WorldWideScience

Sample records for staggered bioterrorist attacks

  1. Risk-based decision making for staggered bioterrorist attacks : resource allocation and risk reduction in "reload" scenarios.

    Energy Technology Data Exchange (ETDEWEB)

    Lemaster, Michelle Nicole; Gay, David M. (Sandia National Laboratories, Albuquerque, NM); Ehlen, Mark Andrew (Sandia National Laboratories, Albuquerque, NM); Boggs, Paul T.; Ray, Jaideep

    2009-10-01

    Staggered bioterrorist attacks with aerosolized pathogens on population centers present a formidable challenge to resource allocation and response planning. The response and planning will commence immediately after the detection of the first attack and with no or little information of the second attack. In this report, we outline a method by which resource allocation may be performed. It involves probabilistic reconstruction of the bioterrorist attack from partial observations of the outbreak, followed by an optimization-under-uncertainty approach to perform resource allocations. We consider both single-site and time-staggered multi-site attacks (i.e., a reload scenario) under conditions when resources (personnel and equipment which are difficult to gather and transport) are insufficient. Both communicable (plague) and non-communicable diseases (anthrax) are addressed, and we also consider cases when the data, the time-series of people reporting with symptoms, are confounded with a reporting delay. We demonstrate how our approach develops allocations profiles that have the potential to reduce the probability of an extremely adverse outcome in exchange for a more certain, but less adverse outcome. We explore the effect of placing limits on daily allocations. Further, since our method is data-driven, the resource allocation progressively improves as more data becomes available.

  2. Knowledge and Attitude of Iranian Red Crescent Society Volunteers in Dealing with Bioterrorist attacks

    Directory of Open Access Journals (Sweden)

    Seyed Ali Bahreini Moghadam

    2016-01-01

    Full Text Available Introduction: Bioterrorism is a worldwide problem and has been the focus of attention during recent decades. There is no precise information on the knowledge, attitude, and preparedness of Iranian Red Crescent volunteers in dealing with bioterrorism. Therefore, the present study aimed to evaluate the above-mentioned parameters in Mahabad Red Crescent Society volunteers. Methods: In this prospective cross-sectional study, the knowledge of 120 volunteers was evaluated and rated as poor, moderate, and good. In addition, attitude of the volunteers and preparedness of Mahabad Red Crescent Society was rated as inappropriate and appropriate using a questionnaire. Results: The mean age of volunteers was 32.0 ± 8.2 years (62.5% male. 2 (1.7% volunteers had good knowledge while 94 (78.3% had no knowledge regarding bioterrorist attack management. Only 1 (0.8%  volunteer had appropriate attitude and 6 (5.0% stated their preparedness for being sent out to the crisis zone. 116 volunteers (96.7% indicated that Mahabad Red Crescent Society has an inappropriate level of preparedness to encounter bioterrorist attacks. Conclusion: The findings of the present study showed poor knowledge and inappropriate attitude of Mahabad Red Crescent Society volunteers in encountering probable bioterrorist attacks. Furthermore, the Red Crescent Society of this town had an inappropriate level of preparedness in the field of bioterrorism from the viewpoint of the studied volunteers.

  3. Guide for mass prophylaxis of hospital employees in preparation for a bioterrorist attack.

    Science.gov (United States)

    Lee, Jeremy John; Johnson, Shannon John; Sohmer, Michael J

    2009-03-15

    The key elements required for the health-system pharmacist to prepare and implement a hospital-based mass prophylaxis distribution effort for hospital employees are described. A bioterrorist attack may involve multiple jurisdictions which would necessitate a regional response. Pharmacists should collaborate not only with colleagues in their immediate areas, but also with pharmacists and emergency-management planners in neighboring counties and jurisdictions. Pharmacists must also develop antibiotic drug selection protocols and define the quantity needed to maintain hospital operations after a bioterrorist attack. Once the desired antibiotics have been selected and the number of employees has been determined, along with the length of prophylaxis therapy, it should be determined how much money will be needed to purchase and store enough medications to meet the need. Next, provisions must be made to acquire and store the antibiotic cache, with attention paid to cache rotation and packaging and repackaging recommendations. A detailed procedure for the deployment of an antibiotic cache must be developed. This procedure should include job descriptions and job action sheets for deployment team members and plans for receiving and dispensing antibiotics from the Strategic National Stockpile. Once the employee prophylaxis procedure is developed, staff must be educated about it, and exercises should be conducted to identify possible weaknesses in the procedure. Health-system pharmacists should play an active role in designing and implementing an antibiotic prophylaxis plan for employees for a potential bioterrorist attack. Understanding and following procedures provided in the tool kit are critical to their successful readiness.

  4. The current state of bioterrorist attack surveillance and preparedness in the US.

    Science.gov (United States)

    Grundmann, Oliver

    2014-01-01

    The use of biological agents as weapons to disrupt established structures, such as governments and especially larger urban populations, has been prevalent throughout history. Following the anthrax letters sent to various government officials in the fall of 2001, the US has been investing in prevention, surveillance, and preparation for a potential bioterrorism attack. Additional funding authorized since 2002 has assisted the Centers for Disease Control and Prevention, the Department of Health and Human Services, and the Environmental Protection Agency to invest in preventative research measures as well as preparedness programs, such as the Laboratory Response Network, Hospital Preparedness Program, and BioWatch. With both sentinel monitoring systems and epidemiological surveillance programs in place for metropolitan areas, the immediate threat of a large-scale bioterrorist attack may be limited. However, early detection is a crucial factor to initiate immediate response measures to prevent further spread following dissemination of a biological agent. Especially in rural areas, an interagency approach to train health care workers and raise awareness for the general public remain primary tasks, which is an ongoing challenge. Risk-management approaches in responding to dissemination of biological agents, as well as appropriate decontamination measures that reduce the probability of further contamination, have been provided, and suggest further investments in preparedness and surveillance. Ongoing efforts to improve preparedness and response to a bioterrorist attack are crucial to further reduce morbidity, mortality, and economic impact on public health.

  5. Bioterrorismo: apuntes para una agenda de lo inesperado Preparedness against bioterrorist attacks in Mexico

    Directory of Open Access Journals (Sweden)

    Samuel Ponce de León-Rosales

    2001-12-01

    infraestructura suficiente para establecer diagnósticos de enfermedades emergentes o insólitas como sería el caso de una agresión bioterrorista. La tecnología permite ahora identificar, en pocas horas, a múltiples agentes infecciosos por análisis de ácidos nucleicos y debería ser accesible en laboratorios de referencia. Todas las acciones requieren de presupuestos suficientes para enfrentar esta posible eventualidad. La situación es potencialmente de extrema gravedad y así deberá considerarse al cuantificar la inversión. El texto completo en inglés de este artículo está disponible en: http://www.insp.mx/salud/index.html The vulnerability of human populations to chemical, biological, radiological, and nuclear terrorism has been widely discussed but insufficiently studied. Current public health policies are not guided by solid and relevant information to design cost-effective programs for preventing or controlling this kind of incidents in the future. Governmental budgets are insufficient to respond to bioterrorist attacks. To face these threats, developing countries like Mexico should frame strategies and devise specific preventive actions that consider the transmission dynamics of potential infectious agents likely to be used in a bioterrorist attack. Proposals. The international reaction to a biological attack must be supported by international agreements that ban the use of biological agents for warfare and/or defense purposes, as well as on academic and technological exchange for the prevention of bioterrorist attacks. At the national level, the recommendations in the event of a biological attack are: a establishing a legal defense strategy against bioterrorism; b implementing education programs as a key strategy for defense against bioterrorism; c devising a national program of interinstitutional antibioterrorist coordination that includes medical emergency assistance and collection of medical forensic evidence; d including a biological weapon registry in

  6. The current state of bioterrorist attack surveillance and preparedness in the US

    Directory of Open Access Journals (Sweden)

    Grundmann O

    2014-10-01

    Full Text Available Oliver Grundmann Department of Medicinal Chemistry, College of Pharmacy, University of Florida, Gainesville, FL, USA Abstract: The use of biological agents as weapons to disrupt established structures, such as governments and especially larger urban populations, has been prevalent throughout history. Following the anthrax letters sent to various government officials in the fall of 2001, the US has been investing in prevention, surveillance, and preparation for a potential bioterrorism attack. Additional funding authorized since 2002 has assisted the Centers for Disease Control and Prevention, the Department of Health and Human Services, and the Environmental Protection Agency to invest in preventative research measures as well as preparedness programs, such as the Laboratory Response Network, Hospital Preparedness Program, and BioWatch. With both sentinel monitoring systems and epidemiological surveillance programs in place for metropolitan areas, the immediate threat of a large-scale bioterrorist attack may be limited. However, early detection is a crucial factor to initiate immediate response measures to prevent further spread following dissemination of a biological agent. Especially in rural areas, an interagency approach to train health care workers and raise awareness for the general public remain primary tasks, which is an ongoing challenge. Risk-management approaches in responding to dissemination of biological agents, as well as appropriate decontamination measures that reduce the probability of further contamination, have been provided, and suggest further investments in preparedness and surveillance. Ongoing efforts to improve preparedness and response to a bioterrorist attack are crucial to further reduce morbidity, mortality, and economic impact on public health. Keywords: bioterrorism, public health policy, risk management, community preparedness

  7. Assessment of community healthcare providers ability and willingness to respond to emergencies resulting from bioterrorist attacks

    Directory of Open Access Journals (Sweden)

    Crane Jeffery

    2010-01-01

    Full Text Available Introduction: Previous findings have demonstrated that preparedness and planning within the public health system are inadequately developed to respond to an act of biological or chemical terrorism. Methods:This investigation used Internet-based surveys to assess the level of preparedness (PL and willingness to respond (WTR to a bioterrorism attack, and identify factors that predict PL and WTR among Florida community healthcare providers. Invitations were sent to 22,800 healthcare providers in Florida, which resulted in 2,279 respondents. Results: Respondents included physicians (n=604, nurses (n=1,152, and pharmacists (n=486. The results indicated that only 32% of Florida healthcare providers were competent and willing to respond to a bioterrorism attack, 82.7% of providers were willing to respond in their local community, and 53.6% within the State. Respondents were more competent in administrative skills than clinical knowledge (62.8% vs. 45%. Areas in which respondents had the highest competency were the initiation of treatment and recognition of their clinical and administrative roles. Areas in which respondents showed the lowest competency were the ability to identify cases and the ability to communicate risk to others. About 55% of the subjects had previous bioterrorism training and 31.5% had conducted emergency drills. Gender, race, previous training and drills, perceived threats of bioterrorism attack, perceived benefits of training and drills, and feeling prepared were all predictors of overall preparedness. Conclusions: The findings suggest that only one-third of Florida community healthcare providers were prepared for a bioterrorism attack, which is an insufficient response rate to effectively respond to a bioterrorism incident.

  8. Minimizing the bioterrorist threat: Fear, fancy, folly, and physics

    Science.gov (United States)

    Wyatt, Philip

    2011-03-01

    There can be little doubt that a bioterrorist attack represents one of the most significant dangers facing the Nation today. It is cheap, relatively easy to use, and can produce huge casualties and significant financial losses. Because of its apparent simplicity, there has been a great amount of attention directed towards developing means for early detection of an attack in progress. Most developmental funding for protective strategies comes from the Federal government: DoD is focused on protecting the military (personnel and facilities) whereas DoHS is most concerned with civilian response (police, triage, epidemiology, cure). Associated with such activities are some pretty amazing ideas both concerning the threat and means to detect its presence. These include the belief that certain bioterrorist attacks could equal the consequences of a nuclear weapon, that crop dusters with the proper agents could wipe out a city, that if it ``glows'' (i. e. is fluorescent) it must be an agent, or even that gravitational forces are actually far greater than believed. From the early warning side of things, the huge costs associated with a false positive call have resulted in the generally recognized need to identify before any alarm is triggered. Some consequences of this strategy have been the development of so-called smart chips and even handheld mass spectrometers! A brief review of some of these devices and the physics required for their success is discussed. An approach based upon some simple features of inverse scattering theory is proposed whereby identification may be unnecessary.

  9. [Viral encephalitis virus, a new bioterrorist menace].

    Science.gov (United States)

    Rigaudeau, Sophie; Micol, Romain; Bricaire, François; Bossi, Philippe

    2005-01-29

    Often responsible for little known infections, today viral encephalitis viruses appear as a new bioterrorist menace, because of their easy production and their great pathogenic potential. Spraying is the best way to permit the rapid diffusion of certain encephalitis viruses. Diagnosis of viral encephalitis, predominating in tropical surroundings, is difficult. In the majority of cases, symptoms differ little from those of common flu. With supplementary examinations, the biological abnormalities are usually non-specific. There are no characteristic images on scans or MRI. Identification of the virus in the nasopharynx, blood or cerebrospinal fluid, in serology, PCR or RT-PCR permits confirmation of the virus. Treatment is essentially symptomatic and relies on appropriate reanimation measures. Ribavirin can be indicated in some cases such as the Rift Valley fever, but is formally contraindicated in West Nile encephalitis. The aim of terrorist groups who would use this type of weapon is more to provoke panic and disorganisation than to kill as many people as possible.

  10. A generic open-source software framework supporting scenario simulations in bioterrorist crises.

    Science.gov (United States)

    Falenski, Alexander; Filter, Matthias; Thöns, Christian; Weiser, Armin A; Wigger, Jan-Frederik; Davis, Matthew; Douglas, Judith V; Edlund, Stefan; Hu, Kun; Kaufman, James H; Appel, Bernd; Käsbohrer, Annemarie

    2013-09-01

    Since the 2001 anthrax attack in the United States, awareness of threats originating from bioterrorism has grown. This led internationally to increased research efforts to improve knowledge of and approaches to protecting human and animal populations against the threat from such attacks. A collaborative effort in this context is the extension of the open-source Spatiotemporal Epidemiological Modeler (STEM) simulation and modeling software for agro- or bioterrorist crisis scenarios. STEM, originally designed to enable community-driven public health disease models and simulations, was extended with new features that enable integration of proprietary data as well as visualization of agent spread along supply and production chains. STEM now provides a fully developed open-source software infrastructure supporting critical modeling tasks such as ad hoc model generation, parameter estimation, simulation of scenario evolution, estimation of effects of mitigation or management measures, and documentation. This open-source software resource can be used free of charge. Additionally, STEM provides critical features like built-in worldwide data on administrative boundaries, transportation networks, or environmental conditions (eg, rainfall, temperature, elevation, vegetation). Users can easily combine their own confidential data with built-in public data to create customized models of desired resolution. STEM also supports collaborative and joint efforts in crisis situations by extended import and export functionalities. In this article we demonstrate specifically those new software features implemented to accomplish STEM application in agro- or bioterrorist crisis scenarios.

  11. Staggering but not knocked out

    Energy Technology Data Exchange (ETDEWEB)

    Anon.

    2012-11-01

    Italy's PV market is staggering like a boxer almost knocked out. It has been hit hard by the country's deep economic recession. Conto Energia V has been yet another blow with cuts of up to 40 % in the solar feed-in tariffs. But the situation is not hopeless.

  12. Taste changing in staggered quarks

    International Nuclear Information System (INIS)

    Quentin Mason

    2004-01-01

    The authors present results from a systematic perturbative investigation of taste-changing in improved staggered quarks. They show one-loop taste-changing interactions can be removed perturbatively by an effective four-quark term and calculate the necessary coefficients

  13. On staggered indecomposable Virasoro modules

    International Nuclear Information System (INIS)

    Kytoelae, Kalle; Ridout, David

    2009-06-01

    In this article, certain indecomposable Virasoro modules are studied. Specifically, the Virasoro mode L0 is assumed to be non-diagonalisable, possessing Jordan blocks of rank two. Moreover, the module is further assumed to have a highest weight submodule, the ''left module'', and that the quotient by this submodule yields another highest weight module, the ''right module''. Such modules, which have been called staggered, have appeared repeatedly in the logarithmic conformal field theory literature, but their theory has not been explored in full generality. Here, such a theory is developed for the Virasoro algebra using rather elementary techniques. The focus centres on two different but related questions typically encountered in practical studies: How can one identify a given staggered module, and how can one demonstrate the existence of a proposed staggered module. Given just the values of the highest weights of the left and right modules, themselves subject to simple necessary conditions, invariants are defined which together with the knowledge of the left and right modules uniquely identify a staggered module. The possible values of these invariants form a vector space of dimension zero, one or two, and the structures of the left and right modules limit the isomorphism classes of the corresponding staggered modules to an affine subspace (possibly empty). The number of invariants and affine restrictions is purely determined by the structures of the left and right modules. Moreover, in order to facilitate applications, the expressions for the invariants and restrictions are given by formulae as explicit as possible (they generally rely on expressions for Virasoro singular vectors). Finally, the text is liberally peppered throughout with examples illustrating the general concepts. These have been carefully chosen for their physical relevance or for the novel features they exhibit. (orig.)

  14. On staggered indecomposable Virasoro modules

    Science.gov (United States)

    Kytölä, Kalle; Ridout, David

    2009-12-01

    In this article, certain indecomposable Virasoro modules are studied. Specifically, the Virasoro mode L0 is assumed to be nondiagonalizable, possessing Jordan blocks of rank 2. Moreover, the module is further assumed to have a highest weight submodule, the "left module," and that the quotient by this submodule yields another highest weight module, the "right module." Such modules, which have been called staggered, have appeared repeatedly in the logarithmic conformal field theory literature, but their theory has not been explored in full generality. Here, such a theory is developed for the Virasoro algebra using rather elementary techniques. The focus centers on two different but related questions typically encountered in practical studies: How can one identify a given staggered module, and how can one demonstrate the existence of a proposed staggered module. Given just the values of the highest weights of the left and right modules, themselves subject to simple necessary conditions, invariants are defined which together with the knowledge of the left and right modules uniquely identify a staggered module. The possible values of these invariants form a vector space of dimension 0, 1, or 2, and the structures of the left and right modules limit the isomorphism classes of the corresponding staggered modules to an affine subspace (possibly empty). The number of invariants and affine restrictions is purely determined by the structures of the left and right modules. Moreover, in order to facilitate applications, the expressions for the invariants and restrictions are given by formulas as explicit as possible (they generally rely on expressions for Virasoro singular vectors). Finally, the text is liberally peppered throughout with examples illustrating the general concepts. These have been carefully chosen for their physical relevance or for the novel features they exhibit.

  15. On staggered indecomposable Virasoro modules

    Energy Technology Data Exchange (ETDEWEB)

    Kytoelae, Kalle [Geneve Univ. (Switzerland); Ridout, David [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2009-06-15

    In this article, certain indecomposable Virasoro modules are studied. Specifically, the Virasoro mode L0 is assumed to be non-diagonalisable, possessing Jordan blocks of rank two. Moreover, the module is further assumed to have a highest weight submodule, the ''left module'', and that the quotient by this submodule yields another highest weight module, the ''right module''. Such modules, which have been called staggered, have appeared repeatedly in the logarithmic conformal field theory literature, but their theory has not been explored in full generality. Here, such a theory is developed for the Virasoro algebra using rather elementary techniques. The focus centres on two different but related questions typically encountered in practical studies: How can one identify a given staggered module, and how can one demonstrate the existence of a proposed staggered module. Given just the values of the highest weights of the left and right modules, themselves subject to simple necessary conditions, invariants are defined which together with the knowledge of the left and right modules uniquely identify a staggered module. The possible values of these invariants form a vector space of dimension zero, one or two, and the structures of the left and right modules limit the isomorphism classes of the corresponding staggered modules to an affine subspace (possibly empty). The number of invariants and affine restrictions is purely determined by the structures of the left and right modules. Moreover, in order to facilitate applications, the expressions for the invariants and restrictions are given by formulae as explicit as possible (they generally rely on expressions for Virasoro singular vectors). Finally, the text is liberally peppered throughout with examples illustrating the general concepts. These have been carefully chosen for their physical relevance or for the novel features they exhibit. (orig.)

  16. Staggering towards a calculation of weak amplitudes

    Energy Technology Data Exchange (ETDEWEB)

    Sharpe, S.R.

    1988-09-01

    An explanation is given of the methods required to calculate hadronic matrix elements of the weak Hamiltonians using lattice QCD with staggered fermions. New results are presented for the 1-loop perturbative mixing of the weak interaction operators. New numerical techniques designed for staggered fermions are described. A preliminary result for the kaon B parameter is presented. 24 refs., 3 figs.

  17. Staggering towards a calculation of weak amplitudes

    International Nuclear Information System (INIS)

    Sharpe, S.R.

    1988-09-01

    An explanation is given of the methods required to calculate hadronic matrix elements of the weak Hamiltonians using lattice QCD with staggered fermions. New results are presented for the 1-loop perturbative mixing of the weak interaction operators. New numerical techniques designed for staggered fermions are described. A preliminary result for the kaon B parameter is presented. 24 refs., 3 figs

  18. Tool kit for staggered fermions

    International Nuclear Information System (INIS)

    Kilcup, G.W.; Sharpe, S.R.

    1986-01-01

    The symmetries of staggered fermions are analyzed both discrete and continuous. Tools are presented that allow a simple decomposition of representations of the continuum symmetries into representations of the discrete lattice symmetries, both at zero and non-zero spatial momenta. These tools are used to find the lattice transcriptions of the operators that appear in the weak interaction Hamiltonian. The lattice Ward Identities are derived that follow from the single partially conserved axial symmetry. Using these identities, the lattice equivalents of the continuum PCAC relations are found. Combining all these tools, Ward Identities are obtained, for the matrix elements of the weak interaction Hamiltonian, from which the behavior of the matrix elements as the pion and kaon masses vanish are derived. The same behavior as in the continuum is found

  19. Weak interaction matrix elements with staggered fermions

    International Nuclear Information System (INIS)

    Sharpe, S.R.

    1986-08-01

    An overview of the results of the Los Alamos Advanced Computing Group is given. The theory behind the measurement of Weak Interaction Matrix Elements using staggered fermions is presented, and contrasted with that for Wilson fermions. This is followed by a preliminary discussion of numerical results on a 12 3 x 30 lattice. 10 refs., 4 figs

  20. Kaon decay amplitudes using staggered fermions

    International Nuclear Information System (INIS)

    Sharpe, S.R.

    1986-12-01

    A status report is given of an attempt, using staggered fermions to calculate the real and imaginary parts of the amplitudes for K → ππ,. Semi-quantitative results are found for the imaginary parts, and these suggest that ε' might be smaller than previously expected in the standard model

  1. Fan Stagger Angle for Dirt Rejection

    Science.gov (United States)

    Gallagher, Edward J. (Inventor); Rose, Becky E. (Inventor); Brilliant, Lisa I. (Inventor)

    2015-01-01

    A gas turbine engine includes a spool, a turbine coupled to drive the spool, a propulsor coupled to be rotated about an axis by the turbine through the spool, and a gear assembly coupled between the propulsor and the spool such that rotation of the turbine drives the propulsor at a different speed than the spool. The propulsor includes a hub and a row of propulsor blades that extend from the hub. Each of the propulsor blades has a span between a root at the hub and a tip, and a chord between a leading edge and a trailing edge. The chord forms a stagger angle alpha with the axis, and the stagger angle alpha is less than 15 deg. at a position along the propulsor blade that is within an inboard 20% of the span.

  2. Staggered broad-band reflecting multilayers.

    Science.gov (United States)

    Heavens, O S; Liddell, H M

    1966-03-01

    Considerable broadening of the reflectance band of a multilayer stack may be obtained by staggering the layer thicknesses in such a way that they form either an arithmetic or geometric progression. Results are shown for asymmetric and symmetric filters of 15, 25, and 35 layers. The presence of the narrowband transmission peaks exhibited by the symmetric filters is explained, and the advantages of the use of this type of filter as an interference filter is discussed.

  3. Power module assemblies with staggered coolant channels

    Science.gov (United States)

    Herron, Nicholas Hayden; Mann, Brooks S; Korich, Mark D

    2013-07-16

    A manifold is provided for supporting a power module assembly with a plurality of power modules. The manifold includes a first manifold section. The first face of the first manifold section is configured to receive the first power module, and the second face of the first manifold section defines a first cavity with a first baseplate thermally coupled to the first power module. The first face of the second manifold section is configured to receive the second power module, and the second face of the second manifold section defines a second cavity with a second baseplate thermally coupled to the second power module. The second face of the first manifold section and the second face of the second manifold section are coupled together such that the first cavity and the second cavity form a coolant channel. The first cavity is at least partially staggered with respect to second cavity.

  4. Perturbative improvement of staggered fermions using fat links

    International Nuclear Information System (INIS)

    Lee, Weonjong

    2002-01-01

    We study the possibility of improving staggered fermions using various fat links in order to reduce perturbative corrections to the gauge-invariant staggered fermion operators. We prove five theorems on SU(3) projection, triviality in renormalization, multiple SU(3) projections, uniqueness, and equivalence. As a result of these theorems, we show that, at the one-loop level, the renormalization of staggered fermion operators is identical between SU(3) projected Fat7 links and hypercubic links, as long as the action and operators are constructed by imposing the same perturbative improvement condition. In addition, we propose a new view of SU(3) projection as a tool of tadpole improvement for the staggered fermion doublers. As a conclusion, we present alternative choices of constructing fat links to improve the staggered fermion action and operators, which deserve further investigation

  5. Heart Attack

    Science.gov (United States)

    Each year almost 800,000 Americans have a heart attack. A heart attack happens when blood flow to the heart suddenly ... it's important to know the symptoms of a heart attack and call 9-1-1 if you or ...

