paper presents an evolutionary approach for learning attack specifications that describe attack scenarios. The objective is to find vulnerabilities in computer networks which minimise the cost of an attack with maximum impact. Although we focus on Insider Threat, the proposed approach applies

  13. Attacks on the AJPS Mersenne-based cryptosystem

    NARCIS (Netherlands)

    K. de Boer (Koen); L. Ducas (Léo); S. Jeffery (Stacey); R. M. de Wolf (Ronald)

    2018-01-01

    textabstractAggarwal, Joux, Prakash and Santha recently introduced a new potentially quantum-safe public-key cryptosystem, and suggested that a brute-force attack is essentially optimal against it. They consider but then dismiss both Meet-in-the-Middle attacks and LLL-based attacks. Very soon after

  14. 12 CFR 747.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... INVESTIGATIONS Uniform Rules of Practice and Procedure § 747.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all or any part of an...

  15. 12 CFR 308.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... PRACTICE RULES OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 308.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any...

  16. 12 CFR 19.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 19.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all...

  17. Limit Asthma Attacks Caused by Colds or Flu

    Science.gov (United States)

    Asthma: Limit asthma attacks caused by colds or flu A cold or the flu can trigger an asthma attack. Here's why — and how to keep your sneeze ... plan. If you notice warning signs of an asthma attack — such as coughing, wheezing, chest tightness or shortness ...

  18. Link-layer Jamming Attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    2004-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  19. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  20. Regression Nodes: Extending attack trees with data from social sciences

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    In the field of security, attack trees are often used to assess security vulnerabilities probabilistically in relation to multi-step attacks. The nodes are usually connected via AND-gates, where all children must be executed, or via OR-gates, where only one action is necessary for the attack step to