  6. Staggered Pairing Phenomenology for UBe_13

    Science.gov (United States)

    Martisovits, V.; Cox, D. L.

    1998-03-01

    The staggered-pairing Ginzburg-Landau phenomenology based upon Cooper pairs with a finite center-of-mass momentum was previously applied to the hexagonal heavy-fermion superconductors UPt_3,(R. Heid, Ya. B. Bazaliy, V. Martisovits, and D. L. Cox, Phys. Rev. Lett. 74), 2571 (1995). UPd_2Al_3, and UNi_2Al_3.(V. Martisovits and D. L. Cox (to be published); Report No. cond-mat/9706245.) Here we apply this phenomenology to study the cubic heavy-fermion superconductor UBe_13. We find the momentum of Cooper pairs to be at X points on the Brillouin-zone boundary and identify a three-component superconducting order parameter transforming as an X-point irreducible representation of the space group. Minimizing the free energy, we find possible superconducting phases and the upper critical field H_c2. We investigate coupling to strain fields and the possibility of magnetic order and charge-density waves induced by superconductivity. To explain multiple superconducting phases in the temperature-thorium-concentration phase diagram of U_1-xTh_xBe_13, we model the influence of thorium in terms of random tetragonal strain fields.

  7. Estimation of Parameters of CCF with Staggered Testing

    International Nuclear Information System (INIS)

    Kim, Myung-Ki; Hong, Sung-Yull

    2006-01-01

    Common cause failures are extremely important in reliability analysis and would be dominant to risk contributor in a high reliable system such as a nuclear power plant. Of particular concern is common cause failure (CCF) that degrades redundancy or diversity implemented to improve a reliability of systems. Most of analyses of parameters of CCF models such as beta factor model, alpha factor model, and MGL(Multiple Greek Letters) model deal a system with a nonstaggered testing strategy. Non-staggered testing is that all components are tested at the same time (or at least the same shift) and staggered testing is that if there is a failure in the first component, all the other components are tested immediately, and if it succeeds, no more is done until the next scheduled testing time. Both of them are applied in the nuclear power plants. The strategy, however, is not explicitly described in the technical specifications, but implicitly in the periodic test procedure. For example, some redundant components particularly important to safety are being tested with staggered testing strategy. Others are being performed with non-staggered testing strategy. This paper presents the parameter estimator of CCF model such as beta factor model, MGL model, and alpha factor model with staggered testing strategy. In addition, a new CCF model, rho factor model, is proposed and its parameter is presented with staggered testing strategy

  8. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  9. Heart Attack

    Science.gov (United States)

    ... pain Fatigue Heart attack Symptoms & causes Diagnosis & treatment Advertisement Mayo Clinic does not endorse companies or products. ... a Job Site Map About This Site Twitter Facebook Google YouTube Pinterest Mayo Clinic is a not- ...

  10. Heavy-light semileptonic decays in staggered chiral perturbation theory

    Science.gov (United States)

    Aubin, C.; Bernard, C.

    2007-07-01

    We calculate the form factors for the semileptonic decays of heavy-light pseudoscalar mesons in partially quenched staggered chiral perturbation theory (SχPT), working to leading order in 1/mQ, where mQ is the heavy-quark mass. We take the light meson in the final state to be a pseudoscalar corresponding to the exact chiral symmetry of staggered quarks. The treatment assumes the validity of the standard prescription for representing the staggered “fourth-root trick” within SχPT by insertions of factors of 1/4 for each sea-quark loop. Our calculation is based on an existing partially quenched continuum chiral perturbation theory calculation with degenerate sea quarks by Bećirević, Prelovsek, and Zupan, which we generalize to the staggered (and nondegenerate) case. As a byproduct, we obtain the continuum partially quenched results with nondegenerate sea quarks. We analyze the effects of nonleading chiral terms, and find a relation among the coefficients governing the analytic valence mass dependence at this order. Our results are useful in analyzing lattice computations of form factors B→π and D→K, when the light quarks are simulated with the staggered action.

  11. About Heart Attacks

    Science.gov (United States)

    ... Artery Disease Venous Thromboembolism Aortic Aneurysm More About Heart Attacks Updated:Jan 11,2018 A heart attack is ... coronary artery damage leads to a heart attack . Heart Attack Questions and Answers What is a heart attack? ...

  12. Heart Attack

    Science.gov (United States)

    ... Pressure, tightness, pain, or a squeezing or aching sensation in your chest or arms that may spread to your neck, jaw or back Nausea, indigestion, heartburn or abdominal pain Shortness of breath Cold sweat Fatigue Lightheadedness or sudden dizziness Heart attack ...

  13. Heart attack

    Science.gov (United States)

    ... part in support groups for people with heart disease . Outlook (Prognosis) After a heart attack, you have a higher ... P, Bonow RO, Braunwald E, eds. Braunwald's Heart Disease: A Textbook of Cardiovascular Medicine . 10th ed. Philadelphia, PA: Elsevier Saunders; 2014: ...

  14. Shark attack.

    Science.gov (United States)

    Guidera, K J; Ogden, J A; Highhouse, K; Pugh, L; Beatty, E

    1991-01-01

    Shark attacks are rare but devastating. This case had major injuries that included an open femoral fracture, massive hemorrhage, sciatic nerve laceration, and significant skin and muscle damage. The patient required 15 operative procedures, extensive physical therapy, and orthotic assistance. A review of the literature pertaining to shark bites is included.

  15. Reaction mechanisms and staggering in S+Ni collisions

    International Nuclear Information System (INIS)

    D'Agostino, M.; Bruno, M.; Gulminelli, F.; Morelli, L.; Baiocco, G.; Bardelli, L.; Barlini, S.; Cannata, F.; Casini, G.; Geraci, E.; Gramegna, F.; Kravchuk, V.L.; Marchi, T.; Moroni, A.; Ordine, A.; Raduta, Ad.R.

    2011-01-01

    The reactions 32 S+ 58 Ni and 32 S+ 64 Ni are studied at 14.5 A MeV. After a selection of the collision mechanism, we show that important even-odd effects are present in the isotopic fragment distributions when the excitation energy is small. Close to the multifragmentation threshold this staggering appears hidden by the rapid variation of the production yields with the fragment size. Once this effect is accounted for, the staggering appears to be a universal feature of fragment production, slightly enhanced when the emission source is neutron poor. A closer look at the behavior of the production yields as a function of the neutron excess N-Z, reveals that odd-even effects cannot be explained by pairing effects in the nuclear masses alone, but depend in a more complex way on the de-excitation chain.

  16. LES investigation of infinite staggered wind-turbine arrays

    International Nuclear Information System (INIS)

    Yang, Xiaolei; Sotiropoulos, Fotis

    2014-01-01

    The layouts of turbines affect the turbine wake interactions and thus the wind farm performance. The wake interactions in infinite staggered wind-turbine arrays are investigated and compared with infinite aligned turbine arrays in this paper. From the numerical results we identify three types of wake behaviours, which are significantly different from wakes in aligned wind-turbine arrays. For the first type, each turbine wake interferes with the pair of staggered downstream turbine wakes and the aligned downstream turbine. For the second type, each turbine wake interacts with the first two downstream turbine wakes but does not show significant interference with the second aligned downstream turbine. For the third type, each turbine wake recovers immediately after passing through the gap of the first two downstream turbines and has little interaction with the second downstream turbine wakes The extracted power density and power efficiency are also studied and compared with aligned wind-turbine arrays

  17. MILC staggered conjugate gradient performance on Intel KNL

    Energy Technology Data Exchange (ETDEWEB)

    Li, Ruiz [Indiana Univ., Bloomington, IN (United States). Dept. of Physics; Detar, Carleton [Univ. of Utah, Salt Lake City, UT (United States). Dept. of Physics and Astronomy; Doerfler, Douglas W. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC); Gottlieb, Steven [Indiana Univ., Bloomington, IN (United States). Dept. of Physics; Jha, Asish [Intel Corp., Hillsboro, OR (United States). Sofware and Services Group; Kalamkar, Dhiraj [Intel Labs., Bangalore (India). Parallel Computing Lab.; Toussaint, Doug [Univ. of Arizona, Tucson, AZ (United States). Physics Dept.

    2016-11-03

    We review our work done to optimize the staggered conjugate gradient (CG) algorithm in the MILC code for use with the Intel Knights Landing (KNL) architecture. KNL is the second gener- ation Intel Xeon Phi processor. It is capable of massive thread parallelism, data parallelism, and high on-board memory bandwidth and is being adopted in supercomputing centers for scientific research. The CG solver consumes the majority of time in production running, so we have spent most of our effort on it. We compare performance of an MPI+OpenMP baseline version of the MILC code with a version incorporating the QPhiX staggered CG solver, for both one-node and multi-node runs.

  18. An interpretation of staggering effects by correlation observables

    Directory of Open Access Journals (Sweden)

    Baiocco G.

    2012-07-01

    Full Text Available The reactions 32S+58,64Ni are studied at 14.5 A MeV. Evidence is found for odd-even effects in isotopic observables of the decay of a projectile-like source. The influence of secondary decays on the staggering is studied with a correlation function technique, showing that odd-even effects are due to interplay between pairing effects in the nuclear masses and in the level densities.

  19. An optimal staggered harvesting strategy for herbaceous biomass energy crops

    Energy Technology Data Exchange (ETDEWEB)

    Bhat, M.G.; English, B.C. [Univ. of Tennessee, Knoxville, TN (United States)

    1993-12-31

    Biofuel research over the past two decades indicates lignocellulosic crops are a reliable source of feedstock for alternative energy. However, under the current technology of producing, harvesting and converting biomass crops, the cost of biofuel is not competitive with conventional biofuel. Cost of harvesting biomass feedstock is a single largest component of feedstock cost so there is a cost advantage in designing a biomass harvesting system. Traditional farmer-initiated harvesting operation causes over investment. This study develops a least-cost, time-distributed (staggered) harvesting system for example switch grass, that calls for an effective coordination between farmers, processing plant and a single third-party custom harvester. A linear programming model explicitly accounts for the trade-off between yield loss and benefit of reduced machinery overhead cost, associated with the staggered harvesting system. Total cost of producing and harvesting switch grass will decline by 17.94 percent from conventional non-staggered to proposed staggered harvesting strategy. Harvesting machinery cost alone experiences a significant reduction of 39.68 percent from moving from former to latter. The net return to farmers is estimated to increase by 160.40 percent. Per tonne and per hectare costs of feedstock production will decline by 17.94 percent and 24.78 percent, respectively. These results clearly lend support to the view that the traditional system of single period harvesting calls for over investment on agricultural machinery which escalates the feedstock cost. This social loss to the society in the form of escalated harvesting cost can be avoided if there is a proper coordination among farmers, processing plant and custom harvesters as to when and how biomass crop needs to be planted and harvested. Such an institutional arrangement benefits producers, processing plant and, in turn, end users of biofuels.

  20. Optimization of the Single Staggered Wire and Tube Heat Exchanger

    Directory of Open Access Journals (Sweden)

    Arsana I Made

    2016-01-01

    Full Text Available Wire and tube heat exchanger consists of a coiled tube, and wire is welded on the two sides of it in normal direction of the tube. Generally,wire and tube heat exchanger uses inline wire arrangement between the two sides, whereas in this study, it used staggered wire arrangement that reduces the restriction of convection heat transfer. This study performed the optimization of single staggered wire and tube heat exchanger to increase the capacity and reduce the mass of the heat exchanger. Optimization was conducted with the Hooke-Jeeves method, which aims to optimize the geometry of the heat exchanger, especially on the diameter (dw and the distance between wires (pw. The model developed to present heat transfer correlations on single staggered wire and tube heat exchanger was valid. The maximum optimization factor obtained when the diameter wire was 0.9 mm and the distance between wires (pw was 11 mm with the fref value = 1.5837. It means that the optimized design only using mass of 59,10 % and could transfer heat about 98,5 % from the basis design.

  1. Towards an understanding of staggering effects in dissipative binary collisions

    International Nuclear Information System (INIS)

    D'Agostino, M.; Bruno, M.; Gulminelli, F.; Morelli, L.; Baiocco, G.; Bardelli, L.; Barlini, S.; Cannata, F.; Casini, G.; Geraci, E.; Gramegna, F.; Kravchuk, V.L.; Marchi, T.; Moroni, A.; Ordine, A.; Raduta, Ad.R.

    2012-01-01

    The reactions 32 S+ 58,64 Ni are studied at 14.5 A MeV. Evidence is found for important odd–even effects in isotopic observables of selected peripheral collisions corresponding to the decay of a projectile-like source. The influence of secondary decays on the staggering is studied with a correlation function technique. It is shown that this method is a powerful tool to get experimental information on the evaporation chain, in order to constrain model calculations. Specifically, we show that odd–even effects are due to interplay between pairing effects in the nuclear masses and in the level densities.

  2. Improving the quark number susceptibilities for staggered fermions

    International Nuclear Information System (INIS)

    Gavai, Rajiv V.

    2003-01-01

    Quark number susceptibilities approach their ideal gas limit at sufficiently high temperatures. As in the case of other thermodynamic quantities, this limit itself is altered substantially on lattices with small temporal extent, N t = 4-8, making it thus difficult to check the validity of perturbation theory. Unlike other observables, improving susceptibilities or number densities is subject to constraints of current conservation and absence of chemical potential (μ) dependent divergences. We construct such an improved number density and susceptibility for staggered fermions and show that they approximate the continuum ideal gas limit better on small temporal lattices

  3. XFEM Modelling of Multi-holes Plate with Single-row and Staggered Holes Configurations

    Directory of Open Access Journals (Sweden)

    Supar Khairi

    2017-01-01

    Full Text Available Joint efficiency is the key to composite structures assembly design, good structures response is dependent upon multi-holes behavior as subjected to remote loading. Current benchmarking work were following experimental testing series taken from literature on multi-holes problem. Eleven multi-hole configurations were investigated with various pitch and gage distance of staggered holes and non-staggered holes (single-row holes. Various failure modes were exhibited, most staggered holes demonstrates staggered crack path but non-staggered holes series displayed crack path along net-section plane. Stress distribution were carried out and good agreement were exhibited in experimental observation as reported in the respective literature. Consequently, strength prediction work were carried out under quasi-static loading, most showed discrepancy between 8% -31%, better prediction were exhibited in thicker and non-staggered holes plate combinations.

  4. An experimental study on the effect of wind load around tall towers of square and hexagonal shapes in staggered form

    Science.gov (United States)

    Anwar, Proma; Islam, Md. Quamrul; Ali, Mohammad

    2017-06-01

    In this research work an experiment is conducted to observe the effect of wind load around square and hexagonal shaped cylinders in staggered form. The experiment is performed in an open circuit wind tunnel at a Reynolds number of 4.23×104 based on the face width of the cylinder across the flow direction. The flow velocity has been kept uniform at 14.3 m/s throughout the experiment. The test is conducted for single cylinders first and then in staggered form. The cylinders are rotated to create different angles of attack and the angles are chosen at a definite interval. The static pressure readings are taken at different locations of the cylinder by inclined multi-manometers. From the surface static pressure readings pressure coefficients, drag coefficients and lift coefficients are calculated using numerical integration method. These results will surely help engineers to design buildings more stable against wind load. All the results are expressed in non-dimensional form, so that they can be applied for prototype structures.

  5. Global phenomenological descriptions of nuclear odd-even mass staggering

    DEFF Research Database (Denmark)

    Hove, Dennis; Jensen, Aksel Stenholm; Riisager, Karsten

    2013-01-01

    We examine the general nature of nuclear odd-even mass differences by employing neutron and proton mass relations that emphasize these effects. The most recent mass tables are used. The possibility of a neutron excess dependence of the staggering is examined in detail in separate regions defined ...... into a global phenomenological expression, ready to use in a binding energy formula. The results deviate from previous parametrizations, and in particular found to be significantly superior to a recent two term, A−1 dependence.......We examine the general nature of nuclear odd-even mass differences by employing neutron and proton mass relations that emphasize these effects. The most recent mass tables are used. The possibility of a neutron excess dependence of the staggering is examined in detail in separate regions defined...... by the main nuclear shells, and a clear change in this dependency is found at Z=50 for both neutrons and protons. A further separation into odd and even neutron (proton) number produces very accurate local descriptions of the mass differences for each type of nucleons. These odd-even effects are combined...

  6. ΔI = 2 Nuclear Staggering in Superdeformed Rotational Bands

    Directory of Open Access Journals (Sweden)

    Okasha M. D.

    2014-01-01

    Full Text Available A four parameters model including collective rotational en ergies to fourth order is ap- plied to reproduce the ∆ I = 2 staggering in transition energies in four selected super deformed rotational bands, namely, 148 Gd (SD6, 194 Hg (SD1, SD2, SD3. The model parameters and the spin of the bandhead have been extracted a ssuming various val- ues to the lowest spin of the bandhead at nearest integer, in o rder to obtain a minimum root mean square deviation between calculated and the exper imental transition energies. This allows us to suggest the spin values for the energy level s which are experimentally unknown. For each band a staggering parameter represent the deviation of the transition energies from a smooth reference has been determined by calc ulating the fourth order derivative of the transition energies at a given spin. The st aggering parameter contains five consecutive transition energies which is denoted here a s the five-point formula. In order to get information about the dynamical moment of ine rtia, the two point for- mula which contains only two consecutive transition energi es has been also considered. The dynamical moment of inertia decreasing with increasing rotational frequency for A ∼ 150, while increasing for A ∼ 190 mass regions.

  7. Staggered and short-period solutions of the saturable discrete nonlinear Schrodinger equation

    DEFF Research Database (Denmark)

    Khare, A.; Rasmussen, K.O.; Samuelsen, Mogens Rugholm

    2009-01-01

    We point out that the nonlinear Schrodinger lattice with a saturable nonlinearity also admits staggered periodic aswell as localized pulse-like solutions. Further, the same model also admits solutions with a short period. We examine the stability of these solutions and find that the staggered...

  8. Lowrank seismic-wave extrapolation on a staggered grid

    KAUST Repository

    Fang, Gang

    2014-05-01

    © 2014 Society of Exploration Geophysicists. We evaluated a new spectral method and a new finite-difference (FD) method for seismic-wave extrapolation in time. Using staggered temporal and spatial grids, we derived a wave-extrapolation operator using a lowrank decomposition for a first-order system of wave equations and designed the corresponding FD scheme. The proposed methods extend previously proposed lowrank and lowrank FD wave extrapolation methods from the cases of constant density to those of variable density. Dispersion analysis demonstrated that the proposed methods have high accuracy for a wide wavenumber range and significantly reduce the numerical dispersion. The method of manufactured solutions coupled with mesh refinement was used to verify each method and to compare numerical errors. Tests on 2D synthetic examples demonstrated that the proposed method is highly accurate and stable. The proposed methods can be used for seismic modeling or reverse-time migration.

  9. Pericarditis - after heart attack

    Science.gov (United States)

    ... medlineplus.gov/ency/article/000166.htm Pericarditis - after heart attack To use the sharing features on this page, ... occur in the days or weeks following a heart attack . Causes Two types of pericarditis can occur after ...

  10. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle becomes ...

  11. Social engineering attack framework

    CSIR Research Space (South Africa)

    Mouton, F

    2014-07-01

    Full Text Available link. A social engineering attack targets this weakness by; using various manipulation techniques in order to elicit sensitive; information. The field of social engineering is still in its infancy; stages with regards to formal definitions and attack...

  12. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  13. Solidarity under Attack

    DEFF Research Database (Denmark)

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  14. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... Ischemic Attack TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an artery for a short time. The only difference between a stroke ...

  15. Spontaneous emission spectra from a staggered-array undulator

    International Nuclear Information System (INIS)

    Shimada, Shigeki; Okada, Kouji; Masuda, Kai; Sobajima, Masaaki; Yoshikawa, Kiyoshi; Ohnishi, Masami; Yamamoto, Yasushi; Toku, Hisayuki

    1997-01-01

    A staggered-array undulator set inside the superconducting solenoid coils is shown to be able to provide high undulator fields larger than the longitudinal magnetic fields, a small undulator period, easy tunability through the solenoid coil current, and compact and easy fabrication. The overall performance characteristics of this undulator were studied mainly with respect to iron and aluminum disk widths, and spontaneous emission spectra through the numerical calculations. The maximum undulator field is found to be obtained for the ratio of the aluminum disk width to the undulator period of 0.45. The line widths (FWHM) of the spontaneous emission spectra, however, do not show N w -1 dependence on the number of the undulator period N w for practical beams with a Gaussian distribution, compared with for a single electron. The energy spread among various parameters is seen to play an important role in reducing the FWHM with increase of N w . The large tunability of the wavelength is proved to cover 6-10 mm by changing the solenoid magnetic field from 0.4 T to 1.6 T. (author)

  16. X-ray imaging bilinear staggered GaAs detectors

    Energy Technology Data Exchange (ETDEWEB)

    Achmadullin, R.A.; Dvoryankin, V.F. E-mail: vfd217@ire216.msk.su; Dvoryankina, G.G.; Dikaev, Y.M.Yu.M.; Krikunov, A.I.; Kudryashov, A.A.; Panova, T.M.; Petrov, A.G.; Telegin, A.A

    2004-09-21

    The multichannel bilinear X-ray detector based on epitaxial GaAs structures is developed to obtain a digital X-ray image. Each detector operates in photovoltaic mode without reverse bias that enables almost complete elimination of detector noise arising due to leakage currents. The sensitivity range of the epitaxial GaAs photovoltaic X-ray detector covers the effective energies from 8 to 120 keV. A maximum response of the detector operating in the short-circuit mode was observed at an energy of 35 keV and amounted to 30 {mu}A min/(Gy cm{sup 2}). The multichannel detector was made of 1024 pixels with pitch of 0.8 mm. The spatial resolution of double staggered sensor row is twice as high as the resolution of that of single sensor row with the same pitch. Measured spatial resolution is 1.2 line-pairs/mm, contrast sensitivity not worse 1% and dynamic range defined as the ratio of maximum detectable X-ray signal to electronic noise level more than 2000 are received.

  17. X-ray imaging bilinear staggered GaAs detectors

    International Nuclear Information System (INIS)

    Achmadullin, R.A.; Dvoryankin, V.F.; Dvoryankina, G.G.; Dikaev, Y.M.Yu.M.; Krikunov, A.I.; Kudryashov, A.A.; Panova, T.M.; Petrov, A.G.; Telegin, A.A.

    2004-01-01

    The multichannel bilinear X-ray detector based on epitaxial GaAs structures is developed to obtain a digital X-ray image. Each detector operates in photovoltaic mode without reverse bias that enables almost complete elimination of detector noise arising due to leakage currents. The sensitivity range of the epitaxial GaAs photovoltaic X-ray detector covers the effective energies from 8 to 120 keV. A maximum response of the detector operating in the short-circuit mode was observed at an energy of 35 keV and amounted to 30 μA min/(Gy cm 2 ). The multichannel detector was made of 1024 pixels with pitch of 0.8 mm. The spatial resolution of double staggered sensor row is twice as high as the resolution of that of single sensor row with the same pitch. Measured spatial resolution is 1.2 line-pairs/mm, contrast sensitivity not worse 1% and dynamic range defined as the ratio of maximum detectable X-ray signal to electronic noise level more than 2000 are received

  18. High temperature QCD with three flavors of improved staggered quarks

    International Nuclear Information System (INIS)

    Bernard, C.; Burch, T.; Tar, C.E. de; Gottlieb, Steven; Gregory, Eric; Heller, U.M.; Osborn, J.; Sugar, R.L.; Toussaint, D.

    2003-01-01

    We present an update of our study of high temperature QCD with three flavors of quarks, using a Symanzik improved gauge action and the Asqtad staggered quark action. Simulations are being carried out on lattices with N t = 4, 6 and 8 for the case of three degenerate quarks with masses less than or equal to the strange quark mass, m s and on lattices with N t = 6 and 8 for degenerate up and down quarks with masses in the range 0.2m s ≤ m u,d ≤ 0.6m s and the strange quark fixed near its physical value. We also report on first computations of quark number susceptibilities with the Asqtad action. These susceptibilities are of interest because they can be related to event-by-event fluctuations in heavy ion collision experiments. Use of the improved quark action leads to a substantial reduction in lattice artifacts. This can be seen already for free fermions and carries over into our results for QCD

  19. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  20. Systematics of the K suppi = 2+ gamma vibrational bands and odd-even staggering

    CERN Document Server

    Gupta, J B

    2003-01-01

    The structure of the K suppi = 2+ gamma vibrational bands and the quasi-gamma bands of even-Z-even-N nuclei is investigated on a global scale, vis-a-vis the variation of band head, the moment of inertia of the band and the odd-even spin staggering. The variation with N and Z and with spin J of the odd-even spin energy staggering index is studied and a unified view of the same is presented. (author)

  1. Two-color lattice QCD with staggered quarks

    Energy Technology Data Exchange (ETDEWEB)

    Scheffler, David

    2015-07-20

    The study of quantum chromodynamics (QCD) at finite temperature and density provides important contributions to the understanding of strong-interaction matter as it is present e.g. in nuclear matter and in neutron stars or as produced in heavy-ion collision experiments. Lattice QCD is a non-perturbative approach, where equations of motion for quarks and gluons are discretized on a finite space-time lattice. The method successfully describes the behavior of QCD in the vacuum and at finite temperature, however it cannot be applied to finite baryon density due to the fermion sign problem. Various QCD-like theories, that offer to draw conclusions about QCD, allow simulations also at finite densities. In this work we investigate two-color QCD as a popular example of a QCD-like theory free from the sign problem with methods from lattice gauge theory. For the generation of gauge configurations with two dynamical quark flavors in the staggered formalism with the ''rooting trick'' we apply the Rational Hybrid Monte Carlo (RHMC) algorithm. We carry out essential preparatory work for future simulations at finite density. As a start, we concentrate on the calculation of the effective potential for the Polyakov loop, which is an order parameter for the confinement-deconfinement transition, in dependence of the temperature and quark mass. It serves as an important input for effective models of QCD. We obtain the effective potential via the histogram method from local distributions of the Polyakov loop. To study the influence of dynamical quarks on gluonic observables, the simulations are performed with large quark masses and are compared to calculations in the pure gauge theory. In the second part of the thesis we examine aspects of the chiral phase transition along the temperature axis. The symmetry group of chiral symmetry in two-color QCD is enlarged to SU(2N{sub f}). Discretized two-color QCD in the staggered formalism exhibits a chiral symmetry breaking

  2. The Nucleon Axial Form Factor and Staggered Lattice QCD

    Energy Technology Data Exchange (ETDEWEB)

    Meyer, Aaron Scott [Chicago U.

    2017-01-01

    The study of neutrino oscillation physics is a major research goal of the worldwide particle physics program over the upcoming decade. Many new experiments are being built to study the properties of neutrinos and to answer questions about the phenomenon of neutrino oscillation. These experiments need precise theoretical cross sections in order to access fundamental neutrino properties. Neutrino oscillation experiments often use large atomic nuclei as scattering targets, which are challenging for theorists to model. Nuclear models rely on free-nucleon amplitudes as inputs. These amplitudes are constrained by scattering experiments with large nuclear targets that rely on the very same nuclear models. The work in this dissertation is the rst step of a new initiative to isolate and compute elementary amplitudes with theoretical calculations to support the neutrino oscillation experimental program. Here, the eort focuses on computing the axial form factor, which is the largest contributor of systematic error in the primary signal measurement process for neutrino oscillation studies, quasielastic scattering. Two approaches are taken. First, neutrino scattering data on a deuterium target are reanalyzed with a model-independent parametrization of the axial form factor to quantify the present uncertainty in the free-nucleon amplitudes. The uncertainties on the free-nucleon cross section are found to be underestimated by about an order of magnitude compared to the ubiquitous dipole model parametrization. The second approach uses lattice QCD to perform a rst-principles computation of the nucleon axial form factor. The Highly Improved Staggered Quark (HISQ) action is employed for both valence and sea quarks. The results presented in this dissertation are computed at physical pion mass for one lattice spacing. This work presents a computation of the axial form factor at zero momentum transfer, and forms the basis for a computation of the axial form factor momentum dependence

  3. What Is a Heart Attack?

    Science.gov (United States)

    ... Research Home / Heart Attack Heart Attack Also known as Myocardial infarction Leer en español ... or years after the procedure. Other Treatments for Heart Attack Other treatments for heart attack include: Medicines Medical ...

  4. Kleptographic Attacks on ECDSA

    Directory of Open Access Journals (Sweden)

    Nadezhda Anatolievna Chepick

    2014-12-01

    Full Text Available This paper presents secretly trapdoor with universal protection (SETUP attacks on the elliptic curve digital signature algorithm ECDSA. It allows a malicious manufacturer of black-box cryptosystems to implement these attacks to get access to user’s private key. The attacker can obtain user’s private key. The way ECDSA can be used for encryption and key exchange is also described.

  5. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  6. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  7. Plants under dual attack

    NARCIS (Netherlands)

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses such

  8. Heart attack - discharge

    Science.gov (United States)

    ... and lifestyle Cholesterol - drug treatment Controlling your high blood pressure Deep vein thrombosis - discharge Dietary fats explained Fast food tips Heart attack - discharge Heart attack - what to ask your doctor Heart bypass ... pacemaker - discharge High blood pressure - what to ask your doctor How to read ...

  9. Numerical properties of staggered quarks with a taste-dependent mass term

    CERN Document Server

    de Forcrand, Philippe; Panero, Marco

    2012-01-01

    The numerical properties of staggered Dirac operators with a taste-dependent mass term proposed by Adams [1,2] and by Hoelbling [3] are compared with those of ordinary staggered and Wilson Dirac operators. In the free limit and on (quenched) interacting configurations, we consider their topological properties, their spectrum, and the resulting pion mass. Although we also consider the spectral structure, topological properties, locality, and computational cost of an overlap operator with a staggered kernel, we call attention to the possibility of using the Adams and Hoelbling operators without the overlap construction. In particular, the Hoelbling operator could be used to simulate two degenerate flavors without additive mass renormalization, and thus without fine-tuning in the chiral limit.

  10. Gap states and edge properties of rectangular graphene quantum dot in staggered potential

    Science.gov (United States)

    Jeong, Y. H.; Eric Yang, S.-R.

    2017-09-01

    We investigate edge properties of a gapful rectangular graphene quantum dot in a staggered potential. In such a system gap states with discrete and closely spaced energy levels exist that are spatially located on the left or right zigzag edge. We find that, although the bulk states outside the energy gap are nearly unaffected, spin degeneracy of each gap state is lifted by the staggered potential. We have computed the occupation numbers of spin-up and -down gap states at various values of the strength of the staggered potential. The electronic and magnetic properties of the zigzag edges depend sensitively on these numbers. We discuss the possibility of applying this system as a single electron spintronic device.

  11. Single-molecule observation of helix staggering, sliding, and coiled coil misfolding

    Science.gov (United States)

    Xi, Zhiqun; Gao, Ying; Sirinakis, George; Guo, Honglian; Zhang, Yongli

    2012-01-01

    The biological functions of coiled coils generally depend on efficient folding and perfect pairing of their α-helices. Dynamic changes in the helical registry that lead to staggered helices have only been proposed for a few special systems and not found in generic coiled coils. Here, we report our observations of multiple staggered helical structures of two canonical coiled coils. The partially folded structures are formed predominantly by coiled coil misfolding and occasionally by helix sliding. Using high-resolution optical tweezers, we characterized their energies and transition kinetics at a single-molecule level. The staggered states occur less than 2% of the time and about 0.1% of the time at zero force. We conclude that dynamic changes in helical registry may be a general property of coiled coils. Our findings should have broad and unique implications in functions and dysfunctions of proteins containing coiled coils. PMID:22451899

  12. Ergovaline does not alter the severity of ryegrass staggers induced by lolitrem B.

    Science.gov (United States)

    Finch, S C; Vlaming, J B; Sutherland, B L; van Koten, C; Mace, W J; Fletcher, L R

    2018-03-01

    To investigate a possible interaction between lolitrem B and ergovaline by comparing the incidence and severity of ryegrass staggers in sheep grazing ryegrass (Lolium perenne) containing lolitrem B or ryegrass containing both lolitrem B and ergovaline. Ninety lambs, aged approximately 6 months, were grazed on plots of perennial ryegrass infected with either AR98 endophyte (containing lolitrem B), standard endophyte (containing lolitrem B and ergovaline) or no endophyte, for up to 42 days from 2 February 2010. Ten lambs were grazed on three replicate plots per cultivar. Herbage samples were collected for alkaloid analysis and lambs were scored for ryegrass staggers (scores from 0-5) weekly during the study. Any animal which was scored ≥4 was removed from the study. Concentrations of lolitrem B did not differ between AR98 and standard endophyte-infected pastures during the study period (p=0.26), and ergovaline was present only in standard endophyte pastures. Ryegrass staggers was observed in sheep grazing both the AR98 and standard endophyte plots, with median scores increasing in the third week of the study. Prior to the end of the 42-day grazing period, 22 and 17 animals were removed from the standard endophyte and AR98 plots, respectively, because their staggers scores were ≥4. The cumulative probability of lambs having scores ≥4 did not differ between animals grazing the two pasture types (p=0.41). There was no evidence for ergovaline increasing the severity of ryegrass staggers induced by lolitrem B. In situations where the severity of ryegrass staggers appears to be greater than that predicted on the basis of concentrations of lolitrem B, the presence of other tremorgenic alkaloids should be investigated.

  13. Horizontally staggered lightguide solar concentrator with lateral displacement tracking for high concentration applications.

    Science.gov (United States)

    Ma, Hongcai; Wu, Lin

    2015-07-10

    We present the design of a horizontally staggered lightguide solar concentrator with lateral displacement tracking for high concentration applications. This solar concentrator consists of an array of telecentric primary concentrators, a horizontally staggered lightguide layer, and a vertically tapered lightguide layer. The primary concentrator is realized by two plano-aspheric lenses with lateral movement and maintains a high F-number over an angle range of ±23.5°. The results of the simulations show that the solar concentrator achieves a high concentration ratio of 500× with ±0.5° of acceptance angle by a single-axis tracker and dual lateral translation stages.

  14. Nocturnal panic attacks

    Directory of Open Access Journals (Sweden)

    Lopes Fabiana L.

    2002-01-01

    Full Text Available The panic-respiration connection has been presented with increasing evidences in the literature. We report three panic disorder patients with nocturnal panic attacks with prominent respiratory symptoms, the overlapping of the symptoms with the sleep apnea syndrome and a change of the diurnal panic attacks, from spontaneous to situational pattern. The implication of these findings and awareness to the distinct core of the nocturnal panic attacks symptoms may help to differentiate them from sleep disorders and the search for specific treatment.

  15. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  16. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  17. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  18. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an ... a short time. The only difference between a stroke and TIA is that with TIA the blockage ...

  19. Facial Dog Attack Injuries

    OpenAIRE

    Lin, Wei; Patil, Pavan Manohar

    2013-01-01

    The exposed position of the face makes it vulnerable to dog bite injuries. This fact combined with the short stature of children makes them a high-risk group for such attacks. In contrast to wounds inflicted by assaults and accidents, dog bite wounds are deep puncture type wounds compounded by the presence of pathologic bacteria from the saliva of the attacking dog. This, combined with the presence of crushed, devitalized tissue makes these wounds highly susceptible to infection. Key to succe...

  20. A superlinearly convergent finite volume method for the incompressible Navier-Stokes equations on staggered unstructured grids

    International Nuclear Information System (INIS)

    Vidovic, D.; Segal, A.; Wesseling, P.

    2004-01-01

    A method for linear reconstruction of staggered vector fields with special treatment of the divergence is presented. An upwind-biased finite volume scheme for solving the unsteady incompressible Navier-Stokes equations on staggered unstructured triangular grids that uses this reconstruction is described. The scheme is applied to three benchmark problems and is found to be superlinearly convergent in space

  1. Weakly coupled S=1/2 quantum Heisenberg antiferromagnetic chains in an effective staggered field

    International Nuclear Information System (INIS)

    Sato, Masahiro; Oshikawa, Masaki

    2002-01-01

    We study weakly coupled S=1/2 quantum Heisenberg antiferromagnetic chains in an effective staggered field. Applying mean-field (MF) theory, spin-wave theory and chain MF (CMF) theory, we can see analytically some effects of the staggered field in this higher dimensional spin system. In particular, when the staggered field and the inter-chain inter-action compete with each other, we conjecture from the MF theory that a nontrivial phase is present. The spin wave theory predicts that the behavior of the gaps induced by a staggered field is different between the competitive case and the non-competitive case. When the inter-chain interactions are weak enough, we can improve the MF phase diagram by using CMF theory and the analytical results of field theories. The ordered phase region predicted by the CMF theory is fairly smaller than one of the MF theory. Cu-benzoate, CuCl 2 · 2DMSO (dimethylsulphoxide), BaCu 2 (Si 1-x Ge x ) 2 O 7 , etc., could be described by our model in enough low temperature. (author)

  2. Kinetics of full scrum and staggered scrum engagement in under 19 ...

    African Journals Online (AJOL)

    Two hundred and eight male Rugby Union players from 13 high schools, whose ages ranged from 16 to 19 years, were used to examine the kinetics of the full scrum versus staggered scrum engagement techniques. Telemetric pressure transducers were used to measure the engagement and sustained forces acting on the ...

  3. Enhancement of Radiative Efficiency with Staggered InGaN Quantum Well Light Emitting Diodes

    Energy Technology Data Exchange (ETDEWEB)

    Tansu, Nelson; Dierolf, Volkmar; Huang, Gensheng; Penn, Samson; Zhao, Hongping; Liu, Guangyu; Li, Xiaohang; Poplawsky, Jonathan

    2011-07-14

    The technology on the large overlap InGaN QWs developed in this program is currently implemented in commercial technology in enhancing the internal quantum efficiency in major LED industry in US and Asia. The scientific finding from this work supported by the DOE enabled the implementation of this step-like staggered quantum well in the commercial LEDs.

  4. The use of staggered scheme and an absorbing buffer zone for computational aeroacoustics

    Science.gov (United States)

    Nark, Douglas M.

    1995-01-01

    Various problems from those proposed for the Computational Aeroacoustics (CAA) workshop were studied using second and fourth order staggered spatial discretizations in conjunction with fourth order Runge-Kutta time integration. In addition, an absorbing buffer zone was used at the outflow boundaries. Promising results were obtained and provide a basis for application of these techniques to a wider variety of problems.

  5. Experimental study of induced staggered magnetic fields in dysprosium gallium garnet (DGG)

    International Nuclear Information System (INIS)

    Steiner, M.; Corliss, L.M.; Hastings, J.M.; Blume, M.; Giordano, N.; Wolf, W.P.

    1979-01-01

    Neutron diffraction techniques have been used to study induced staggered magnetic field effects in DGG. The application of a uniform magnetic field at temperatures much greater than the Neel temperature induces a significant amount of antiferromagnetic order. The temperature and field dependences of this effect are in good agreement with recent theoretical predicions

  6. Partial dynamical symmetry and odd-even staggering in deformed nuclei

    Directory of Open Access Journals (Sweden)

    Leviatan A.

    2015-01-01

    Full Text Available Partial dynamical symmetry (PDS is shown to be relevant for describing the odd-even staggering in the γ-band of 156Gd while retaining solvability and good SU(3 symmetry for the ground and β bands. Several classes of interacting boson model Hamiltonians with SU(3 PDS are surveyed.

  7. Remarks on the determination of the odd--even staggering parameter in the spectrum of cadmium

    International Nuclear Information System (INIS)

    Gerstenkorn, S.; Stroke, H.H.

    1976-01-01

    From an analysis of the isotope shifts in the Cd 3261, 4678, and 4416 A lines, it is pointed out that a precise determination of the odd--even staggering parameter is limited less by experimental error than by the lack of reliable knowledge of the specific mass effect

  8. A study of manufacturing tubes with nano/ultrafine grain structure by stagger spinning

    International Nuclear Information System (INIS)

    Xia, Qinxiang; Xiao, Gangfeng; Long, Hui; Cheng, Xiuquan; Yang, Baojian

    2014-01-01

    Highlights: • Proposing a method of manufacturing tubes with nano/ultrafine crystal. • Obtaining the refined ferritic grains with an size of 500 nm after stagger spinning. • Obtaining the equiaxial ferritic grains with an size of 600 nm after annealing. - Abstract: A new method of manufacturing tubes with nano/ultrafine grain structure by stagger spinning and recrystallization annealing is proposed in this study. Two methods of the stagger spinning process are developed, the corresponding macroforming quality, microstructural evolution and mechanical properties of the spun tubes made of ASTM 1020 steel are analysed. The results reveal that a good surface smoothness and an improved spin-formability of spun parts can be obtained by the process combining of 3-pass spinning followed by a 580 °C × 0.5 h static recrystallization and 2-pass spinning with a 580 °C × 1 h static recrystallization annealing under the severe thinning ratio of wall thickness reduction. The ferritic grains with an average initial size of 50 μm are refined to 500 nm after stagger spinning under the 87% thinning ratio of wall thickness reduction. The equiaxial ferritic grains with an average size of 600 nm are generated through re-nucleation and grain growth by subsequent recrystallization annealing at 580 °C for 1 h heat preservation. The tensile strength of spun tubes has been founded to be proportional to the reciprocal of layer spacing of pearlite (LSP), and the elongation is inversely proportional to the reciprocal of LSP. This study shows that the developed method of stagger power spinning has the potential to be used to manufacture bulk metal components with nano/ultrafine grain structure

  9. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  10. Collaborative Attack vs. Collaborative Defense

    Science.gov (United States)

    Xu, Shouhuai

    We have witnessed many attacks in the cyberspace. However, most attacks are launched by individual attackers even though an attack may involve many compromised computers. In this paper, we envision what we believe to be the next generation cyber attacks — collaborative attacks. Collaborative attacks can be launched by multiple attackers (i.e., human attackers or criminal organizations), each of which may have some specialized expertise. This is possible because cyber attacks can become very sophisticated and specialization of attack expertise naturally becomes relevant. To counter collaborative attacks, we might need collaborative defense because each “chain” in a collaborative attack may be only adequately dealt with by a different defender. In order to understand collaborative attack and collaborative defense, we present a high-level abstracted framework for evaluating the effectiveness of collaborative defense against collaborative attacks. As a first step towards realizing and instantiating the framework, we explore a characterization of collaborative attacks and collaborative defense from the relevant perspectives.

  11. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  12. Shark attack in Natal.

    Science.gov (United States)

    White, J A

    1975-02-01

    The injuries in 5 cases of shark attack in Natal during 1973-74 are reviewed. Experience in shark attacks in South Africa during this period is discussed (1965-73), and the value of protecting heavily utilized beaches in Natal with nets is assessed. The surgical applications of elasmobranch research at the Oceanographic Research Institute (Durban) and at the Headquarters of the Natal Anti-Shark Measures Board (Umhlanga Rocks) are described. Modern trends in the training of surf life-guards, the provision of basic equipment for primary resuscitation of casualties on the beaches, and the policy of general and local care of these patients in Natal are discussed.

  13. Radial and staggered treatment patterns to correct hyperopia using noncontact holmium:YAG laser thermal keratoplasty.

    Science.gov (United States)

    Vinciguerra, P; Kohnen, T; Azzolini, M; Radice, P; Epstein, D; Koch, D D

    1998-01-01

    To compare the effects of two treatment patterns in the correction of hyperopia by noncontact holmium:YAG laser thermal keratoplasty (LTK). Divisione Oculistica, Ospedale S. Gerardo, Monza, Italy. Using two treatment patterns, we performed noncontact LTK in one session in 16 eyes of 8 patients with isometropic hyperopic refractive errors; mean preoperative subjective cycloplegic refraction was +4.90 diopters (D) +/- 1.17 (SD). The treatment consisted of 24 spots in three concentric rings of eight spots each; ring diameters were 6.0, 7.0, and 8.0 mm, respectively. Each spot received seven pulses of laser energy at 30 mJ/pulse. We treated one eye of each patient with a radial pattern (the spots of the three rings aligned on the eight semimeridians) and the fellow eye with a staggered pattern (the spots of the contiguous rings at 22.5 degrees from each other). Follow-up at 1, 15, 30, 90, 180, and 360 days included subjective cycloplegic refraction, uncorrected (UCVA) and spectacle-corrected visual acuity (SCVA), computerized videokeratography (CVK), and Scheimpflug camera examination. One year postoperatively, the mean subjective cycloplegic refraction was +2.75 +/- 1.6 D in the eyes treated with the radial pattern and +3.40 +/- 1.6 D in those treated with the staggered pattern; the mean change in subjective cycloplegic refraction was 2.15 and 1.50 D, respectively. Mean UCVA improved by five lines in the radial group and by four lines in the staggered group. Mean SCVA returned to preoperative levels by day 15 in the radial group and at 1 year in the staggered group; at 1 year, SCVA improved by one line in the radial group and remained unchanged in the staggered group. No eye lost one or more lines of SCVA. Refractive astigmatism was essentially unchanged in both groups. Scheimpflug photography and CVK indicated larger and more uniform corrected zones in the radial group. Radial and staggered patterns effectively corrected low hyperopia, although both were subject to a

  14. Depression After Heart Attack

    Science.gov (United States)

    ... Heart Attack? Redford B. Williams Download PDF https://doi.org/10.1161/CIRCULATIONAHA.110.017285 Circulation. 2011; 123: ... e639-e640 , originally published June 27, 2011 https://doi.org/10.1161/CIRCULATIONAHA.110.017285 Citation Manager Formats ...

  15. Temporal Cyber Attack Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  16. Fatal crocodile attack.

    Science.gov (United States)

    Chattopadhyay, Saurabh; Shee, Biplab; Sukul, Biswajit

    2013-11-01

    Attacks on human beings by various animals leading to varied types of injuries and even death in some cases are not uncommon. Crocodile attacks on humans have been reported from a number of countries across the globe. Deaths in such attacks are mostly due to mechanical injuries or drowning. Bites by the crocodiles often cause the limbs to be separated from the body. The present case refers to an incident of a fatal attack by a crocodile on a 35 years old female where only the mutilated head of the female was recovered. Multiple lacerated wounds over the face and scalp along with fracture of the cranial bones was detected on autopsy. Two distinct bite marks in the form of punched in holes were noted over the parietal and frontal bones. Injuries on the head with its traumatic amputation from the body were sufficient to cause death. However, the presence of other fatal injuries on the unrecovered body parts could not be ruled out. Copyright © 2013 Elsevier Ltd and Faculty of Forensic and Legal Medicine. All rights reserved.

  17. BIRD ATTACK OCULAR INJURIES.

    Science.gov (United States)

    Tabatabaei, Seyed Ali; Soleimani, Mohammad; Behrouz, Mahmoud Jabbarvand

    2017-03-29

    To report 30 patients with bird attack-related eye injuries. This study was performed among patients coming to Farabi Eye Hospital, Tehran, Iran, from 2010 to 2015 with a history of bird attack causing eye injury. The inclusion criteria were a history of bird attack by pecking causing eye injury and having treatment and follow-up record for at least 6 months after treatment. The primary eye examinations included a full ophthalmic examination including evaluation of uncorrected visual acuity and best-corrected visual acuity (BCVA), anterior segment slit lamp biomicroscopy, and photography. For all patients with penetrating injury, primary repair was undertaken. Thirty patients (10 females and 20 males) with a mean age of 23.3 ± 18.5 years entered the study. The most common zone of injury was zone 1 (P < 0.001), and lensectomy was not needed in majority of patients (P < 0.001). The most common bird causing the injury was mynah (P < 0.001). Those patients with baseline BCVA of less than 20/200 or those with endophthalmitis had statistically worse final BCVA after treatment. Patients attacked by mynah bird had significantly better pretreatment uncorrected visual acuity and BCVA. The most common bird causing the eye injury among the sample of patients from Iran was mynah, which differs with previous studies indicating the rooster attack as the most common cause of eye injury. The authors also found that the most common zone of injury was zone 1, and the presence of endophthalmitis and lower baseline BCVA were significant risk factors for worse visual outcomes.

  18. Blocking of Brute Force Attack

    OpenAIRE

    M.Venkata Krishna Reddy

    2012-01-01

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it co...

  19. Modeling seismic wave propagation using staggered-grid mimetic finite differences

    Directory of Open Access Journals (Sweden)

    Freysimar Solano-Feo

    2017-04-01

    Full Text Available Mimetic finite difference (MFD approximations of continuous gradient and divergence operators satisfy a discrete version of the Gauss-Divergence theorem on staggered grids. On the mimetic approximation of this integral conservation principle, an unique boundary flux operator is introduced that also intervenes on the discretization of a given boundary value problem (BVP. In this work, we present a second-order MFD scheme for seismic wave propagation on staggered grids that discretized free surface and absorbing boundary conditions (ABC with same accuracy order. This scheme is time explicit after coupling a central three-level finite difference (FD stencil for numerical integration. Here, we briefly discuss the convergence properties of this scheme and show its higher accuracy on a challenging test when compared to a traditional FD method. Preliminary applications to 2-D seismic scenarios are also presented and show the potential of the mimetic finite difference method.

  20. Skew information in the XY model with staggered Dzyaloshinskii-Moriya interaction

    Energy Technology Data Exchange (ETDEWEB)

    Qiu, Liang, E-mail: lqiu@cumt.edu.cn [School of Physics, China University of Mining and Technology, Xuzhou, Jiangsu 221116 (China); Quan, Dongxiao [State Key Laboratory of Integrated Services Networks, Xidian University, Xi' an, Shaanxi 710071 (China); Pan, Fei; Liu, Zhi [School of Physics, China University of Mining and Technology, Xuzhou, Jiangsu 221116 (China)

    2017-06-01

    We study the performance of the lower bound of skew information in the vicinity of transition point for the anisotropic spin-1/2 XY chain with staggered Dzyaloshinskii-Moriya interaction by use of quantum renormalization-group method. For a fixed value of the Dzyaloshinskii-Moriya interaction, there are two saturated values for the lower bound of skew information corresponding to the spin-fluid and Néel phases, respectively. The scaling exponent of the lower bound of skew information closely relates to the correlation length of the model and the Dzyaloshinskii-Moriya interaction shifts the factorization point. Our results show that the lower bound of skew information can be a good candidate to detect the critical point of XY spin chain with staggered Dzyaloshinskii-Moriya interaction.

  1. Investigation of writing error in staggered heated-dot magnetic recording systems

    Science.gov (United States)

    Tipcharoen, W.; Warisarn, C.; Tongsomporn, D.; Karns, D.; Kovintavewat, P.

    2017-05-01

    To achieve an ultra-high storage capacity, heated-dot magnetic recording (HDMR) has been proposed, which heats a bit-patterned medium before recording data. Generally, an error during the HDMR writing process comes from several sources; however, we only investigate the effects of staggered island arrangement, island size fluctuation caused by imperfect fabrication, and main pole position fluctuation. Simulation results demonstrate that a writing error can be minimized by using a staggered array (hexagonal lattice) instead of a square array. Under the effect of main pole position fluctuation, the writing error is higher than the system without main pole position fluctuation. Finally, we found that the error percentage can drop below 10% when the island size is 8.5 nm and the standard deviation of the island size is 1 nm in the absence of main pole jitter.

  2. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  3. On the spectrum of the staggered Dirac operator at finite chemical potential

    International Nuclear Information System (INIS)

    Vink, J.C.; Nationaal Inst. voor Kernfysica en Hoge-Energiefysica

    1988-12-01

    The spectrum of the staggered Dirac operator in two-dimensional QEDF is investigated at finite chemical potential. In the quenced model, it is shown that lattice artefacts cause a spurious scattering of eigenvalues. This scattering disappears when lattice distance is taken to zero. In the unquenced model, a new approach is used to show that similar effects are absent. (author). 17 refs.; 6 figs

  4. Diffraction of love waves by two staggered perfectly weak half-planes

    International Nuclear Information System (INIS)

    Asghar, S.; Zaman, F.D.; Sajida Asghar

    1989-01-01

    Love wave travelling in a layer of uniform thickness overlying a half-space is assumed to be incident on two parallel but staggered perfectly weak half-planes lying in the upper layer. The diffracted fields is calculated using the modified Wiener-Hopf technique and contour integration method. The diffracted waves satisfy the dispersion relations appropriate to different regions formed by the perfectly weak half-planes

  5. Bottleneck congestion and distribution of work start times: The economics of staggered work hours revisited

    OpenAIRE

    Takayama, Yuki

    2014-01-01

    Since the seminal work of Henderson (1981), a number of studies examined the effect of staggered work hours by analyzing models of work start time choice that consider the trade-off between negative congestion externalities and positive production externalities. However, these studies described traffic congestion using flow congestion models. This study develops a model of work start time choice with bottleneck congestion and discloses the intrinsic properties of the model. To this end, this ...

  6. New 2D adaptive mesh refinement algorithm based on conservative finite-differences with staggered grid

    Science.gov (United States)

    Gerya, T.; Duretz, T.; May, D. A.

    2012-04-01

    We present new 2D adaptive mesh refinement (AMR) algorithm based on stress-conservative finite-differences formulated for non-uniform rectangular staggered grid. The refinement approach is based on a repetitive cell splitting organized via a quad-tree construction (every parent cell is split into 4 daughter cells of equal size). Irrespective of the level of resolution every cell has 5 staggered nodes (2 horizontal velocities, 2 vertical velocities and 1 pressure) for which respective governing equations, boundary conditions and interpolation equations are formulated. The connectivity of the grid is achieved via cross-indexing of grid cells and basic nodal points located in their corners: four corner nodes are indexed for every cell and up to 4 surrounding cells are indexed for every node. The accuracy of the approach depends critically on the formulation of the stencil used at the "hanging" velocity nodes located at the boundaries between different levels of resolution. Most accurate results are obtained for the scheme based on the volume flux balance across the resolution boundary combined with stress-based interpolation of velocity orthogonal to the boundary. We tested this new approach with a number of 2D variable viscosity analytical solutions. Our tests demonstrate that the adaptive staggered grid formulation has convergence properties similar to those obtained in case of a standard, non-adaptive staggered grid formulation. This convergence is also achieved when resolution boundary crosses sharp viscosity contrast interfaces. The convergence rates measured are found to be insensitive to scenarios when the transition in grid resolution crosses sharp viscosity contrast interfaces. We compared various grid refinement strategies based on distribution of different field variables such as viscosity, density and velocity. According to these tests the refinement allows for significant (0.5-1 order of magnitude) increase in the computational accuracy at the same

  7. Entropy Stable Staggered Grid Spectral Collocation for the Burgers' and Compressible Navier-Stokes Equations

    Science.gov (United States)

    Carpenter, Mark H.; Parsani, Matteo; Fisher, Travis C.; Nielsen, Eric J.

    2015-01-01

    Staggered grid, entropy stable discontinuous spectral collocation operators of any order are developed for Burgers' and the compressible Navier-Stokes equations on unstructured hexahedral elements. This generalization of previous entropy stable spectral collocation work [1, 2], extends the applicable set of points from tensor product, Legendre-Gauss-Lobatto (LGL) to a combination of tensor product Legendre-Gauss (LG) and LGL points. The new semi-discrete operators discretely conserve mass, momentum, energy and satisfy a mathematical entropy inequality for both Burgers' and the compressible Navier-Stokes equations in three spatial dimensions. They are valid for smooth as well as discontinuous flows. The staggered LG and conventional LGL point formulations are compared on several challenging test problems. The staggered LG operators are significantly more accurate, although more costly to implement. The LG and LGL operators exhibit similar robustness, as is demonstrated using test problems known to be problematic for operators that lack a nonlinearly stability proof for the compressible Navier-Stokes equations (e.g., discontinuous Galerkin, spectral difference, or flux reconstruction operators).

  8. Re: Penetration Behavior of Opposed Rows of Staggered Secondary Air Jets Depending on Jet Penetration Coefficient and Momentum Flux Ratio

    Science.gov (United States)

    Holdeman, James D.

    2016-01-01

    The purpose of this article is to explain why the extension of the previously published C = (S/Ho)sqrt(J) scaling for opposed rows of staggered jets wasn't directly successful in the study by Choi et al. (2016). It is not surprising that staggered jets from opposite sides do not pass each other at the expected C value, because Ho/D and sqrt(J) are much larger than the maximum in previous studies. These, and large x/D's, tend to suggest development of 2-dimensional flow. Although there are distinct optima for opposed rows of in-line jets, single-side injection, and opposed rows of staggered jets based on C, opposed rows of staggered jets provide as good or better mixing performance, at any C value, than opposed rows of in-line jets or jets from single-side injection.

  9. Heart Attack Coronary Artery Disease

    Science.gov (United States)

    ... our e-newsletter! Aging & Health A to Z Heart Attack Coronary Artery Disease, Angina Basic Facts & Information What ... and oxygen supply; this is what causes a heart attack. If the damaged area is small, however, your ...

  10. Thrombolytic drugs for heart attack

    Science.gov (United States)

    ... gov/ency/article/007488.htm Thrombolytic drugs for heart attack To use the sharing features on this page, ... supply blood and oxygen to the heart. A heart attack can occur if a blood clot stops the ...

  11. What Is a Heart Attack?

    Science.gov (United States)

    ... to help prevent your first heart attack. Heart-Healthy Lifestyle Changes A heart-healthy lifestyle can help prevent ... blood to flow to the heart muscle. Heart-Healthy Lifestyle Changes Treatment for a heart attack usually includes ...

  12. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  13. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  14. Integral staggered point-matching method for millimeter-wave reflective diffraction gratings on electron cyclotron heating systems

    International Nuclear Information System (INIS)

    Xia, Donghui; Huang, Mei; Wang, Zhijiang; Zhang, Feng; Zhuang, Ge

    2016-01-01

    Highlights: • The integral staggered point-matching method for design of polarizers on the ECH systems is presented. • The availability of the integral staggered point-matching method is checked by numerical calculations. • Two polarizers are designed with the integral staggered point-matching method and the experimental results are given. - Abstract: The reflective diffraction gratings are widely used in the high power electron cyclotron heating systems for polarization strategy. This paper presents a method which we call “the integral staggered point-matching method” for design of reflective diffraction gratings. This method is based on the integral point-matching method. However, it effectively removes the convergence problems and tedious calculations of the integral point-matching method, making it easier to be used for a beginner. A code is developed based on this method. The calculation results of the integral staggered point-matching method are compared with the integral point-matching method, the coordinate transformation method and the low power measurement results. It indicates that the integral staggered point-matching method can be used as an optional method for the design of reflective diffraction gratings in electron cyclotron heating systems.

  15. Pseudo-spectral method using rotated staggered grid for elastic wave propagation in 3D arbitrary anisotropic media

    KAUST Repository

    Zou, Peng

    2017-05-10

    Staggering grid is a very effective way to reduce the Nyquist errors and to suppress the non-causal ringing artefacts in the pseudo-spectral solution of first-order elastic wave equations. However, the straightforward use of a staggered-grid pseudo-spectral method is problematic for simulating wave propagation when the anisotropy level is greater than orthorhombic or when the anisotropic symmetries are not aligned with the computational grids. Inspired by the idea of rotated staggered-grid finite-difference method, we propose a modified pseudo-spectral method for wave propagation in arbitrary anisotropic media. Compared with an existing remedy of staggered-grid pseudo-spectral method based on stiffness matrix decomposition and a possible alternative using the Lebedev grids, the rotated staggered-grid-based pseudo-spectral method possesses the best balance between the mitigation of artefacts and efficiency. A 2D example on a transversely isotropic model with tilted symmetry axis verifies its effectiveness to suppress the ringing artefacts. Two 3D examples of increasing anisotropy levels demonstrate that the rotated staggered-grid-based pseudo-spectral method can successfully simulate complex wavefields in such anisotropic formations.

  16. Integral staggered point-matching method for millimeter-wave reflective diffraction gratings on electron cyclotron heating systems

    Energy Technology Data Exchange (ETDEWEB)

    Xia, Donghui [State Key Laboratory of Advanced Electromagnetic Engineering and Technology, Huazhong University of Science and Technology, 430074 Wuhan (China); Huang, Mei [Southwestern Institute of Physics, 610041 Chengdu (China); Wang, Zhijiang, E-mail: wangzj@hust.edu.cn [State Key Laboratory of Advanced Electromagnetic Engineering and Technology, Huazhong University of Science and Technology, 430074 Wuhan (China); Zhang, Feng [Southwestern Institute of Physics, 610041 Chengdu (China); Zhuang, Ge [State Key Laboratory of Advanced Electromagnetic Engineering and Technology, Huazhong University of Science and Technology, 430074 Wuhan (China)

    2016-10-15

    Highlights: • The integral staggered point-matching method for design of polarizers on the ECH systems is presented. • The availability of the integral staggered point-matching method is checked by numerical calculations. • Two polarizers are designed with the integral staggered point-matching method and the experimental results are given. - Abstract: The reflective diffraction gratings are widely used in the high power electron cyclotron heating systems for polarization strategy. This paper presents a method which we call “the integral staggered point-matching method” for design of reflective diffraction gratings. This method is based on the integral point-matching method. However, it effectively removes the convergence problems and tedious calculations of the integral point-matching method, making it easier to be used for a beginner. A code is developed based on this method. The calculation results of the integral staggered point-matching method are compared with the integral point-matching method, the coordinate transformation method and the low power measurement results. It indicates that the integral staggered point-matching method can be used as an optional method for the design of reflective diffraction gratings in electron cyclotron heating systems.

  17. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    Directory of Open Access Journals (Sweden)

    Yi-Hsun Wang

    2010-09-01

    Full Text Available Web applications suffer from cross-site scripting (XSS attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model for generalizing the structure model. The paper has the contributions as following: (1 automatically learn the structure of attack vectors from practical data analysis to modeling a structure model of attack vectors, (2 mimic the manners and the elements of attack vectors to extend the ability of testing tool for identifying XSS vulnerabilities, (3 be helpful to verify the flaws of blacklist sanitization procedures of Web applications. We evaluated the proposed mechanism by Burp Intruder with a dataset collected from public XSS archives. The results show that mutated XSS attack generation can identify potential vulnerabilities.

  18. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  19. Improving Attack Graph Visualization through Data Reduction and Attack Grouping

    Energy Technology Data Exchange (ETDEWEB)

    John Homer; Ashok Varikuti; Xinming Ou; Miles A. McQueen

    2008-09-01

    Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions. This paper presents methodologies that can 1) automatically identify portions of an attack graph that do not help a user to understand the core security problems and so can be trimmed, and 2) automatically group similar attack steps as virtual nodes in a model of the network topology, to immediately increase the understandability of the data. We believe both methods are important steps toward improving visualization of attack graphs to make them more useful in configuration management for large enterprise networks. We implemented our methods using one of the existing attack-graph toolkits. Initial experimentation shows that the proposed approaches can 1) significantly reduce the complexity of attack graphs by trimming a large portion of the graph that is not needed for a user to understand the security problem, and 2) significantly increase the accessibility and understandability of the data presented in the attack graph by clearly showing, within a generated visualization of the network topology, the number and type of potential attacks to which each host is exposed.

  20. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  1. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  2. EM reconstruction of dual isotope PET using staggered injections and prompt gamma positron emitters

    International Nuclear Information System (INIS)

    Andreyev, Andriy; Sitek, Arkadiusz; Celler, Anna

    2014-01-01

    Purpose: The aim of dual isotope positron emission tomography (DIPET) is to create two separate images of two coinjected PET radiotracers. DIPET shortens the duration of the study, reduces patient discomfort, and produces perfectly coregistered images compared to the case when two radiotracers would be imaged independently (sequential PET studies). Reconstruction of data from such simultaneous acquisition of two PET radiotracers is difficult because positron decay of any isotope creates only 511 keV photons; therefore, the isotopes cannot be differentiated based on the detected energy. Methods: Recently, the authors have proposed a DIPET technique that uses a combination of radiotracer A which is a pure positron emitter (such as 18 F or 11 C) and radiotracer B in which positron decay is accompanied by the emission of a high-energy (HE) prompt gamma (such as 38 K or 60 Cu). Events that are detected as triple coincidences of HE gammas with the corresponding two 511 keV photons allow the authors to identify the lines-of-response (LORs) of isotope B. These LORs are used to separate the two intertwined distributions, using a dedicated image reconstruction algorithm. In this work the authors propose a new version of the DIPET EM-based reconstruction algorithm that allows the authors to include an additional, independent estimate of radiotracer A distribution which may be obtained if radioisotopes are administered using a staggered injections method. In this work the method is tested on simple simulations of static PET acquisitions. Results: The authors’ experiments performed using Monte-Carlo simulations with static acquisitions demonstrate that the combined method provides better results (crosstalk errors decrease by up to 50%) than the positron-gamma DIPET method or staggered injections alone. Conclusions: The authors demonstrate that the authors’ new EM algorithm which combines information from triple coincidences with prompt gammas and staggered injections

  3. On the Quality of Velocity Interpolation Schemes for Marker-in-Cell Method and Staggered Grids

    Science.gov (United States)

    Pusok, Adina E.; Kaus, Boris J. P.; Popov, Anton A.

    2017-03-01

    The marker-in-cell method is generally considered a flexible and robust method to model the advection of heterogenous non-diffusive properties (i.e., rock type or composition) in geodynamic problems. In this method, Lagrangian points carrying compositional information are advected with the ambient velocity field on an Eulerian grid. However, velocity interpolation from grid points to marker locations is often performed without considering the divergence of the velocity field at the interpolated locations (i.e., non-conservative). Such interpolation schemes can induce non-physical clustering of markers when strong velocity gradients are present (Journal of Computational Physics 166:218-252, 2001) and this may, eventually, result in empty grid cells, a serious numerical violation of the marker-in-cell method. To remedy this at low computational costs, Jenny et al. (Journal of Computational Physics 166:218-252, 2001) and Meyer and Jenny (Proceedings in Applied Mathematics and Mechanics 4:466-467, 2004) proposed a simple, conservative velocity interpolation scheme for 2-D staggered grid, while Wang et al. (Geochemistry, Geophysics, Geosystems 16(6):2015-2023, 2015) extended the formulation to 3-D finite element methods. Here, we adapt this formulation for 3-D staggered grids (correction interpolation) and we report on the quality of various velocity interpolation methods for 2-D and 3-D staggered grids. We test the interpolation schemes in combination with different advection schemes on incompressible Stokes problems with strong velocity gradients, which are discretized using a finite difference method. Our results suggest that a conservative formulation reduces the dispersion and clustering of markers, minimizing the need of unphysical marker control in geodynamic models.

  4. Response of Maize Crop to Spatial Arrangement and Staggered Interseeding of Haricot Bean

    Directory of Open Access Journals (Sweden)

    Tamiru Hirpa

    2014-09-01

    Full Text Available Field studies conducted to determine the effects of intercrop row arrangements and staggered intercropping of haricot bean (Phaseolus vulgaris L. on the performances of maize (Zea mays L. crop at Hallaba and Taba areas in 2013 cropping season, southern Ethiopia, revealed that there were significant effects of cropping patterns and staggered interseeding of the legume component on growth and yield components of maize crop. Significant interaction of row arrangement × intercropping time of haricot bean was observed with respect to leaf area index (LAI of the maize crop. Increasing trends of LAI of maize crop were observed as interseeding of haricot bean was delayed for 3 weeks after maize (WAM that stabilized during the 6 WAM interseeding time. Maize stover production was significantly high at 1:2 row ratio and delaying of the undersowing haricot bean in the already established maize crop for 6 weeks, 10.94 tha-1 and 11.39 t ha-1, respectively. Maize grain yield showed a significant variation with respect to the staggered sowing of haricot bean, whereby the highest (3.99 t ha-1 being recorded when haricot bean intercropping was delayed for 21 days after maize planting. The data of this study revealed that the larger maize plant canopy providing larger photosynthetic area, attained when haricot bean interseeding was delayed, probably resulted in higher grain yield of maize. DOI: http://dx.doi.org/10.3126/ije.v3i3.11072 International Journal of Environment Vol.3(3 2014: 126-138

  5. EM reconstruction of dual isotope PET using staggered injections and prompt gamma positron emitters

    Science.gov (United States)

    Andreyev, Andriy; Sitek, Arkadiusz; Celler, Anna

    2014-01-01

    Purpose: The aim of dual isotope positron emission tomography (DIPET) is to create two separate images of two coinjected PET radiotracers. DIPET shortens the duration of the study, reduces patient discomfort, and produces perfectly coregistered images compared to the case when two radiotracers would be imaged independently (sequential PET studies). Reconstruction of data from such simultaneous acquisition of two PET radiotracers is difficult because positron decay of any isotope creates only 511 keV photons; therefore, the isotopes cannot be differentiated based on the detected energy. Methods: Recently, the authors have proposed a DIPET technique that uses a combination of radiotracer A which is a pure positron emitter (such as 18F or 11C) and radiotracer B in which positron decay is accompanied by the emission of a high-energy (HE) prompt gamma (such as 38K or 60Cu). Events that are detected as triple coincidences of HE gammas with the corresponding two 511 keV photons allow the authors to identify the lines-of-response (LORs) of isotope B. These LORs are used to separate the two intertwined distributions, using a dedicated image reconstruction algorithm. In this work the authors propose a new version of the DIPET EM-based reconstruction algorithm that allows the authors to include an additional, independent estimate of radiotracer A distribution which may be obtained if radioisotopes are administered using a staggered injections method. In this work the method is tested on simple simulations of static PET acquisitions. Results: The authors’ experiments performed using Monte-Carlo simulations with static acquisitions demonstrate that the combined method provides better results (crosstalk errors decrease by up to 50%) than the positron-gamma DIPET method or staggered injections alone. Conclusions: The authors demonstrate that the authors’ new EM algorithm which combines information from triple coincidences with prompt gammas and staggered injections improves

  6. Weak interaction matrix elements with staggered fermions. I: theory and a trial run

    International Nuclear Information System (INIS)

    Sharpe, S.R.; Patel, A.; Gupta, R.; Guralnik, G.; Kilsup, G.W.

    1986-08-01

    We present results of a preliminary study of the matrix elements of weak interaction operators using staggered fermions. We describe our method for transcribing the weak interaction Hamiltonian onto the lattice. This method preserves exact Ward Identities analogous to those of the continuum. The calculation uses operators involving 0, 1, 2, 3 and 4 gauge links. We present results for all these operators obtained on 8 3 x 16 lattices generated both with the Wilson action (β = 5.6) and an improved action

  7. Nucleon structure in the chiral regime with domain wall fermions on an improved staggered sea

    International Nuclear Information System (INIS)

    R.G. Edwards; G. Fleming; Ph. Hagler; J.W. Negele; K. Orginos; A.V. Pochinsky; D.B. Renner; D.G. Richards; W. Schroers

    2006-01-01

    Moments of unpolarized, helicity, and transversity distributions, electromagnetic form factors, and generalized form factors of the nucleon are presented from a preliminary analysis of lattice results using pion masses down to 359 MeV. The twist two matrix elements are calculated using a mixed action of domain wall valence quarks and asqtad staggered sea quarks and are renormalized perturbatively. Several observables are extrapolated to the physical limit using chiral perturbation theory. Results are compared with experimental moments of quark distributions and electromagnetic form factors and phenomenologically determined generalized form factors, and the implications on the transverse structure and spin content of the nucleon are discussed

  8. Aerodynamic drag of a staggered flat-oval finning tube banks at the small reynolds numbers

    Directory of Open Access Journals (Sweden)

    Максим Михайлович Вознюк

    2015-06-01

    Full Text Available Experimental investigations of aerodynamic drag of staggered bundles of flat-oval tubes with incomplete transversal fins in the range of Reynolds numbers 600 <  < 20000 are performed. New calculation correlations for determining of drag coefficients for 1<3000 are suggested, the impact of basic geometric and regime parameters on aerodynamic drag of bundles are determined. The received calculation depending is possible to use in developing of heat transfer surfaces for “dry” cooling towers and air cooling apparatus and economizers

  9. Calculation of cell face velocity of non-staggered grid system

    KAUST Repository

    Li, Wang

    2012-07-28

    In this paper, the cell face velocities in the discretization of the continuity equation, the momentum equation, and the scalar equation of a non-staggered grid system are calculated and discussed. Both the momentum interpolation and the linear interpolation are adopted to evaluate the coefficients in the discretized momentum and scalar equations. Their performances are compared. When the linear interpolation is used to calculate the coefficients, the mass residual term in the coefficients must be dropped to maintain the accuracy and convergence rate of the solution. © Shanghai University and Springer-Verlag Berlin Heidelberg 2012.

  10. Calculation of the Nucleon Axial Form Factor Using Staggered Lattice QCD

    Energy Technology Data Exchange (ETDEWEB)

    Meyer, Aaron S. [Fermilab; Hill, Richard J. [Perimeter Inst. Theor. Phys.; Kronfeld, Andreas S. [Fermilab; Li, Ruizi [Indiana U.; Simone, James N. [Fermilab

    2016-10-14

    The nucleon axial form factor is a dominant contribution to errors in neutrino oscillation studies. Lattice QCD calculations can help control theory errors by providing first-principles information on nucleon form factors. In these proceedings, we present preliminary results on a blinded calculation of $g_A$ and the axial form factor using HISQ staggered baryons with 2+1+1 flavors of sea quarks. Calculations are done using physical light quark masses and are absolutely normalized. We discuss fitting form factor data with the model-independent $z$ expansion parametrization.

  11. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  12. Attacks on RFID Identification Systems

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-09-01

    Full Text Available This article is about attacks on RFID systems. Currently antivirus developers are not developing systems that protect from viruses that could exist on RFID tags. Such viruses are considered as not existing because the RFID tag memory is very small. Unfortunately such viruses exist. This article is concerned to such viruses and attacks that hackers could do using such viruses. Based on this article methods to prevent RFID-viruses attacks could be developed.

  13. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  14. Seven Deadliest Web Application Attacks

    CERN Document Server

    Shema, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then you need Seven Deadliest Web Application Attacks. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. .. .. Attacks detailed in this book include: ..: ..; Cross-Site Scripting (XSS) ..; Cross-Site Request Fo

  15. The Timing of Terrorist Attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2016-01-01

    I use a simple optimal stopping model to derive policy relevant insights on the timing of one-shot attacks by small autonomous terrorist units or “lone wolf” individuals. A main insight is that an increase in proactive counterterrorism measures can lead to a short term increase in the number...... of attempted terrorist attacks because it makes it more risky for existing terrorist units to pursue further development of capabilities. This is consistent with the events in London in 2005 where a terrorist attack on 7 July was followed by a similar but unsuccessful attack two weeks later....

  16. Cas9-catalyzed DNA Cleavage Generates Staggered Ends: Evidence from Molecular Dynamics Simulations

    Science.gov (United States)

    Zuo, Zhicheng; Liu, Jin

    2016-11-01

    The CRISPR-associated endonuclease Cas9 from Streptococcus pyogenes (spCas9) along with a single guide RNA (sgRNA) has emerged as a versatile toolbox for genome editing. Despite recent advances in the mechanism studies on spCas9-sgRNA-mediated double-stranded DNA (dsDNA) recognition and cleavage, it is still unclear how the catalytic Mg2+ ions induce the conformation changes toward the catalytic active state. It also remains controversial whether Cas9 generates blunt-ended or staggered-ended breaks with overhangs in the DNA. To investigate these issues, here we performed the first all-atom molecular dynamics simulations of the spCas9-sgRNA-dsDNA system with and without Mg2+ bound. The simulation results showed that binding of two Mg2+ ions at the RuvC domain active site could lead to structurally and energetically favorable coordination ready for the non-target DNA strand cleavage. Importantly, we demonstrated with our simulations that Cas9-catalyzed DNA cleavage produces 1-bp staggered ends rather than generally assumed blunt ends.

  17. Parametric modeling and stagger angle optimization of an axial flow fan

    International Nuclear Information System (INIS)

    Li, M X; Zhang, C H; Liu, Y; Zheng, S Y

    2013-01-01

    Axial flow fans are widely used in every field of social production. Improving their efficiency is a sustained and urgent demand of domestic industry. The optimization of stagger angle is an important method to improve fan performance. Parametric modeling and calculation process automation are realized in this paper to improve optimization efficiency. Geometric modeling and mesh division are parameterized based on GAMBIT. Parameter setting and flow field calculation are completed in the batch mode of FLUENT. A control program is developed in Visual C++ to dominate the data exchange of mentioned software. It also extracts calculation results for optimization algorithm module (provided by Matlab) to generate directive optimization control parameters, which as feedback are transferred upwards to modeling module. The center line of the blade airfoil, based on CLARK y profile, is constructed by non-constant circulation and triangle discharge method. Stagger angles of six airfoil sections are optimized, to reduce the influence of inlet shock loss as well as gas leak in blade tip clearance and hub resistance at blade root. Finally an optimal solution is obtained, which meets the total pressure requirement under given conditions and improves total pressure efficiency by about 6%

  18. Parametric modeling and stagger angle optimization of an axial flow fan

    Science.gov (United States)

    Li, M. X.; Zhang, C. H.; Liu, Y.; Y Zheng, S.

    2013-12-01

    Axial flow fans are widely used in every field of social production. Improving their efficiency is a sustained and urgent demand of domestic industry. The optimization of stagger angle is an important method to improve fan performance. Parametric modeling and calculation process automation are realized in this paper to improve optimization efficiency. Geometric modeling and mesh division are parameterized based on GAMBIT. Parameter setting and flow field calculation are completed in the batch mode of FLUENT. A control program is developed in Visual C++ to dominate the data exchange of mentioned software. It also extracts calculation results for optimization algorithm module (provided by Matlab) to generate directive optimization control parameters, which as feedback are transferred upwards to modeling module. The center line of the blade airfoil, based on CLARK y profile, is constructed by non-constant circulation and triangle discharge method. Stagger angles of six airfoil sections are optimized, to reduce the influence of inlet shock loss as well as gas leak in blade tip clearance and hub resistance at blade root. Finally an optimal solution is obtained, which meets the total pressure requirement under given conditions and improves total pressure efficiency by about 6%.

  19. Effect of wall proximity of two staggered triangular cylinders on the transport process in a channel

    Directory of Open Access Journals (Sweden)

    Mousa Farhadi

    2016-09-01

    Full Text Available A numerical investigation has been carried out to analyze the heat transfer and the flow field around two isothermal triangular cylinders of equal size placed staggered in a horizontal plane channel with adiabatic walls. Computations have been carried out for Reynolds numbers (based on triangle width 100, 250, and 350, lateral gap ratios (d/B 0, 0.5, and 1, and longitudinal gap ratios (S/B 1, 2, 3 and 4. The effect of longitudinal and lateral gap between obstacles and proximity of channel walls is investigated. Results show that when obstacles are placed in close vicinity of the channel's wall (d/B = 1, vortex shedding disappears at the downstream of triangles at Re = 100 and 250 at all S/B, but for Re = 350 creating and disappearing of the vortex shedding depend on the longitudinal gap ratio (S/B. Proximity of obstacles has more effect on the second triangle than the first triangle especially from longitudinal gap ratio equals 2, so that with approaching the channel wall, the Nusselt number for the first triangle decreases, while for the second triangle a different behavior is seen. Staggered arrangement causes the Nusselt number of the second triangle to become greater than the first triangle.

  20. Experimental study of thermal–hydraulic performance of cam-shaped tube bundle with staggered arrangement

    International Nuclear Information System (INIS)

    Bayat, Hamidreza; Lavasani, Arash Mirabdolah; Maarefdoost, Taher

    2014-01-01

    Highlights: • Thermal–hydraulic performance of a non-circular tube bundle has been investigated experimentally. • Tubes were mounted in staggered arrangement with two longitudinal pitch ratios 1.5 and 2. • Drag coefficient and Nusselt number of tubes in second row was measured. • Friction factor of this tube bundle is lower than circular tube bundle. • Thermal–hydraulic performance of this tube bundle is greater than circular tube bundle. - Abstract: Flow and heat transfer from cam-shaped tube bank in staggered arrangement is studied experimentally. Tubes were located in test section of an open loop wind tunnel with two longitudinal pitch ratios 1.5 and 2. Reynolds number varies in range of 27,000 ⩽ Re D ⩽ 42,500 and tubes surface temperature is between 78 and 85 °C. Results show that both drag coefficient and Nusselt number depends on position of tube in tube bank and Reynolds number. Tubes in the first column have maximum value of drag coefficient, while its Nusselt number is minimum compared to other tubes in tube bank. Moreover, pressure drop from this tube bank is about 92–93% lower than circular tube bank and as a result thermal–hydraulic performance of this tube bank is about 6 times greater than circular tube bank

  1. Analysis of the influence of the interlayer staggered zone in the basalt of Jinsha River Basin on the main buildings

    Science.gov (United States)

    Guo, Qiaona; Huang, Jiangwei

    2018-02-01

    In this paper, the finite element software FEFLOW is used to simulate the seepage field of the interlayer staggered zone C2 in the basalt of Jinsha River Basin. The influence of the interlayer staggered zone C2 on the building is analyzed. Combined with the waterproof effect of current design scheme of anti-seepage curtain, the seepage field in the interlayer staggered zone C2 is discussed under different design schemes. The optimal design scheme of anti-seepage curtain is put forward. The results showed that the case four can effectively reduce the head and hydraulic gradient of underground powerhouse area, and improve the groundwater seepage field in the plant area.

  2. Energy Stability Analysis of Some Fully Discrete Numerical Schemes for Incompressible Navier–Stokes Equations on Staggered Grids

    KAUST Repository

    Chen, Huangxin

    2017-09-01

    In this paper we consider the energy stability estimates for some fully discrete schemes which both consider time and spatial discretizations for the incompressible Navier–Stokes equations. We focus on three kinds of fully discrete schemes, i.e., the linear implicit scheme for time discretization with the finite difference method (FDM) on staggered grids for spatial discretization, pressure-correction schemes for time discretization with the FDM on staggered grids for the solutions of the decoupled velocity and pressure equations, and pressure-stabilization schemes for time discretization with the FDM on staggered grids for the solutions of the decoupled velocity and pressure equations. The energy stability estimates are obtained for the above each fully discrete scheme. The upwind scheme is used in the discretization of the convection term which plays an important role in the design of unconditionally stable discrete schemes. Numerical results are given to verify the theoretical analysis.

  3. Global Mapping of Cyber Attacks

    Science.gov (United States)

    2014-01-01

    Identifying factors behind countries weakness to cyber - attacks is an important step towards addressing these weaknesses at the root level. For...the lowest rates of cyber - attacks . This is surprising given the bad cyber reputation of some African countries such as Nigeria. Our research has many policy implications.

  4. [Heart-attack in pregnancy].

    Science.gov (United States)

    Výtisková, T; Suchá, D; Fučíková, Z

    To describe hear-attack on crystal meth addicted pregnant woman. Case report. Acute heart-attack during pregnancy means unexpected obstetric complication. The consequences could be fatal for the mother and the fetus. Although good delivery management and treatment could reduce morbidity and mortality to a minimum.

  5. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    string model. While our protocol is classical, it is sound against a cheating unbounded quantum prover and computational zero-knowledge even if the verifier is allowed a superposition attack. Finally, we consider multiparty computation and show that for the most general type of attack, simulation based...

  6. Multiculturalism & The Charlie Hebdo Attack

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2016-01-01

    The attack on Charlie Hebdo has by many been linked to multiculturalism. But it is unclear exactly how the connection between multiculturalism and the attack should be understood and whether there indeed is such a connection. The article discusses this by distinguishing between different senses o...

  7. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    -prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...

  8. High‐order rotated staggered finite difference modeling of 3D elastic wave propagation in general anisotropic media

    KAUST Repository

    Chu, Chunlei

    2009-01-01

    We analyze the dispersion properties and stability conditions of the high‐order convolutional finite difference operators and compare them with the conventional finite difference schemes. We observe that the convolutional finite difference method has better dispersion properties and becomes more efficient than the conventional finite difference method with the increasing order of accuracy. This makes the high‐order convolutional operator a good choice for anisotropic elastic wave simulations on rotated staggered grids since its enhanced dispersion properties can help to suppress the numerical dispersion error that is inherent in the rotated staggered grid structure and its efficiency can help us tackle 3D problems cost‐effectively.

  9. Towards corrections to the strong coupling limit of staggered lattice QCD

    CERN Document Server

    Fromm, Michael; Philipsen, Owe; de Forcrand, Philippe; Unger, Wolfgang; Miura, Kotaroh

    2011-01-01

    We report on the first steps of an ongoing project to add gauge observables and gauge corrections to the well-studied strong coupling limit of staggered lattice QCD, which has been shown earlier to be amenable to numerical simulations by the worm algorithm in the chiral limit and at finite density. Here we show how to evaluate the expectation value of the Polyakov loop in the framework of the strong coupling limit at finite temperature, allowing to study confinement properties along with those of chiral symmetry breaking. We find the Polyakov loop to rise smoothly, thus signalling deconfinement. The non-analytic nature of the chiral phase transition is reflected in the derivative of the Polyakov loop. We also discuss how to construct an effective theory for non-zero lattice coupling, which is valid to $O(\\beta)$.

  10. Field theory of a terahertz staggered double-grating arrays waveguide Cerenkov traveling wave amplifier

    Energy Technology Data Exchange (ETDEWEB)

    Xie, Wenqiu; He, Fangming [Institute of Electronics, Chinese Academy of Sciences, Beijing 100190 (China); University of Chinese Academy of Sciences, Beijing 100049 (China); Wang, Zicheng; Luo, Jirun; Zhao, Ding; Liu, Qinglun [Institute of Electronics, Chinese Academy of Sciences, Beijing 100190 (China)

    2014-04-15

    Based on a rectilinear sheet electron beam propagating through the tunnel of a staggered double-grating arrays waveguide (SDGAW) slow-wave structure (SWS), a three dimensional field theory for describing the modes and the beam-wave interaction is presented, in which the higher order terms inside the grooves are retained. The fields' distribution and the conductivity losses are also calculated utilizing the theoretical model. With the optimized parameters of the SWS and the electron beam, a 1 THz SDGAW Cerenkov traveling wave amplifier may obtain a moderate net gain (the peak gain is 12.7 dB/cm) and an ultra 3 dB wideband (0.19 THz) considering the serious Ohmic losses. The theoretical results have been compared with those calculated by 3D HFSS code and CST STUDIO particle-in-cell simulations.

  11. N{sub f}=1 QCD in external magnetic fields: staggered fermions

    Energy Technology Data Exchange (ETDEWEB)

    Cea, Paolo [INFN, Sezione di Bari, Via Amendola 173, I-70126 Bari (Italy); Dipartimento di Fisica dell’Università di Bari, Via Amendola 173, I-70126 Bari (Italy); Cosmai, Leonardo [INFN, Sezione di Bari, Via Amendola 173, I-70126 Bari (Italy)

    2015-12-10

    We investigate N{sub f}=1 QCD in external magnetic fields on the lattice. The background field is introduced by means of the so-called Schrödinger functional. We adopt standard staggered fermions with constant bare mass am=0.025 and magnetic fields with constant magnetic flux up to a{sup 2}eH≃2.3562. We find that the the deconfinement and chiral symmetry restoration temperatures do not depend on the strength of the applied magnetic field. Our method allow us to easily study the effects of the external magnetic fields on the QCD thermodynamics. We determine the influences of applied magnetic fields to the free energy, pressure, and equation of state of strongly interacting matter.

  12. Efficient gas-liquid contact using microfluidic membrane devices with staggered herringbone mixers.

    Science.gov (United States)

    Femmer, Tim; Eggersdorfer, Max L; Kuehne, Alexander J C; Wessling, Matthias

    2015-08-07

    We describe a novel membrane based gas-liquid-contacting device with increased mass transport and reduced pressure loss by combining a membrane with a staggered herringbone static mixer. Herringbone structures are imposed on the microfluidic channel geometry via soft lithography, acting as mixers which introduce secondary flows at the membrane interface. Such flows include Dean vortices and Taylor flows generating effective mixing while improving mass transport and preventing concentration polarization in microfluidic channels. Furthermore, our static herringbone mixer membranes effectively reduce pressure losses leading to devices with enhanced transfer properties for microfluidic gas-liquid contact. We investigate the red blood cell distribution to tailor our devices towards miniaturised extracorporeal membrane oxygenation and improved comfort of patients with lung insufficiencies.

  13. Constitutive Modelling in Thermomechanical Processes, Using The Control Volume Method on Staggered Grid

    DEFF Research Database (Denmark)

    Thorborg, Jesper

    -strain relation has been suggested. The intention of this method is to provide fast numerical results with reasonable accuracy in relation to the first order effects of the presented classical plasticity model. Application of the $J_2$ flow theory and the alternative method have shown some agreement...... of the method has been focused on high temperature processes such as casting and welding and the interest of using nonlinear constitutive stress-strain relations has grown to extend the applicability of the method. The work of implementing classical plasticity into the control volume formulation has been based...... on the $J_2$ flow theory describing an isotropic hardening material with a temperature dependent yield stress. This work has successfully been verified by comparing results to analytical solutions. Due to the comprehensive implementation in the staggered grid an alternative constitutive stress...

  14. An arbitrary-order staggered time integrator for the linear acoustic wave equation

    Science.gov (United States)

    Lee, Jaejoon; Park, Hyunseo; Park, Yoonseo; Shin, Changsoo

    2018-02-01

    We suggest a staggered time integrator whose order of accuracy can arbitrarily be extended to solve the linear acoustic wave equation. A strategy to select the appropriate order of accuracy is also proposed based on the error analysis that quantitatively predicts the truncation error of the numerical solution. This strategy not only reduces the computational cost several times, but also allows us to flexibly set the modelling parameters such as the time step length, grid interval and P-wave speed. It is demonstrated that the proposed method can almost eliminate temporal dispersive errors during long term simulations regardless of the heterogeneity of the media and time step lengths. The method can also be successfully applied to the source problem with an absorbing boundary condition, which is frequently encountered in the practical usage for the imaging algorithms or the inverse problems.

  15. Staggered-Grid Finite Difference Method with Variable-Order Accuracy for Porous Media

    Directory of Open Access Journals (Sweden)

    Jinghuai Gao

    2013-01-01

    Full Text Available The numerical modeling of wave field in porous media generally requires more computation time than that of acoustic or elastic media. Usually used finite difference methods adopt finite difference operators with fixed-order accuracy to calculate space derivatives for a heterogeneous medium. A finite difference scheme with variable-order accuracy for acoustic wave equation has been proposed to reduce the computation time. In this paper, we develop this scheme for wave equations in porous media based on dispersion relation with high-order staggered-grid finite difference (SFD method. High-order finite difference operators are adopted for low-velocity regions, and low-order finite difference operators are adopted for high-velocity regions. Dispersion analysis and modeling results demonstrate that the proposed SFD method can decrease computational costs without reducing accuracy.

  16. Stress analysis of three-dimensional roadway layout of stagger arrangement with field observation

    Science.gov (United States)

    Cui, Zimo; Chanda, Emmanuel; Zhao, Jingli; Wang, Zhihe

    2018-01-01

    Longwall top-coal caving (LTCC) has been a popular, more productive and cost-effective method for extracting thick (> 5 m) to ultra-thick coal seams in recent years. However, low-level recovery ratio of coal resources and top-coal loss above the supports at both ends of working face are long-term problems. Geological factors, such as large dip angle, soft rock, mining depth further complicate the problems. This paper proposes addressing this issue by adopting three-dimensional roadway layout of stagger arrangement (3-D RLSA). In this study, the first step was to analyse the stress environment surrounding head entry in the replacing working face based on the stress distribution characteristics at the triangular coal-pillar side in gob and the stress slip line field theory. In the second step, filed observation was conducted. Finally, an economic evaluation of the 3-D RLSA for extracting thick to ultra-thick seams was conducted.

  17. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  18. Shark Attack Project - Marine Attack at Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Adrianus J

    2005-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  19. Cellular uptake of magnetite nanoparticles enhanced by NdFeB magnets in staggered arrangement

    Science.gov (United States)

    Lu, Yi-Ching; Chang, Fan-Yu; Tu, Shu-Ju; Chen, Jyh-Ping; Ma, Yunn-Hwa

    2017-04-01

    Magnetic force may greatly enhance uptake of magnetic nanoparticles (MNPs) by cultured cells; however, the effects of non-uniformity of magnetic field/ magnetic gradient on MNP internalization in culture has not been elucidated. Cellular uptake of polyacrylic acid coated-MNP by LN229 cells was measured with cylindrical NdFeB magnets arranged in a staggered pattern. The magnetic field generated by placing a magnet underneath (H-field) elicited a homogenous distribution of MNPs on the cells in culture; whereas the field without magnet underneath (L-field) resulted in MNP distribution along the edge of the wells. Cell-associated MNP (MNPcell) appeared to be magnetic field- and concentration-dependent. In H-field, MNPcell reached plateau within one hour of exposure to MNP with only one-min application of the magnetic force in the beginning of incubation; continuous presence of the magnet for 2 h did not further increase MNPcell, suggesting that magnetic force-induced uptake may be primarily contributed to enhanced MNP sedimentation. Although MNP distribution was much inhomogeneous in L-field, averaged MNPcell in the L-field may reach as high as 80% of that in H-field during 1-6 h incubation, suggesting high capacity of MNP internalization. In addition, no significant difference was observed in MNPcell analyzed by flow cytometry with the application of H-field of staggered plate vs. filled magnet plate. Therefore, biological variation may dominate MNP internalization even under relatively uniformed magnetic field; whereas non-uniformed magnetic field may serve as a model for tumor targeting with MNPs in vivo.

  20. A comparative study of Purkinje cells in two RORalpha gene mutant mice: staggerer and RORalpha(-/-).

    Science.gov (United States)

    Doulazmi, M; Frédéric, F; Capone, F; Becker-André, M; Delhaye-Bouchaud, N; Mariani, J

    2001-04-30

    The staggerer (Rora(sg/sg)) mutation is a deletion in the RORalpha gene, one member of a family of nuclear receptor genes related to the retinoic acid receptor. Recently Steinmayr et al. (Proc. Natl. Acad. Sci. USA 95 (1998) 3960) generated a RORalpha null-mutant mouse (Rora(-/-)) by using a targeting vector in which a beta-Gal gene replaces the second finger of the DNA-binding domain of RORalpha. The Rora(-/-) cerebellum is qualitatively a phenocopy of the Rora(sg/sg) one, but the two strains differ slightly in their motor skills. To address the question whether the morphological defects in the Rora(-/-) cerebellum are identical to the Rora(sg/sg) one, we compared number and size of Purkinje cells in both staggerer and RORalpha null-mutant mice, using calbindin (CaBP) immunohistochemistry and revelation of beta-Gal activity. Compared to control cerebella the Rora(sg/sg) cerebellum has 82% fewer CaBP-positive cells. In Rora(-/-) mouse, all the the beta-Gal-positive Purkinje cells also expressed CaBP, but the cerebellum contained 78% less CaBP-positive cells than control, a deficit not different from the one observed in Rora(sg/sg). We show similar mediolateral compartments in Purkinje cell number and cytological abnormality in Rora(sg/sg) and Rora(-/-) mice. These results provide quantitative support for the hypothesis that the cerebellar phenotype in the homozygous Rora(sg/sg) is due to the lack of function of the RORalpha gene.

  1. Investigation of analog/RF performance of staggered heterojunctions based nanowire tunneling field-effect transistors

    Science.gov (United States)

    Chakraborty, Avik; Sarkar, Angsuman

    2015-04-01

    In this paper, the analog/RF performance of an III-V semiconductor based staggered hetero-tunnel-junction (HETJ) n-type nanowire (NW) tunneling FET (n-TFET) is investigated, for the first time. The device performance figure-of-merits governing the analog/RF performance such as transconductance (gm), transconductance-to-drive current ratio (gm/IDS), output resistance (Rout), intrinsic gain and unity-gain cutoff frequency (fT) have been studied. The analog/RF performance parameters is compared between HETJ NW TFET and a homojunction (HJ) NW n-type TFET of similar dimensions. In addition to enhanced ION and subthreshold swing, a significant improvement in the analog/RF performance parameters obtained by the HETJ n-TFET over HJ counterpart for use in analog/mixed signal System-on-Chip (SoC) applications is reported. Moreover, the analog/RF performance parameters of a III-V based staggered HETJ NW TFET is also compared with a heterojunction (HETJ) NW n-type MOSFET having same material as HETJ n-TFET and equal dimension in order to provide a systematic comparison between HETJ-TFET and HETJ-MOSFET for use in analog/mixed-signal applications. The results reveal that HETJ n-TFET provides higher Rout and hence, a higher intrinsic gain, an improved gm/IDS ratio, and reasonable fT at lower values of gate-overdrive voltage as compared to the HETJ NW n-MOSFET.

  2. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security......The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...

  3. Gas in Attack and Gas in Defense

    National Research Council Canada - National Science Library

    Fries, Amos A

    1919-01-01

    Carrying out a gas attack is the most technical and dangerous of war's attacks, not only to those on board the airplane that is initiating the attack, but also to those friendly troops on the ground for miles around...

  4. Social Engineering Attack Detection Model: SEADMv2

    CSIR Research Space (South Africa)

    Mouton, F

    2015-10-01

    Full Text Available and is only able to cater for social engineering attacks that use bidirectional communication. Previous research discovered that social engineering attacks can be classified into three different categories, namely attacks that utilise bidirectional...

  5. A Study of a Powder Coating Gun Near Field: Particle Flow in an Isothermal Staggered Concentric Air Jet

    Directory of Open Access Journals (Sweden)

    Graham Payne

    2014-07-01

    Full Text Available An experimental study of inert particle dispersion in an isothermal concentric air jet near field was conducted for cases of standard non-staggered and alternative staggered jet nozzles, each taken from a polymer powder flame deposition gun. The experimental work consisted of analysis of high speed digital images of the inert two phase isothermal jet flow, illuminated by a laser light sheet along and across the jet axis. The analysis of particle spread in the jet, represented by families of particle density distributions, clearly showed that the staggered nozzles resulted in a better-focused flow, with narrower distributions in the near field, and in the elimination of the recirculation zone that disrupted the particle flow in a non-staggered nozzle arrangement. In all cases, histograms of the cross-sectional particle area density were found to be approximately Gaussian. It was also found that there was a wide variation in the size and shape of the ground polymer particles used and these two characteristics caused a wide variation in the radial and axial velocities of the particles. Despite the differences between single-phase numerical simulations and experimental results, reported in Payne et al. [1], the introduction of particles into a numerical model produced satisfactory agreement with the particle velocities found experimentally.

  6. The sequential organ failure assessment (SOFA) score is an effective triage marker following staggered paracetamol (acetaminophen) overdose.

    Science.gov (United States)

    Craig, D G; Zafar, S; Reid, T W D J; Martin, K G; Davidson, J S; Hayes, P C; Simpson, K J

    2012-06-01

    The sequential organ failure assessment (SOFA) score is an effective triage marker following single time point paracetamol (acetaminophen) overdose, but has not been evaluated following staggered (multiple supratherapeutic doses over >8 h, resulting in cumulative dose of >4 g/day) overdoses. To evaluate the prognostic accuracy of the SOFA score following staggered paracetamol overdose. Time-course analysis of 50 staggered paracetamol overdoses admitted to a tertiary liver centre. Individual timed laboratory samples were correlated with corresponding clinical parameters and the daily SOFA scores were calculated. A total of 39/50 (78%) patients developed hepatic encephalopathy. The area under the SOFA receiver operator characteristic for death/liver transplantation was 87.4 (95% CI 73.2-95.7), 94.3 (95% CI 82.5-99.1), and 98.4 (95% CI 84.3-100.0) at 0, 24 and 48 h, respectively, postadmission. A SOFA score of paracetamol overdose, is associated with a good prognosis. Both the SOFA and APACHE II scores could improve triage of high-risk staggered paracetamol overdose patients. © 2012 Blackwell Publishing Ltd.

  7. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  8. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  9. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-01-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  10. Panic Attacks and Panic Disorder

    Science.gov (United States)

    ... in panic attacks. For example, if a grizzly bear came after you, your body would react instinctively. ... panic disorder Major life stress, such as the death or serious illness of a loved one A ...

  11. Staggered overdose pattern and delay to hospital presentation are associated with adverse outcomes following paracetamol-induced hepatotoxicity.

    Science.gov (United States)

    Craig, Darren G N; Bates, Caroline M; Davidson, Janice S; Martin, Kirsty G; Hayes, Peter C; Simpson, Kenneth J

    2012-02-01

    Paracetamol (acetaminophen) poisoning remains the major cause of severe acute hepatotoxicity in the UK. In this large single centre cohort study we examined the clinical impact of staggered overdoses and delayed presentation following paracetamol overdose. Between 1992 and 2008, 663 patients were admitted with paracetamol-induced severe liver injury, of whom 161 (24.3%) had taken a staggered overdose. Staggered overdose patients were significantly older and more likely to abuse alcohol than single time point overdose patients. Relief of pain (58.2%) was the commonest rationale for repeated supratherapeutic ingestion. Despite lower total ingested paracetamol doses and lower admission serum alanine aminotransferase concentrations, staggered overdose patients were more likely to be encephalopathic on admission, require renal replacement therapy or mechanical ventilation and had higher mortality rates compared with single time point overdoses (37.3% vs. 27.8%, P= 0.025), although this overdose pattern did not independently predict death. The King's College poor prognostic criteria had reduced sensitivity (77.6, 95% CI 70.8, 81.5) for this pattern of overdose. Of the 396/450 (88.0%) single time point overdoses in whom accurate timings could be obtained, 178 (44.9%) presented to medical services >24 h following overdose. Delayed presentation beyond 24 h post overdose was independently associated with death/liver transplantation (OR 2.25, 95% CI 1.23, 4.12, P= 0.009). Both delayed presentation and staggered overdose pattern are associated with adverse outcomes following paracetamol overdose. These patients are at increased risk of developing multi-organ failure and should be considered for early transfer to specialist liver centres. © 2011 The Authors. British Journal of Clinical Pharmacology © 2011 The British Pharmacological Society.

  12. Cellular uptake of magnetite nanoparticles enhanced by NdFeB magnets in staggered arrangement

    Energy Technology Data Exchange (ETDEWEB)

    Lu, Yi-Ching; Chang, Fan-Yu [Department of Physiology and Pharmacology & Healthy Aging Research Center, Guishan, Taoyuan City 33302, Taiwan, ROC (China); Tu, Shu-Ju [Department of Medical Imaging and Radiological Sciences, Chang Gung University, Guishan, Taoyuan City 33302, Taiwan, ROC (China); Chen, Jyh-Ping [Department of Chemical and Materials Engineering, Chang Gung University, Guishan, Taoyuan City 33302, Taiwan, ROC (China); Ma, Yunn-Hwa, E-mail: yhma@mail.cgu.edu.tw [Department of Physiology and Pharmacology & Healthy Aging Research Center, Guishan, Taoyuan City 33302, Taiwan, ROC (China); Department of Neurology, Chang Gung Memorial Hospital, Guishan, Taoyuan City 33305, Taiwan, ROC (China)

    2017-04-01

    Magnetic force may greatly enhance uptake of magnetic nanoparticles (MNPs) by cultured cells; however, the effects of non-uniformity of magnetic field/ magnetic gradient on MNP internalization in culture has not been elucidated. Cellular uptake of polyacrylic acid coated-MNP by LN229 cells was measured with cylindrical NdFeB magnets arranged in a staggered pattern. The magnetic field generated by placing a magnet underneath (H-field) elicited a homogenous distribution of MNPs on the cells in culture; whereas the field without magnet underneath (L-field) resulted in MNP distribution along the edge of the wells. Cell-associated MNP (MNP{sub cell}) appeared to be magnetic field- and concentration-dependent. In H-field, MNP{sub cell} reached plateau within one hour of exposure to MNP with only one-min application of the magnetic force in the beginning of incubation; continuous presence of the magnet for 2 h did not further increase MNP{sub cell}, suggesting that magnetic force-induced uptake may be primarily contributed to enhanced MNP sedimentation. Although MNP distribution was much inhomogeneous in L-field, averaged MNP{sub cell} in the L-field may reach as high as 80% of that in H-field during 1–6 h incubation, suggesting high capacity of MNP internalization. In addition, no significant difference was observed in MNP{sub cell} analyzed by flow cytometry with the application of H-field of staggered plate vs. filled magnet plate. Therefore, biological variation may dominate MNP internalization even under relatively uniformed magnetic field; whereas non-uniformed magnetic field may serve as a model for tumor targeting with MNPs in vivo. - Graphical abstract: Averaged MNP uptake by glioma cells in the low and non-uniformed magnetic field reached as high as 80% of that in uniformed magnetic field, which is probably due to both heterogeneous distributions of MNPs in the non-uniformed magnetic field and high capacity of the MNP uptake by these cells. - Highlights:

  13. An effective method for smoothing the staggered dose distribution of multi-leaf collimator field edge

    International Nuclear Information System (INIS)

    Hwang, I.-M.; Lin, S.-Y.; Lee, M.-S.; Wang, C.-J.; Chuang, K.-S.; Ding, H.-J.

    2002-01-01

    Purpose: To smooth the staggered dose distribution that occurs in stepped leaves defined by a multi-leaf collimator (MLC). Materials and methods: The MLC Shaper program controlled the stepped leaves, which were shifted in a traveling range, the pattern of shift was from the position of out-bound to in-bound with a one-segment (cross-bound), three-segment, and five-segment shifts. Film was placed at a depth of 1.5 cm and irradiated with the same irradiation dose used for the cerrobend block experiment. Four field edges with the MLC defining at 15 deg., 30 deg., 45 deg., 60 deg. angels relative to the jaw edge were performed, respectively, in this study. For the field edge defined by the multi-segment technique, the amplitude of the isodose lines for 50% isodose line and both the 80% and 20% isodose lines were measured. The effective penumbra widths with 90-10% and 80-20% distances for different irradiations were determined at four field edges with the MLC defining at 15 deg., 30 deg., 45 deg., 60 deg. angels relative to the jaw edge. Results: Use of the five-segment technique for multi-leaf collimation at the 60 deg. angle field edge smoothes each isodose line into an effectively straight line, similar to the pattern achieved using a cerrobend block. The separation of these lines is also important. The 80-20% effective penumbra width with five-segment techniques (8.23 mm) at 60 deg. angle relative to the jaw edge is little wider (1.9 times) than the penumbra of cerrobend block field edge (4.23 mm). We also found that the 90-10% effective penumbra width with five-segment techniques (12.68 mm) at 60 deg. angle relative to the jaw edge is little wider (1.28 times) than the penumbra of cerrobend block field edge (9.89 mm). Conclusion: The multi-segment technique is effective in smoothing the MLC staggered field edge. The effective penumbra width with more segment techniques at larger degree angles relative to the field edge is little wider than the penumbra for a

  14. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  15. A Study of a Powder Coating Gun near Field: A Case of Staggered Concentric Jet Flow

    Directory of Open Access Journals (Sweden)

    Edward Grandmaison

    2013-11-01

    Full Text Available This paper examines, experimentally and numerically, an isothermal coaxial air jet, created by an innovative nozzle design for an air propane torch, used for the thermal deposition of polymers. This design includes staggering the origins of the central and annular jets and creating an annular air jet with an inward radial velocity component. The experimental work used a Pitot tube to measure axial velocity on the jet centerline and in the fully developed flow. The static gauge pressure in the near field was also measured and found to be positive, an unexpected result. The numerical work used Gambit and Fluent. An extensive grid sensitivity study was conducted and it was found that results from a relatively coarse mesh were substantially the same as results from a mesh with almost 11 times the number of control volumes. A thorough evaluation of all of the RANS models in Fluent 6.3.26 found that the flow fields they calculated showed at most partial agreement with the experimental results. The greatest difference between numerical and experimental results was the incorrect prediction by all RANS models of a recirculation zone in the near field on the jet axis. Experimental work showed it did not exist.

  16. The interference between two flat plates normal to a stream in staggered arrangement, 1

    International Nuclear Information System (INIS)

    Hirano, Kimitaka; Kawashima, Akira; Ohsako, Hideyuki.

    1983-01-01

    The clarification of the mutual interference characteristics between the bodies with sharp corners, such as flat plates and rectangular prisms placed perpendicularly to flow, is a fundamental and important problem. But it has not yet been sufficiently clarified. In flat plates, the points of breaking away do not move, a large breaking away region is in the wake, and the thickness is very thin in the direction of main flow. Moreover, a moment arises around the center of flat plates. In this study, a new parameter expressing the influence of channel walls on a single flat plate in the measuring part of two-dimensional wind tunnel experiment was proposed. The change of steady drag coefficient and Strouhal number corresponding to the series and parallel arrangements of two plates was clarified, and the patterns of the mutual interference were classified by using the results of visualizing flow in a circulation tank together. By the experimental results in the widely changed staggered arrangements, the isodrag contour diagram and isomoment contour diagram were drawn, and the general characteristics of mutual interference related to steady drag and moment were clarified. The experimental setup and method and the results are reported. (Kako, I.)

  17. Natural convection heat transfer for a staggered array of heated, horizontal cylinders within a rectangular enclosure

    Energy Technology Data Exchange (ETDEWEB)

    Triplett, C.E.

    1996-12-01

    This thesis presents the results of an experimental investigation of natural convection heat transfer in a staggered array of heated cylinders, oriented horizontally within a rectangular enclosure. The main purpose of this research was to extend the knowledge of heat transfer within enclosed bundles of spent nuclear fuel rods sealed within a shipping or storage container. This research extends Canaan`s investigation of an aligned array of heated cylinders that thermally simulated a boiling water reactor (BWR) spent fuel assembly sealed within a shipping or storage cask. The results are presented in terms of piecewise Nusselt-Rayleigh number correlations of the form Nu = C(Ra){sup n}, where C and n are constants. Correlations are presented both for individual rods within the array and for the array as a whole. The correlations are based only on the convective component of the heat transfer. The radiative component was calculated with a finite-element code that used measured surface temperatures, rod array geometry, and measured surface emissivities as inputs. The correlation results are compared to Canaan`s aligned array results and to other studies of natural convection in horizontal tube arrays.

  18. Natural convection heat transfer for a staggered array of heated, horizontal cylinders within a rectangular enclosure

    International Nuclear Information System (INIS)

    Triplett, C.E.

    1996-12-01

    This thesis presents the results of an experimental investigation of natural convection heat transfer in a staggered array of heated cylinders, oriented horizontally within a rectangular enclosure. The main purpose of this research was to extend the knowledge of heat transfer within enclosed bundles of spent nuclear fuel rods sealed within a shipping or storage container. This research extends Canaan's investigation of an aligned array of heated cylinders that thermally simulated a boiling water reactor (BWR) spent fuel assembly sealed within a shipping or storage cask. The results are presented in terms of piecewise Nusselt-Rayleigh number correlations of the form Nu = C(Ra) n , where C and n are constants. Correlations are presented both for individual rods within the array and for the array as a whole. The correlations are based only on the convective component of the heat transfer. The radiative component was calculated with a finite-element code that used measured surface temperatures, rod array geometry, and measured surface emissivities as inputs. The correlation results are compared to Canaan's aligned array results and to other studies of natural convection in horizontal tube arrays

  19. Development of Non-staggered, SMAC numerical scheme for a two-fluid model

    International Nuclear Information System (INIS)

    Yoon, H. Y.; Jeong, Jae Jun

    2007-06-01

    The SMAC(Simplified Marker And Cell) method, along with the SIMPLE, has long been used efficiently for the computational fluid dynamics. Usually, the majority of the applications are single phase compressible or incompressible fluids, and the numerical methods are to be modified to implement the following items for the analysis of two-phase flows. - Non-staggered grid for the analysis of a complex geometry - Application of the two-phase models - Coupling of the energy conservation equations - Two-phase flows with phase change. In this report, the SMAC Method is reviewed and extended to compressible two-phase flows with phase change. A pilot code CUPID-M is developed using the proposed numerical method. A set of verification calculations are carried out for th CUPID-M. At first, isothermal air-water flow is simulated to verify the numerical method against two-phase flow flow problems. Next, the two-phase flows with phase change are calculated using CUPID-M and the results are compared to that of CUPID-I, which is based on the coupled ICE method. The calculation time is shorter with CUPID-M than with CUPID-I, while the calculations are unstable with CUPID-M for the rapid phase change problems. Thus, CUPID-M and CUPID-I can be used as an user input considering the application problems

  20. An analytical solution for contact resistance of staggered organic field-effect transistors

    Science.gov (United States)

    Karimi-Alavijeh, Hamidreza; Katebi-Jahromi, Alireza

    2017-03-01

    We have developed analytical models for bias dependent contact resistance (RC) and output characteristics of staggered organic field-effect transistors (OFETS) based on a bulk resistance-approximated and mobility-modified current-crowding method. Numerical evaluations of RC and its resistive components show that the bias dependency of the bulk resistance is negligible. Consequently, the properties of the active layer interfaces determine RC and its characteristics. Effective parameters include a normally constant charge injection barrier at the organic-metal interface (Eb) and a gate induced surface carrier-concentration (PS0) at the organic-insulator boundary. The energy barrier pertains to the fabrication process, and its related resistance (rc) can be determined as the fitting parameter of the theoretical model. However, PS0 is strongly gate bias dependent and the results of the numerical model indicate that the resulting component (rch) is dominant and has a considerable effect on RC and its characteristics. More importantly, PS0 as the key parameter of the contact resistance is analytically expressible and by using a proposed mobility-modified current-crowding model, the contact resistance can be analytically formulated. Accordingly, the output characteristics of the OFETs in the triode region can be also analytically modeled using the developed relation of RC.

  1. Large odd-even staggering in the very light platinum isotopes from laser spectroscopy

    CERN Document Server

    Le Blanc, F; Cabaret, L A; Crawford, J E; Duong, H T; Genevey, J; Girod, M; Huber, G; Krieg, M; Lee, J K P; Lettry, Jacques; Lunney, M D; Obert, J; Oms, J; Peru, S; Putaux, J C; Roussière, B; Sauvage, J; Sebastian, V; Zemlyanoi, S G

    1998-01-01

    Laser spectroscopy measurements have been carried out on very neutron-deficient platinum isotopes with the COMPLIS experimental set-up on line with the ISOLDE-Booster facility. For the first time, Hg alpha -decay was exploited to extend the very light platinum chain. Using the 5d/sup 9/6s /sup 3/D/sub 3/ to 5d/sup 9/6p /sup 3/P /sub 2/ optical transition, hyperfine spectra of /sup 182,181,180,179,178/Pt and /sup 183/Pt/sup m/ were recorded for the first time. The variation of the mean square charge radius between these nuclei, the magnetic moments of the odd isotopes and the quadrupole moment of /sup 183/Pt/sup m/ were thus measured. A large deformation change between /sup 183/Pt/sup 9/ and /sup 183/Pt/sup m/, an odd-even staggering of the charge radius and a deformation drop from A=179 are clearly observed. All these results are discussed and compared with microscopic theoretical predictions using Hartree-Fock- Bogolyubov calculations using the Gogny force. (20 refs).

  2. The Effect of First-Step Techniques from the Staggered Stance in American Football

    DEFF Research Database (Denmark)

    Knudsen, Nikolas Sten; Andersen, Thomas Bull

    2017-01-01

    The purpose of this study was to evaluate 3 different starting techniques from the staggered stance with regards to sprint time, reaction time, linear impulse and power. 11 male amateur American football players volunteered to participate in a testing session consisting of twelve 5 m sprints, 4...... in each technique (normal (NORM), backwards false step (BFS) and forwards false step (FFS)) in random order. Sprint starts were performed on force plates to investigate ground reaction forces, reaction time and total sprint time. Analysis showed significant differences in sprint times, with NORM (1.......77±0.10 s) being faster than FFS (1.81±0.12 s) and BFS (2.01±0.13 s), and FFS being faster than BFS, although no differences were found in reaction time. In terms of mean force and power, NORM (331.1±39.2N, 542.2±72.3W) and FFS (320.8±43.2N, 550.9±81.4W) were significantly larger than BFS (256.9±36.2N, 443...

  3. Performance Analysis and Modeling of a Tubular Staggered-Tooth Transverse-Flux PM Linear Machine

    Directory of Open Access Journals (Sweden)

    Shaohong Zhu

    2016-03-01

    Full Text Available This paper investigates the performance analysis and mathematical modeling of a staggered-tooth transverse-flux permanent magnet linear synchronous machine (STTF-PMLSM, which is characterized by simple structure and low flux leakage. Firstly, the structure advantages and operation principle of the STTF-PMLSM are introduced, and a simplified one phase model is established to investigate the performance of the machine in order to save the computation time. Then, the electromagnetic characteristics, including no-load flux linkage, electromotive force (EMF, inductance, detent force and thrust force, are simulated and analyzed in detail. After that, the theoretical analysis of the detent force, thrust force, and power factor are carried out. And the theoretical analysis results are validated with 3-D finite-element method (FEM. Finally, an improved mathematical model of the machine based on d-q rotating coordinate system is proposed, in which inductance harmonics and coupling between d- and q-axis inductance is considered. The results from the proposed mathematical model are in accordance with the results from 3-D FEM, which proves the validity and effectiveness of the proposed mathematical model. This provides a powerful foundation for the control of the machine.

  4. Dave Eggers's a heartbreaking work of staggering genius: memoir as a "pain-relief device".

    Science.gov (United States)

    Miller, Elise

    2011-10-01

    Dave Eggers's memoir is an important addition to the tradition of autobiography in America, and offers significant contributions to our understanding of creativity, sublimation, and the psychology of the memoir-writing process. A Heartbreaking Work of Staggering Genius is really two books--an autobiographical narrative about unbearable suffering, and a book of psychoanalytic commentary on the challenges of writing a memoir about catastrophic loss and trauma. The main narrative suggests the psychological resilience it takes to contain unbearable suffering. The metanarrative renders transparent the mind of someone who is both remembering his losses and constantly reflecting upon the process of writing about them. Eggers's identification with authorship, rather than bereavement or traumatization, may have played an important role in containing his affect and his sense of self when the heartbreaking events were originally unfolding. But a price is paid when a son uses his art to construct a new identity as an author--unconscious conflicts, primitive affect, anxieties about failing, as well as guilt about succeeding--consequences often missed by readers. Heartbreaking is a palimpsest, a story about story-telling superimposed on tales of death and survival, but its messages will be missed unless all its parts are preserved when being read or studied.

  5. Exploration of the horizontally staggered light guides for high concentration CPV applications.

    Science.gov (United States)

    Selimoglu, Ozgur; Turan, Rasit

    2012-08-13

    The material and processing costs are still the major drawbacks of the c-Si based photovoltaic (PV) technology. The wafer cost comprises up to 35-40% of the total module cost. New approaches and system designs are needed in order to reduce the share of the wafer cost in photovoltaic energy systems. Here we explore the horizontally staggered light guide solar optics for use in Concentrated Photovoltaic (CPV) applications. This optical system comprises a lens array system coupled to a horizontal light guide which directs the incoming light beam to its edge. We have designed and simulated this system using a commercial ray tracing software (Zemax). The system is more compact, thinner and more robust compared to the conventional CPV systems. Concentration levels as high as 1000x can easily be reached when the system is properly designed. With such a high concentration level, a good acceptance angle of + -1 degree is still be conserved. The analysis of the system reveals that the total optical efficiency of the system could be as high as %94.4 without any anti-reflection (AR) coating. Optical losses can be reduced by just accommodating a single layer AR coating on the initial lens array leading to a %96.5 optical efficiency. Thermal behavior of high concentration linear concentrator is also discussed and compared with a conventional point focus CPV system.

  6. Chiral phase transition of three flavor QCD with nonzero magnetic field using standard staggered fermions

    Science.gov (United States)

    Tomiya, Akio; Ding, Heng-Tong; Mukherjee, Swagato; Schmidt, Christian; Wang, Xiao-Dan

    2018-03-01

    Lattice simulations for (2+1)-flavor QCD with external magnetic field demon-strated that the quark mass is one of the important parameters responsible for the (inverse) magnetic catalysis. We discuss the dependences of chiral condensates and susceptibilities, the Polyakov loop on the magnetic field and quark mass in three degenerate flavor QCD. The lattice simulations are performed using standard staggered fermions and the plaquette action with spatial sizes Nσ = 16 and 24 and a fixed temporal size Nτ = 4. The value of the quark masses are chosen such that the system undergoes a first order chiral phase transition and crossover with zero magnetic field. We find that in light mass regime, the quark chiral condensate undergoes magnetic catalysis in the whole temperature region and the phase transition tend to become stronger as the magnetic field increases. In crossover regime, deconfinement transition temperature is shifted by the magnetic field when quark mass ma is less than 0:4. The lattice cutoff effects are also discussed.

  7. Ginsparg-Wilson pions scattering in a sea of staggered quarks

    International Nuclear Information System (INIS)

    Chen, J.-W.; O'Connell, Donal; Van de Water, Ruth; Walker-Loud, Andre

    2006-01-01

    We calculate isospin 2 pion-pion scattering in chiral perturbation theory for a partially quenched, mixed action theory with Ginsparg-Wilson valence quarks and staggered sea quarks. We point out that for some scattering channels, the power-law volume dependence of two-pion states in nonunitary theories such as partially quenched or mixed action QCD is identical to that of QCD. Thus one can extract infinite-volume scattering parameters from mixed action simulations. We then determine the scattering length for both 2 and 2+1 sea quarks in the isospin limit. The scattering length, when expressed in terms of the pion mass and the decay constant measured on the lattice, has no contributions from mixed valence-sea mesons, thus it does not depend upon the parameter, C Mix , that appears in the chiral Lagrangian of the mixed theory. In addition, the contributions which nominally arise from operators appearing in the mixed action O(a 2 m q ) Lagrangian exactly cancel when the scattering length is written in this form. This is in contrast to the scattering length expressed in terms of the bare parameters of the chiral Lagrangian, which explicitly exhibits all the sicknesses and lattice spacing dependence allowed by a partially quenched mixed action theory. These results hold for both 2 and 2+1 flavors of sea quarks

  8. Animal physiology and genetic aspects of ryegrass staggers in grazing sheep.

    Science.gov (United States)

    Morris, C A; Wheeler, T T; Henderson, H V; Towers, N R; Phua, S H

    2017-07-01

    Ryegrass staggers (RGS) is a metabolic disease of herbivores, caused by the ingestion of perennial ryegrass (Lolium perenne L.) containing a fungal endophyte (Neotyphodium lolii) which produces a tremorgenic toxin, lolitrem B. RGS has a major economic impact for agriculture in New Zealand as well as internationally. Management of RGS in grazing sheep can be problematic, and there is an incomplete knowledge of the interaction between the toxin and the grazing animal. This review is focused on recent advances in understanding the molecular physiology of RGS in the affected animal as well as the influence of animal genetics on the degree of susceptibility to RGS. Investigations to date suggest that the primary target for toxin is the large conductance, calcium-activated, potassium (BK) channel, resulting in disruption of neuromuscular junction signalling. Genetic investigation has established the existence of genes influencing resistance to RGS, however their identity has not been confirmed and their impact has not been established. Studies to date suggest that a multi-gene selection approach will be necessary in order to develop an effective selection tool for use in the agricultural industries.

  9. Nuclear shape staggering in very neutron deficient Hg isotopes detected by laser spectroscopy

    International Nuclear Information System (INIS)

    Dabkiewicz, P.; Duke, C.; Fischer, H.; Kuehl, T.; Kluge, H.-J.

    1978-01-01

    The isotope shift in the lambda = 2537 A line of the even isotopes 206 Hg, 190 Hg, 188 Hg, 186 Hg, 184 Hg as well as of the I = 13/2 isomers of 191 Hg, 189 Hg, 187 Hg, 185 Hg has been measured by use of a tunable dye laser at the on-line masseparator ISOLDE at CERN. The resulting delta 2 > values follow the line, extrapolated from the chain 205 Hg- 187 Hg which is known to have spherical nuclear shape at the heavy end changing smoothly to slight oblate deformation for the lighter isotopes. Previous measurements of the I = 1/2 groundstates of 181 Hg. 183 Hg and 185 Hg revealed a sharp shape transition to strong deformation. Combined with the new results the following effects can be proved for the first time from the model-independent quantity delta 2 >: 1) the existence of odd even-shape staggering, 2) the coexistence of very different shapes in one and the same nucleus as manifested by the huge isomer shift in 185 Hg, 3) the absence of mixing of the different shapes. (author)

  10. Recurrent spontaneous attacks of dizziness.

    Science.gov (United States)

    Lempert, Thomas

    2012-10-01

    This article describes the common causes of recurrent vertigo and dizziness that can be diagnosed largely on the basis of history. Ninety percent of spontaneous recurrent vertigo and dizziness can be explained by six disorders: (1) Ménière disease is characterized by vertigo attacks, lasting 20 minutes to several hours, with concomitant hearing loss, tinnitus, and aural fullness. Aural symptoms become permanent during the course of the disease. (2) Attacks of vestibular migraine may last anywhere from minutes to days. Most patients have a previous history of migraine headaches, and many experience migraine symptoms during the attack. (3) Vertebrobasilar TIAs affect older adults with vascular risk factors. Most attacks last less than 1 hour and are accompanied by other symptoms from the posterior circulation territory. (4) Vestibular paroxysmia is caused by vascular compression of the eighth cranial nerve. It manifests itself with brief attacks of vertigo that recur many times per day, sometimes with concomitant cochlear symptoms. (5) Orthostatic hypotension causes brief episodes of dizziness lasting seconds to a few minutes after standing up and is relieved by sitting or lying down. In older adults, it may be accompanied by supine hypertension. (6) Panic attacks usually last minutes, occur in specific situations, and are accompanied by choking, palpitations, tremor, heat, and anxiety. Less common causes of spontaneous recurrent vertigo and dizziness include perilymph fistula, superior canal dehiscence, autoimmune inner ear disease, otosclerosis, cardiac arrhythmia, and medication side effects. Neurologists need to venture into otolaryngology, internal medicine, and psychiatry to master the differential diagnosis of recurrent dizziness.

  11. Simulating dam-break over an erodible embankment using SWE-Exner model and semi-implicit staggered scheme

    Science.gov (United States)

    Ambara, M. D.; Gunawan, P. H.

    2018-03-01

    The impact of a dam-break wave on an erodible embankment with a steep slope has been studied recently using both experimental and numerical approaches. In this paper, the semi-implicit staggered scheme for approximating the shallow water-Exner model will be elaborated to describe the erodible sediment on a steep slope. This scheme is known as a robust scheme to approximate shallow water-Exner model. The results are shown in a good agreement with the experimental data. The comparisons of numerical results with data experiment using slopes Φ = 59.04 and Φ = 41.42 by coefficient of Grass formula Ag = 2 × 10‑5 and Ag = 10‑5 respectively are found the closest results to the experiment. This paper can be seen as the additional validation of semi-implicit staggered scheme in the paper of Gunawan, et al (2015).

  12. Tight-binding electrons on triangular and kagome lattices under staggered modulated magnetic fields: quantum Hall effects and Hofstadter butterflies

    Energy Technology Data Exchange (ETDEWEB)

    Li Juan; Wang Yifei; Gong Changde, E-mail: yfwang_nju@hotmail.com [Center for Statistical and Theoretical Condensed Matter Physics, and Department of Physics, Zhejiang Normal University, Jinhua 321004 (China)

    2011-04-20

    We consider the tight-binding models of electrons on a two-dimensional triangular lattice and kagome lattice under staggered modulated magnetic fields. Such fields have two components: a uniform-flux part with strength {phi}, and a staggered-flux part with strength {Delta}{phi}. Various properties of the Hall conductances and Hofstadter butterflies are studied. When {phi} is fixed, variation of {Delta}{phi} leads to the quantum Hall transitions and Chern numbers of Landau subbands being redistributed between neighboring pairs. The energy spectra with nonzero {Delta}{phi}s have similar fractal structures but quite different energy gaps compared with the original Hofstadter butterflies of {Delta}{phi} = 0. Moreover, the fan-like structure of Landau levels in the low magnetic field region is also modified appreciably by {Delta}{phi}.

  13. Postprandial effects of consuming a staggered meal on gut peptide and glycemic responses in obese women and men.

    Science.gov (United States)

    Griffith, Lisa; Haddad, Ella H; Tonstad, Serena

    2016-01-01

    Eating slowly by staggering a meal may reduce energy intake. Our aim was to examine the effect of eating a portion of beans 15min before the rest of the meal, on gastrointestinal (GI) peptides, glucose and insulin concentrations and subsequent energy intake in obese adults. This was a randomised crossover design study with 28 obese subjects. Participants consumed a standardised breakfast on test days followed by test meals: (1) control meal containing 86g (0.5 cup) of beans, and (2) staggered meal in which 86g (0.5 cup) of beans were consumed 15min before the rest of the meal. Blood obtained prior to and at 30, 60, and 120min following the meals was analysed for acylated ghrelin, unacylated ghrelin, glucagon-like peptide-1 (GLP-1), peptide YY, oxyntomodulin, glucose and insulin. Feelings of hunger and satiety were assessed using analog visual scales. Energy intake following the test meal was obtained by computer assisted dietary recalls. Mixed model statistical analysis of data showed time effects for unacylated ghrelin, GLP-1, glucose, insulin, hunger and fullness, however, meal effects were not shown for any of the parameters. GLP-1 area under the curve from baseline to 120min (AUC0-120) decreased by 19% (P=0.024) and that of glucose increased by 7% (P=0.046) following the staggered compared to the control bean meal. Energy intake subsequent to the test meals did not differ between treatments. In conclusion, lengthening meal times by staggering eating did not benefit hormonal, metabolic or appetite control in obese individuals. Copyright © 2015 Asia Oceania Association for the Study of Obesity. Published by Elsevier Ltd. All rights reserved.

  14. JIGSAW-GEO (1.0): locally orthogonal staggered unstructured grid generation for general circulation modelling on the sphere

    Science.gov (United States)

    Engwirda, Darren

    2017-06-01

    An algorithm for the generation of non-uniform, locally orthogonal staggered unstructured spheroidal grids is described. This technique is designed to generate very high-quality staggered Voronoi-Delaunay meshes appropriate for general circulation modelling on the sphere, including applications to atmospheric simulation, ocean-modelling and numerical weather prediction. Using a recently developed Frontal-Delaunay refinement technique, a method for the construction of high-quality unstructured spheroidal Delaunay triangulations is introduced. A locally orthogonal polygonal grid, derived from the associated Voronoi diagram, is computed as the staggered dual. It is shown that use of the Frontal-Delaunay refinement technique allows for the generation of very high-quality unstructured triangulations, satisfying a priori bounds on element size and shape. Grid quality is further improved through the application of hill-climbing-type optimisation techniques. Overall, the algorithm is shown to produce grids with very high element quality and smooth grading characteristics, while imposing relatively low computational expense. A selection of uniform and non-uniform spheroidal grids appropriate for high-resolution, multi-scale general circulation modelling are presented. These grids are shown to satisfy the geometric constraints associated with contemporary unstructured C-grid-type finite-volume models, including the Model for Prediction Across Scales (MPAS-O). The use of user-defined mesh-spacing functions to generate smoothly graded, non-uniform grids for multi-resolution-type studies is discussed in detail.

  15. Development of multi dimensional analysis code for containment safety and performance based on staggered semi-implicit finite volume method

    International Nuclear Information System (INIS)

    Hong, Soon Joon; Hwang, Su Hyun; Han, Tae Young; Lee, Byung Chul; Byun, Choong Sup

    2009-01-01

    A solver of 3-dimensional thermal hydraulic analysis code for a large building having multi rooms such as reactor containment was developed based on 2-phase and 3-field conservation equations. Three fields mean gas, continuous liquid, and dispersed drop. Gas field includes steam, air and hydrogen. Gas motion equation and state equation also considered. Homogeneous and equilibrium conditions were assumed for gas motion equation. Source terms related with phase change were explicitly expressed for the implicit scheme. Resultantly, total 17 independent equations were setup, and total 17 primitive unknowns were identified. Numerical scheme followed the FVM (Finite Volume Method) based on staggered orthogonal structured grid and semi-implicit method. Staggered grid system produces staggered numerical cells of a scalar cell and a vector cell. The porosity method was adopted for easy handling the complex structures inside a computational cell. Such porosity method has been known to be very effective in reducing mesh numbers and acquiring accurate results in spite of fewer meshes. In the actual programming C++ language of OOP (Object Oriented Programming) was used. The code developed by OOP has the features such as the information hiding, encapsulation, modularity and inheritance. These can offer code developers the more explicit and clearer development method. Classes were designed. Cell and Face, and Volume and Component are the bases of the largest Class, System. Class Solver was designed in order to run the solver. Sample runs showed physically reasonable results. The foundation of code was setup through a series of numerical development. (author)

  16. Entropy Stable Staggered Grid Discontinuous Spectral Collocation Methods of any Order for the Compressible Navier--Stokes Equations

    KAUST Repository

    Parsani, Matteo

    2016-10-04

    Staggered grid, entropy stable discontinuous spectral collocation operators of any order are developed for the compressible Euler and Navier--Stokes equations on unstructured hexahedral elements. This generalization of previous entropy stable spectral collocation work [M. H. Carpenter, T. C. Fisher, E. J. Nielsen, and S. H. Frankel, SIAM J. Sci. Comput., 36 (2014), pp. B835--B867, M. Parsani, M. H. Carpenter, and E. J. Nielsen, J. Comput. Phys., 292 (2015), pp. 88--113], extends the applicable set of points from tensor product, Legendre--Gauss--Lobatto (LGL), to a combination of tensor product Legendre--Gauss (LG) and LGL points. The new semidiscrete operators discretely conserve mass, momentum, energy, and satisfy a mathematical entropy inequality for the compressible Navier--Stokes equations in three spatial dimensions. They are valid for smooth as well as discontinuous flows. The staggered LG and conventional LGL point formulations are compared on several challenging test problems. The staggered LG operators are significantly more accurate, although more costly from a theoretical point of view. The LG and LGL operators exhibit similar robustness, as is demonstrated using test problems known to be problematic for operators that lack a nonlinear stability proof for the compressible Navier--Stokes equations (e.g., discontinuous Galerkin, spectral difference, or flux reconstruction operators).

  17. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  18. Mitigating Higher Ed Cyber Attacks

    Science.gov (United States)

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  19. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Science.gov (United States)

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  20. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available taxonomy and ontology RP van Heerden1,2, B Irwin2, ID Burke1, L Leenen1 1CSIR, Pretoria, South Africa 2Rhodes University, Grahamstown, South Africa Keywords/ Key Phrases: Network Attack, Network Attack Classification, Taxonomy, Ontology, Attack... Scenario rvheerden@csir.co.za b.irwin@ru.ac.za iburke@csir.co.za lleenen@csir.co.za Abstract: Computer network attacks differ in the motivation of the entity behind the attack, the execution and the end result. The diversity of attacks has a...

  1. Research of heat transfer of staggered horizontal bundles of finned tubes at free air convection

    Science.gov (United States)

    Novozhilova, A. V.; Maryna, Z. G.; Samorodov, A. V.; Lvov, E. A.

    2017-11-01

    The study of free-convective processes is important because of the cooling problem in many machines and systems, where other ways of cooling are impossible or impractical. Natural convective processes are common in the steam turbine air condensers of electric power plants located within the city limits, in dry cooling towers of circulating water systems, in condensers cooled by air and water, in radiators cooling oil of power electric transformers, in emergency cooling systems of nuclear reactors, in solar power, as well as in air-cooling of power semiconductor energy converters. All this makes actual the synthesis of the results of theoretical and experimental research of free convection for heat exchangers with finned tube bundles. The results of the study of free-convection heat transfer for two-, three- and four-row staggered horizontal bundles of industrial bimetallic finned tubes with finning factor of 16.8 and equilateral tubes arrangement are presented. Cross and diagonal steps in the bundles are the same: 58; 61; 64; 70; 76; 86; 100 mm, which corresponds to the relative steps: 1.042; 1.096; 1.152; 1.258; 1.366; 1.545; 1.797. These steps are standardized for air coolers. An equation for calculating the free-convection heat transfer, taking into account the influence of geometrical parameters in the range of Rayleigh number from 30,000 to 350,000 with an average deviation of ± 4.8%, has been obtained. The relationship presented in the article allows designing a wide range of air coolers for various applications, working in the free convection modes.

  2. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    . In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks...

  3. Being active after a heart attack (image)

    Science.gov (United States)

    ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ...

  4. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within...

  5. Social engineering attack examples, templates and scenarios

    CSIR Research Space (South Africa)

    Mouton, Francois

    2016-06-01

    Full Text Available link. A social engineering attack targets this weakness by using various manipulation techniques to elicit sensitive information. The field of social engineering is still in its early stages with regard to formal definitions, attack frameworks...

  6. Understand Your Risk of Heart Attack

    Science.gov (United States)

    ... Heart-Health Basics Reducing your risk starts with smart choices. If you smoke, stop. The American Heart ... a Second Heart Attack | Spanish Cardiac Rehab Referral Card | Spanish Heart Attack Warning Signs: Patient sheet | Infographic | ...

  7. Can Vitamins Help Prevent a Heart Attack?

    Science.gov (United States)

    ... vitamins help prevent a heart attack? Can taking vitamins help prevent heart disease or a heart attack? Answers ... M.D. It's not yet clear if taking vitamins can reduce your risk of developing heart disease ...

  8. Peacetime Use of Computer Network Attack

    National Research Council Canada - National Science Library

    Busby, Daniel

    2000-01-01

    .... PDD-63 alerts the nation to prepare for impending cyber attacks. This paper examines the nature, scale, and likelihood of cyber attacks posited in PDD-63 and finds that the country does not face an imminent "electronic Pearl Harbor...

  9. Quantifying Shannon's work function for cryptanalytic attacks

    NARCIS (Netherlands)

    van Son, R.J.J.H.

    2010-01-01

    Attacks on cryptographic systems are limited by the available computational resources. A theoretical understanding of these resource limitations is needed to evaluate the security of cryptographic primitives and procedures. This study uses an Attacker versus Environment game formalism based on

  10. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  11. Network Attack Reference Data Set

    Science.gov (United States)

    2004-12-01

    fingerprinting tools include QueSO [10] (literally translates to “what OS”) and nmap [11], however there are a number of additional tools available for...Network Attack Reference Data Set J. McKenna and J. Treurniet Defence R&D Canada √ Ottawa TECHNICAL...collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources

  12. Biometrics Evaluation under Spoofing Attacks

    OpenAIRE

    Chingovska, Ivana; Anjos, André; Marcel, Sébastien

    2014-01-01

    While more accurate and reliable than ever, the trustworthiness of biometric verification systems is compromised by the emergence of spoofing attacks. Responding to this threat, numerous research publications address isolated spoofing detection, resulting in efficient counter-measures for many biometric modes. However, an important, but often overlooked issue regards their engagement into a verification task and how to measure their impact on the verification systems themselves. A novel evalu...

  13. Survey of Sybil Attacks in Social Networks

    OpenAIRE

    Gunturu, Rupesh

    2015-01-01

    This paper reviews the Sybil attack in social networks, which has the potential to compromise the whole distributed network. In the Sybil attack, the malicious user claims multiple identities to compromise the network. Sybil attacks can be used to change the overall ranking in voting applications, bad-mouth an opinion, access resources or to break the trust mechanism behind a P2P network. In this paper, different defense mechanisms used to mitigate Sybil attacks are also reviewed.

  14. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  15. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    is foreseeable while the rounds are performed. ECC (Elliptic Curve Cryptography) is used as a public key crypto system with the key purpose of creating a private shared between two participants in a communication network. Attacks on ECC include the Pohlig-Hellman attack and the Pollard's rho attack. Furthermore...

  16. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  17. The Value of Attack-Defence Diagrams

    NARCIS (Netherlands)

    Hermanns, H.; Krämer, Julia; Krčál, Jan; Stoelinga, Mariëlle Ida Antoinette; Piessens, Frank; Viganò, Luca

    Success or failure of attacks on high-security systems, such as hacker attacks on sensitive data, depend on various situational conditions, including the timing and success chances of single attack steps, and concurrent countermeasures of the defender. With the existing state-of-the-art modelling

  18. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available In this paper we demonstrate how an automated reasoner, HermiT, is used to classify instances of computer network based attacks in conjunction with a network attack ontology. The ontology describes different types of network attacks through classes...

  19. 3D Staggered-Grid Finite-Difference Simulation of Acoustic Waves in Turbulent Moving Media

    Science.gov (United States)

    Symons, N. P.; Aldridge, D. F.; Marlin, D.; Wilson, D. K.; Sullivan, P.; Ostashev, V.

    2003-12-01

    Acoustic wave propagation in a three-dimensional heterogeneous moving atmosphere is accurately simulated with a numerical algorithm recently developed under the DOD Common High Performance Computing Software Support Initiative (CHSSI). Sound waves within such a dynamic environment are mathematically described by a set of four, coupled, first-order partial differential equations governing small-amplitude fluctuations in pressure and particle velocity. The system is rigorously derived from fundamental principles of continuum mechanics, ideal-fluid constitutive relations, and reasonable assumptions that the ambient atmospheric motion is adiabatic and divergence-free. An explicit, time-domain, finite-difference (FD) numerical scheme is used to solve the system for both pressure and particle velocity wavefields. The atmosphere is characterized by 3D gridded models of sound speed, mass density, and the three components of the wind velocity vector. Dependent variables are stored on staggered spatial and temporal grids, and centered FD operators possess 2nd-order and 4th-order space/time accuracy. Accurate sound wave simulation is achieved provided grid intervals are chosen appropriately. The gridding must be fine enough to reduce numerical dispersion artifacts to an acceptable level and maintain stability. The algorithm is designed to execute on parallel computational platforms by utilizing a spatial domain-decomposition strategy. Currently, the algorithm has been validated on four different computational platforms, and parallel scalability of approximately 85% has been demonstrated. Comparisons with analytic solutions for uniform and vertically stratified wind models indicate that the FD algorithm generates accurate results with either a vanishing pressure or vanishing vertical-particle velocity boundary condition. Simulations are performed using a kinematic turbulence wind profile developed with the quasi-wavelet method. In addition, preliminary results are presented

  20. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  1. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  2. Script-viruses Attacks on UNIX OS

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-06-01

    Full Text Available In this article attacks on UNIX OS are considered. Currently antivirus developers are concentrated on protecting systems from viruses that are most common and attack popular operating systems. If the system or its components are not often attacked then the antivirus products are not protecting these components as it is not profitable. The same situation is with script-viruses for UNIX OS as most experts consider that it is impossible for such viruses to get enough rights to attack. Nevertheless the main conclusion of this article is the fact that such viruses can be very powerful and can attack systems and get enough rights.

  3. Stochastic Model of TCP SYN Attacks

    OpenAIRE

    Simona Ramanauskaitė; Antanas Čenys

    2011-01-01

    A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS) attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both...

  4. Dual-mixed finite elements for the three-field Stokes model as a finite volume method on staggered grids

    KAUST Repository

    Kou, Jisheng

    2017-06-09

    In this paper, a new three-field weak formulation for Stokes problems is developed, and from this, a dual-mixed finite element method is proposed on a rectangular mesh. In the proposed mixed methods, the components of stress tensor are approximated by piecewise constant functions or Q1 functions, while the velocity and pressure are discretized by the lowest-order Raviart-Thomas element and the piecewise constant functions, respectively. Using quadrature rules, we demonstrate that this scheme can be reduced into a finite volume method on staggered grid, which is extensively used in computational fluid mechanics and engineering.

  5. Heat transfer of a staggered fining flat-oval tube banks in cross flow at the small Reynolds number

    Directory of Open Access Journals (Sweden)

    Максим Михайлович Вознюк

    2015-05-01

    Full Text Available Experimental investigations of heat transfer of staggered bundles of flat-oval tubes with incomplete transversal finning in the range of Reynolds numbers 500 < <20000 are performed. New calculation correlations for determining of heat transfer coefficients for 1<3000 are suggested, the impact of basic geometric and regime parameters on intensity of external heat transfer are determined. The received calculation depending is possible to use in developing of heat transfer surfaces for “dry” cooling towers and air cooling apparatuses

  6. Effects of Front-Loading and Stagger Angle on Endwall Losses of High Lift Low Pressure Turbine Vanes

    Science.gov (United States)

    2012-09-01

    length scale at z/H = 0.20 ………….… 131 Fig. E.1 Traverse arrangement to enable 3D movement inside the wind tunnel …..… 132 Fig. E.2 Diagram of in...2 ] USAF = United States Air Force 2D = two-dimensional 3D = three-dimensional 1 EFFECTS OF FRONT-LOADING AND STAGGER ANGLE ON ENDWALL...within the wakes. I used Druck LPM 5481 pressure transducers, calibrated using a Ruska 7250LP laboratory standard (the reported accuracy is within

  7. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  8. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  9. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified...... through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....

  10. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  11. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  12. Coronary Artery Dissection: Not Just a Heart Attack

    Science.gov (United States)

    ... Aneurysm More Coronary Artery Dissection: Not Just a Heart Attack Updated:Mar 15,2018 Sometimes a heart attack ... Disease Go Red For Women Types of aneurysms Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) ...

  13. Three-dimensional viscoelastic time-domain finite-difference seismic modelling using the staggered Adams-Bashforth time integrator

    Science.gov (United States)

    Bohlen, Thomas; Wittkamp, Florian

    2016-03-01

    We analyse the performance of a higher order accurate staggered viscoelastic time-domain finite-difference method, in which the staggered Adams-Bashforth (ABS) third-order and fourth-order accurate time integrators are used for temporal discretization. ABS is a multistep method that uses previously calculated wavefields to increase the order of accuracy in time. The analysis shows that the numerical dispersion is much lower than that of the widely used second-order leapfrog method. Numerical dissipation is introduced by the ABS method which is significantly smaller for fourth-order than third-order accuracy. In 1-D and 3-D simulation experiments, we verify the convincing improvements of simulation accuracy of the fourth-order ABS method. In a realistic elastic 3-D scenario, the computing time reduces by a factor of approximately 2.4, whereas the memory requirements increase by approximately a factor of 2.2. The ABS method thus provides an alternative strategy to increase the simulation accuracy in time by investing computer memory instead of computing time.

  14. Joint Interference Alignment and Power Allocation for K-User Multicell MIMO Channel through Staggered Antenna Switching.

    Science.gov (United States)

    Selvaprabhu, Poongundran; Chinnadurai, Sunil; Sarker, Md Abdul Latif; Lee, Moon Ho

    2018-01-28

    In this paper, we characterise the joint interference alignment (IA) and power allocation strategies for a K -user multicell multiple-input multiple-output (MIMO) Gaussian interference channel. We consider a MIMO interference channel with blind-IA through staggered antenna switching on the receiver. We explore the power allocation and feasibility condition for cooperative cell-edge (CE) mobile users (MUs) by assuming that the channel state information is unknown. The new insight behind the transmission strategy of the proposed scheme is premeditated (randomly generated transmission strategy) and partial cooperative CE MUs, where the transmitter is equipped with a conventional antenna, the receiver is equipped with a reconfigurable multimode antenna (staggered antenna switching pattern), and the receiver switches between preset T modes. Our proposed scheme assists and aligns the desired signals and interference signals to cancel the common interference signals because the received signal must have a corresponding independent signal subspace. The capacity for a K -user multicell MIMO Gaussian interference channel with reconfigurable multimode antennas is completely characterised. Furthermore, we show that the proposed K -user multicell MIMO scheduling and K -user L -cell CEUs partial cooperation algorithms elaborate the generalisation of K -user IA and power allocation strategies. The numerical results demonstrate that the proposed intercell interference scheme with partial-cooperative CE MUs achieves better capacity and signal-to-interference plus noise ratio (SINR) performance compared to noncooperative CE MUs and without intercell interference schemes.

  15. Joint Interference Alignment and Power Allocation for K-User Multicell MIMO Channel through Staggered Antenna Switching

    Directory of Open Access Journals (Sweden)

    Poongundran Selvaprabhu

    2018-01-01

    Full Text Available In this paper, we characterise the joint interference alignment (IA and power allocation strategies for a K-user multicell multiple-input multiple-output (MIMO Gaussian interference channel. We consider a MIMO interference channel with blind-IA through staggered antenna switching on the receiver. We explore the power allocation and feasibility condition for cooperative cell-edge (CE mobile users (MUs by assuming that the channel state information is unknown. The new insight behind the transmission strategy of the proposed scheme is premeditated (randomly generated transmission strategy and partial cooperative CE MUs, where the transmitter is equipped with a conventional antenna, the receiver is equipped with a reconfigurable multimode antenna (staggered antenna switching pattern, and the receiver switches between preset T modes. Our proposed scheme assists and aligns the desired signals and interference signals to cancel the common interference signals because the received signal must have a corresponding independent signal subspace. The capacity for a K-user multicell MIMO Gaussian interference channel with reconfigurable multimode antennas is completely characterised. Furthermore, we show that the proposed K-user multicell MIMO scheduling and K-user L-cell CEUs partial cooperation algorithms elaborate the generalisation of K-user IA and power allocation strategies. The numerical results demonstrate that the proposed intercell interference scheme with partial-cooperative CE MUs achieves better capacity and signal-to-interference plus noise ratio (SINR performance compared to noncooperative CE MUs and without intercell interference schemes.

  16. SBP-SAT finite difference discretization of acoustic wave equations on staggered block-wise uniform grids

    KAUST Repository

    Gao, Longfei

    2018-02-16

    We consider the numerical simulation of the acoustic wave equations arising from seismic applications, for which staggered grid finite difference methods are popular choices due to their simplicity and efficiency. We relax the uniform grid restriction on finite difference methods and allow the grids to be block-wise uniform with nonconforming interfaces. In doing so, variations in the wave speeds of the subterranean media can be accounted for more efficiently. Staggered grid finite difference operators satisfying the summation-by-parts (SBP) property are devised to approximate the spatial derivatives appearing in the acoustic wave equation. These operators are applied within each block independently. The coupling between blocks is achieved through simultaneous approximation terms (SATs), which impose the interface condition weakly, i.e., by penalty. Ratio of the grid spacing of neighboring blocks is allowed to be rational number, for which specially designed interpolation formulas are presented. These interpolation formulas constitute key pieces of the simultaneous approximation terms. The overall discretization is shown to be energy-conserving and examined on test cases of both theoretical and practical interests, delivering accurate and stable simulation results.

  17. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    . However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute......Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  18. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  19. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  20. Transient ischemic attack: diagnostic evaluation.

    Science.gov (United States)

    Messé, Steven R; Jauch, Edward C

    2008-08-01

    A transient ischemic attack portends significant risk of a stroke. Consequently, the diagnostic evaluation in the emergency department is focused on identifying high-risk causes so that preventive strategies can be implemented. The evaluation consists of a facilitated evaluation of the patient's metabolic, cardiac, and neurovascular systems. At a minimum, the following tests are recommended: fingerstick glucose level, electrolyte levels, CBC count, urinalysis, and coagulation studies; noncontrast computed tomography (CT) of the head; electrocardiography; and continuous telemetry monitoring. Vascular imaging studies, such as carotid ultrasonography, CT angiography, or magnetic resonance angiography, should be performed on an urgent basis and prioritized according to the patient's risk stratification for disease. Consideration should be given for echocardiography if no large vessel abnormality is identified.

  1. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... to the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools...... of the modelled systems. Our analysis of processes identifies which actions may be performed by whom, at which locations, accessing which data. This allows to compute a superset of audit results---before an incident occurs....

  2. Isospin transport phenomena and odd-even staggering in 84Kr+112,124Sn collisions at 35 AMeV

    Directory of Open Access Journals (Sweden)

    Piantelli S.

    2015-01-01

    Full Text Available Experimental results concerning isospin transport phenomena and odd-even staggering in Z and N distributions are presented. Data refer to 84Kr+112,124Sn collisions at 35AMeV and they were collected with a high resolution FAZIA telescope, able to isotopically resolve ions up to Z ∼ 20. Evidences of isospin diffusion and drift obtained from the /Z behaviour of the detected fragments are discussed. The odd-even staggering both in Z and N is compared with experimental data available in literature, finding that it shows a common trend in different reaction types.

  3. Isospin transport phenomena and odd-even staggering in 84Kr+112,124Sn collisions at 35 AMeV

    Science.gov (United States)

    Piantelli, S.; Casini, G.; Maurenzig, P. R.; Olmi, A.; Barlini, S.; Bini, M.; Carboni, S.; Pasquali, G.; Poggi, G.; Stefanini, A. A.; Valdré, S.; Bougault, R.; Bonnet, E.; Borderie, B.; Chbihi, A.; Frankland, J. D.; Gruyer, D.; Lopez, O.; Le Neindre, N.; Parlog, M.; Rivet, M.-F.; Vient, E.; Rosato, E.; Spadaccini, G.; Vigilante, M.; Bruno, M.; Marchi, T.; Morelli, L.; Cinausero, M.; Degerlier, M.; Gramegna, F.; Kozik, T.; Twarog, T.; Alba, R.; Maiolino, C.; Santonocito, D.

    2015-04-01

    Experimental results concerning isospin transport phenomena and odd-even staggering in Z and N distributions are presented. Data refer to 84Kr+112,124Sn collisions at 35AMeV and they were collected with a high resolution FAZIA telescope, able to isotopically resolve ions up to Z ˜ 20. Evidences of isospin diffusion and drift obtained from the /Z behaviour of the detected fragments are discussed. The odd-even staggering both in Z and N is compared with experimental data available in literature, finding that it shows a common trend in different reaction types.

  4. Security under Uncertainty: Adaptive Attackers Are More Challenging to Human Defenders than Random Attackers

    Directory of Open Access Journals (Sweden)

    Frédéric Moisan

    2017-06-01

    Full Text Available Game Theory is a common approach used to understand attacker and defender motives, strategies, and allocation of limited security resources. For example, many defense algorithms are based on game-theoretic solutions that conclude that randomization of defense actions assures unpredictability, creating difficulties for a human attacker. However, many game-theoretic solutions often rely on idealized assumptions of decision making that underplay the role of human cognition and information uncertainty. The consequence is that we know little about how effective these algorithms are against human players. Using a simplified security game, we study the type of attack strategy and the uncertainty about an attacker's strategy in a laboratory experiment where participants play the role of defenders against a simulated attacker. Our goal is to compare a human defender's behavior in three levels of uncertainty (Information Level: Certain, Risky, Uncertain and three types of attacker's strategy (Attacker's strategy: Minimax, Random, Adaptive in a between-subjects experimental design. Best defense performance is achieved when defenders play against a minimax and a random attack strategy compared to an adaptive strategy. Furthermore, when payoffs are certain, defenders are as efficient against random attack strategy as they are against an adaptive strategy, but when payoffs are uncertain, defenders have most difficulties defending against an adaptive attacker compared to a random attacker. We conclude that given conditions of uncertainty in many security problems, defense algorithms would be more efficient if they are adaptive to the attacker actions, taking advantage of the attacker's human inefficiencies.

  5. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...... engineered as part of this work. This is the first time CSSAs for the Skylake architecture are reported. Our attacks demonstrate that cryptographic applications in cloud computing environments using key-dependent tables for acceleration are still vulnerable even on recent architectures, including Skylake...

  6. Religion and support for suicide attacks.

    Science.gov (United States)

    Ginges, Jeremy; Hansen, Ian; Norenzayan, Ara

    2009-02-01

    In four studies carried out across different cultural, religious, and political contexts, we investigated the association between religion and popular support for suicide attacks. In two surveys of Palestinians and one cognitive priming experiment with Israeli settlers, prayer to God, an index of religious devotion, was unrelated to support for suicide attacks. Instead, attendance at religious services, thought to enhance coalitional commitment, positively predicted support for suicide attacks. In a survey of six religions in six nations, regular attendance at religious services positively predicted a combination of willing martyrdom and out-group hostility, but regular prayer did not. Implications for understanding the role of religion in suicide attacks are discussed.

  7. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    Nai Fovino, Igor; Masera, Marcelo; De Cian, Alessio

    2009-01-01

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  8. Visualizing Risks: Icons for Information Attack Scenarios

    National Research Council Canada - National Science Library

    Hosmer, Hilary

    2000-01-01

    .... Visual attack scenarios help defenders see system ambiguities, imprecision, vulnerabilities and omissions, thus speeding up risk analysis, requirements gathering, safeguard selection, cryptographic...

  9. Validation Method of a Telecommunications Blackout Attack

    National Research Council Canada - National Science Library

    Amado, Joao; Nunes, Paulo

    2005-01-01

    This paper presents an evaluation method of telecommunications infrastructure vulnerabilities, allowing the identification of components that can be attacked in order to achieve a communications blackout...

  10. Cued Panic Attacks in Body Dysmorphic Disorder

    Science.gov (United States)

    Phillips, Katharine A.; Menard, William; Bjornsson, Andri S.

    2013-01-01

    Background Body dysmorphic disorder (BDD) is a common and often severe disorder. Clinical observations suggest that panic attacks triggered by BDD symptoms may be common. However, to our knowledge, no study has examined such panic attacks in BDD. We investigated the prevalence, clinical features, and correlates of BDD-triggered panic attacks in individuals with this disorder. Methods Panic attacks and other variables were assessed using reliable and valid measures in 76 individuals with lifetime DSM-IV BDD. Results 28.9% (95% CI, 18.5%–39.4%) of participants reported lifetime panic attacks triggered by BDD symptoms. The most common triggers of such attacks were feeling that others were looking at or scrutinizing the perceived appearance defects (61.9%), looking in the mirror at perceived defects (38.1%), and being in bright light where perceived defects would be more visible (23.8%). The most common panic attack symptoms were palpitations (86.4%), sweating (66.7%), shortness of breath (63.6%), trembling or shaking (63.6%), and fear of losing control or going crazy (63.6%). Compared to participants without such panic attacks, those with BDD-triggered panic attacks had more severe lifetime BDD, social anxiety, and depressive symptoms, as well as poorer functioning and quality of life on a number of measures. They were also less likely to be employed and more likely to have been psychiatrically hospitalized and to have had suicidal ideation due to BDD. Conclusions Panic attacks triggered by BDD-related situations appear common in individuals with this disorder. BDD-triggered panic attacks were associated with greater symptom severity and morbidity. PMID:23653076

  11. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  12. Staggered-grid finite-difference acoustic modeling with the Time-Domain Atmospheric Acoustic Propagation Suite (TDAAPS).

    Energy Technology Data Exchange (ETDEWEB)

    Aldridge, David Franklin; Collier, Sandra L. (U.S. Army Research Laboratory); Marlin, David H. (U.S. Army Research Laboratory); Ostashev, Vladimir E. (NOAA/Environmental Technology Laboratory); Symons, Neill Phillip; Wilson, D. Keith (U.S. Army Cold Regions Research Engineering Lab.)

    2005-05-01

    This document is intended to serve as a users guide for the time-domain atmospheric acoustic propagation suite (TDAAPS) program developed as part of the Department of Defense High-Performance Modernization Office (HPCMP) Common High-Performance Computing Scalable Software Initiative (CHSSI). TDAAPS performs staggered-grid finite-difference modeling of the acoustic velocity-pressure system with the incorporation of spatially inhomogeneous winds. Wherever practical the control structure of the codes are written in C++ using an object oriented design. Sections of code where a large number of calculations are required are written in C or F77 in order to enable better compiler optimization of these sections. The TDAAPS program conforms to a UNIX style calling interface. Most of the actions of the codes are controlled by adding flags to the invoking command line. This document presents a large number of examples and provides new users with the necessary background to perform acoustic modeling with TDAAPS.

  13. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  14. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...

  15. Attack Tree Generation by Policy Invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identi﬿cation. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identi﬿ed

  16. Investigating the iatrogenic effects of repeated suicidal ideation screening on suicidal and depression symptoms: A staggered sequential study.

    Science.gov (United States)

    Hom, Melanie A; Stanley, Ian H; Rogers, Megan L; Gallyer, Austin J; Dougherty, Sean P; Davis, Lisa; Joiner, Thomas E

    2018-02-21

    Research suggests that screening for suicidality does not have iatrogenic effects; however, less is known regarding the impact of repeatedly screening for suicidal ideation among individuals with varying levels of exposure to these screenings. This staggered sequential study evaluated whether suicidal ideation severity increases with repeated screening for suicidal ideation and depression symptoms. Undergraduates (N = 207) were recruited at one of four time points (baseline [n = 37], 1 month later [n = 61], 4 months later [n = 55], and 12 months later [n = 54]) to complete the self-report Beck Depression Inventory (BDI). Participants completed the BDI at the time point at which they were recruited and all subsequent study time points. Non-parametric tests were employed to compare suicidal ideation severity (BDI Item 9) and depression symptom severity (BDI total score): (1) within each group across time points and (2) within each time point across groups. Suicidal ideation severity did not significantly differ within any group across time points, and for two groups, depression symptom severity decreased over time. For analyses between groups, suicidal ideation and depression symptom scores were, at times, significantly lower during subsequent BDI completion time points. This study utilized a relatively small sample size and participants of low clinical severity. Findings align with prior research indicating that suicidality screening is not iatrogenic. This study also expanded upon previous studies by leveraging a staggered sequential design to compare suicidal ideation and depression symptom severity among individuals with varying exposure to suicidal ideation screenings. Copyright © 2018 Elsevier B.V. All rights reserved.

  17. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian

    2014-01-01

    In this paper we combine two powerful methods of symmetric cryptanalysis: rotational cryptanalysis and the rebound attack. Rotational cryptanalysis was designed for the analysis of bit-oriented designs like ARX (Addition-Rotation-XOR) schemes. It has been applied to several hash functions and block...... ciphers, including the new standard SHA-3 (Keccak). The rebound attack is a start-from-the-middle approach for finding differential paths and conforming pairs in byte-oriented designs like Substitution-Permutation networks and AES. We apply our new compositional attack to the reduced version of the hash...... function Skein, a finalist of the SHA-3 competition. Our attack penetrates more than two thirds of the Skein core—the cipher Threefish, and made the designers to change the submission in order to prevent it. The rebound part of our attack has been significantly enhanced to deliver results on the largest...

  18. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  19. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  20. Two Improved Multiple-Differential Collision Attacks

    Directory of Open Access Journals (Sweden)

    An Wang

    2014-01-01

    Full Text Available In CHES 2008, Bogdanov proposed multiple-differential collision attacks which could be applied to the power analysis attacks on practical cryptographic systems. However, due to the effect of countermeasures on FPGA, there are some difficulties during the collision detection, such as local high noise and the lack of sampling points. In this paper, keypoints voting test is proposed for solving these problems, which can increase the success ratio from 35% to 95% on the example of one implementation. Furthermore, we improve the ternary voting test of Bogdanov, which can improve the experiment efficiency markedly. Our experiments show that the number of power traces required in our attack is only a quarter of the requirement of traditional attack. Finally, some alternative countermeasures against our attacks are discussed.

  1. Towards the development of a fully coupled arterial-venous 1D model: suitability of using a 1D finite volume method with staggered spatial discretization

    CSIR Research Space (South Africa)

    Bogaers, Alfred EJ

    2012-07-01

    Full Text Available In this paper we outline the development of a 1D finite volume model to solve for blood flow through the arterial system. The model is based on a staggered spatial discretization which leads to a stable solution scheme. This scheme can accurately...

  2. 49 CFR Figure 1 to Subpart B of... - Example of Location and Staggering of Emergency Window Exits-§ 238.113

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Example of Location and Staggering of Emergency Window Exits-§ 238.113 1 Figure 1 to Subpart B of Part 238 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD ADMINISTRATION, DEPARTMENT OF TRANSPORTATION PASSENGER EQUIPMENT...

  3. 49 CFR Figure 2 to Subpart B of... - Example of a Multi-Level Car Complying with Window Location and Staggering Requirements-§§ 238...

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Example of a Multi-Level Car Complying with Window Location and Staggering Requirements-§§ 238.113 and 238.114 2 Figure 2 to Subpart B of Part 238 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD ADMINISTRATION...

  4. 29 CFR Appendix H to Subpart R of... - Double Connections: Illustration of a Clipped End Connection and a Staggered Connection: Non...

    Science.gov (United States)

    2010-07-01

    ... Connection and a Staggered Connection: Non-Mandatory Guidelines for Complying With § 1926.756(c)(1) H Appendix H to Subpart R of Part 1926 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY... CONSTRUCTION Steel Erection Pt. 1926, Subpt. R, App. H Appendix H to Subpart R of Part 1926—Double Connections...

  5. Hill-Climbing Attacks and Robust Online Signature Verification Algorithm against Hill-Climbing Attacks

    Science.gov (United States)

    Muramatsu, Daigo

    Attacks using hill-climbing methods have been reported as a vulnerability of biometric authentication systems. In this paper, we propose a robust online signature verification algorithm against such attacks. Specifically, the attack considered in this paper is a hill-climbing forged data attack. Artificial forgeries are generated offline by using the hill-climbing method, and the forgeries are input to a target system to be attacked. In this paper, we analyze the menace of hill-climbing forged data attacks using six types of hill-climbing forged data and propose a robust algorithm by incorporating the hill-climbing method into an online signature verification algorithm. Experiments to evaluate the proposed system were performed using a public online signature database. The proposed algorithm showed improved performance against this kind of attack.

  6. Protecting complex infrastructures against multiple strategic attackers

    Science.gov (United States)

    Hausken, Kjell

    2011-01-01

    Infrastructures are analysed subject to defence by a strategic defender and attack by multiple strategic attackers. A framework is developed where each agent determines how much to invest in defending versus attacking each of multiple targets. A target can have economic, human and symbolic values, which generally vary across agents. Investment expenditure functions for each agent can be linear in the investment effort, concave, convex, logistic, can increase incrementally, or can be subject to budget constraints. Contest success functions (e.g., ratio and difference forms) determine the probability of a successful attack on each target, dependent on the relative investments of the defender and attackers on each target, and on characteristics of the contest. Targets can be in parallel, in series, interlinked, interdependent or independent. The defender minimises the expected damage plus the defence expenditures. Each attacker maximises the expected damage minus the attack expenditures. The number of free choice variables equals the number of agents times the number of targets, or lower if there are budget constraints. Each agent is interested in how his investments vary across the targets, and the impact on his utilities. Alternative optimisation programmes are discussed, together with repeated games, dynamic games and incomplete information. An example is provided for illustration.

  7. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Sakuta, Hidenari

    2007-01-01

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  8. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approac...... inside-out computations and neutral bits in the inbound phase of the rebound attack, and give well-defined rotational distinguishers as certificates of weaknesses for the compression functions and block ciphers.......In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...... and the Threefish cipher. The new techniques include an analytical search for optimal input values in the rotational cryptanalysis, which allows to extend the outbound phase of the attack with a precomputation phase, an approach never used in any rebound-style attack before. Further we show how to combine multiple...

  9. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    Energy Technology Data Exchange (ETDEWEB)

    Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

    2011-10-01

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

  10. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  11. Calcium Supplements: A Risk Factor for Heart Attack?

    Science.gov (United States)

    ... for heart attack? I've read that calcium supplements may increase the risk of heart attack. Is ... Some doctors think it's possible that taking calcium supplements may increase your risk of a heart attack. ...

  12. Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals

    Directory of Open Access Journals (Sweden)

    Xiapu Luo

    2009-01-01

    Full Text Available This paper addresses the important problem of detecting pulsing denial of service (PDoS attacks which send a sequence of attack pulses to reduce TCP throughput. Unlike previous works which focused on a restricted form of attacks, we consider a very broad class of attacks. In particular, our attack model admits any attack interval between two adjacent pulses, whether deterministic or not. It also includes the traditional flooding-based attacks as a limiting case (i.e., zero attack interval. Our main contribution is Vanguard, a new anomaly-based detection scheme for this class of PDoS attacks. The Vanguard detection is based on three traffic anomalies induced by the attacks, and it detects them using a CUSUM algorithm. We have prototyped Vanguard and evaluated it on a testbed. The experiment results show that Vanguard is more effective than the previous methods that are based on other traffic anomalies (after a transformation using wavelet transform, Fourier transform, and autocorrelation and detection algorithms (e.g., dynamic time warping.

  13. Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals

    Science.gov (United States)

    Luo, Xiapu; Chan, Edmond W. W.; Chang, Rocky K. C.

    2009-12-01

    This paper addresses the important problem of detecting pulsing denial of service (PDoS) attacks which send a sequence of attack pulses to reduce TCP throughput. Unlike previous works which focused on a restricted form of attacks, we consider a very broad class of attacks. In particular, our attack model admits any attack interval between two adjacent pulses, whether deterministic or not. It also includes the traditional flooding-based attacks as a limiting case (i.e., zero attack interval). Our main contribution is Vanguard, a new anomaly-based detection scheme for this class of PDoS attacks. The Vanguard detection is based on three traffic anomalies induced by the attacks, and it detects them using a CUSUM algorithm. We have prototyped Vanguard and evaluated it on a testbed. The experiment results show that Vanguard is more effective than the previous methods that are based on other traffic anomalies (after a transformation using wavelet transform, Fourier transform, and autocorrelation) and detection algorithms (e.g., dynamic time warping).

  14. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  15. On localization attacks against cloud infrastructure

    Science.gov (United States)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  16. Marine Attack on Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Ad

    2002-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  17. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  18. Outdoor Air Pollution, Heart Attack and Stroke

    Science.gov (United States)

    Elevated outdoor ambient air particle pollution triggers heart attacks, strokes, and abnormal heart rhythms and worsens heart failure in individuals at high risk due to underlying medical conditions. Emergency Medical Services in communities are the first responders to these eme...

  19. Heuristic attacks against graphical password generators

    CSIR Research Space (South Africa)

    Peach, S

    2010-05-01

    Full Text Available In this paper the authors explore heuristic attacks against graphical password generators. A new trend is emerging to use user clickable pictures to generate passwords. This technique of authentication can be successfully used for - for example...

  20. Twisted Polynomials and Forgery Attacks on GCM

    DEFF Research Database (Denmark)

    Abdelraheem, Mohamed Ahmed A. M. A.; Beelen, Peter; Bogdanov, Andrey

    2015-01-01

    nonce misuse resistance, such as POET. The algebraic structure of polynomial hashing has given rise to security concerns: At CRYPTO 2008, Handschuh and Preneel describe key recovery attacks, and at FSE 2013, Procter and Cid provide a comprehensive framework for forgery attacks. Both approaches rely...... heavily on the ability to construct forgery polynomials having disjoint sets of roots, with many roots (“weak keys”) each. Constructing such polynomials beyond naïve approaches is crucial for these attacks, but still an open problem. In this paper, we comprehensively address this issue. We propose to use...... in an improved key recovery algorithm. As cryptanalytic applications of our twisted polynomials, we develop the first universal forgery attacks on GCM in the weak-key model that do not require nonce reuse. Moreover, we present universal weak-key forgeries for the nonce-misuse resistant AE scheme POET, which...

  1. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  2. Joint Warfighting: Attacking Time-Critical Targets

    National Research Council Canada - National Science Library

    Lewis, Jerry

    2001-01-01

    .... While DOD has developed and fielded considerable capability to detect, assess, and attack most fixed enemy targets, experiences in the Persian Gulf and more recently in Kosovo revealed that DOD...

  3. ATTACK WARNING: Costs to Modernize NORAD's Computer System Significantly Understated

    National Research Council Canada - National Science Library

    Cross, F

    1991-01-01

    ...) Integrated Tactical Warning and Attack Assessment (ITW/AA) system. These subsystems provide critical strategic surveillance and attack warning and assessment information to United States and Canadian leaders...

  4. Consciousness in Non-Epileptic Attack Disorder

    OpenAIRE

    Reuber, M.; Kurthen, M.

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of\\ud consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research\\ud literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context\\ud of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consci...

  5. Semantic Identification Attacks on Web Browsing

    OpenAIRE

    Guha, Neel

    2016-01-01

    We introduce a Semantic Identification Attack, in which an adversary uses semantic signals about the pages visited in one browsing session to identify other browsing sessions launched by the same user. This attack allows an adver- sary to determine if two browsing sessions originate from the same user regardless of any measures taken by the user to disguise their browser or network. We use the MSNBC Anonymous Browsing data set, which contains a large set of user visits (labeled by category) t...

  6. Panic Attack History and Smoking Topography

    Science.gov (United States)

    Farris, Samantha G.; Brown, Lily A.; Goodwin, Renee D.; Zvolensky, Michael J.

    2016-01-01

    Background Little is known about panic attacks and puffing topography, a behavioral index of the value of smoking reinforcement. This study examined smoking style during the course of smoking of a single cigarette among adult daily smokers with and without a history of panic attacks. Method Participants (n = 124, Mage = 43.9, SD = 9.7; 44.4% female) were non-treatment seeking daily smokers. Lifetime panic attack history was assessed via diagnostic assessment; 28.2% (n = 35) of the sample had a panic attack history. Participants smoked one cigarette during an ad libitum smoking trial. Puff volume, duration, and inter-puff interval were measured using the Clinical Research Support System (CReSS) pocket device. Results Regression analyses revealed that panic attack status was not associated with significant differences in average puff volume, duration, or inter-puff interval. Multi-level modeling was used to examine puffing trajectories. Puff-level data revealed that there was a significant quadratic time x panic effect for puff volume and duration. Those with a panic attack history demonstrated relatively sustained levels of both puff volume and duration over time, whereas those without a history of panic attacks demonstrated an increase followed by a decrease in volume and duration over time. These effects were not accounted for by the presence of general psychopathology. Discussion Smokers with a panic attack history demonstrate more persistent efforts to self-regulate the delivery of nicotine, and thus may be at risk for continued smoking and dependence. Tailored treatment may be needed to address unique vulnerabilities among this group. PMID:28033542

  7. Attack by Pyemotes johnmoseri (Acari: Pyemotidae)

    Science.gov (United States)

    Tulin Askit; Ibrahim Cakmak; John Moser

    2007-01-01

    The Aegean Region of Turkey is one of the largest dried fig producers in the world. A Turkish cultivar sarilop (Ficus carica cv. Calimyrna L.) possesses good qualities for drying process, and has been grown extensively for many years in Turkey. Hypoborus ficus is the most common xylophagous insect attacking fig trees in Aydin (Aks¸it et al. 2003). This pest attacks...

  8. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  9. Statin prescribing for people with severe mental illnesses: a staggered cohort study of 'real-world' impacts.

    Science.gov (United States)

    Blackburn, R; Osborn, D; Walters, K; Falcaro, M; Nazareth, I; Petersen, I

    2017-03-07

    To estimate the 'real-world effectiveness of statins for primary prevention of cardiovascular disease (CVD) and for lipid modification in people with severe mental illnesses (SMI), including schizophrenia and bipolar disorder. Series of staggered cohorts. We estimated the effect of statin prescribing on CVD outcomes using a multivariable Poisson regression model or linear regression for cholesterol outcomes. 587 general practice (GP) surgeries across the UK reporting data to The Health Improvement Network. All permanently registered GP patients aged 40-84 years between 2002 and 2012 who had a diagnosis of SMI. Exclusion criteria were pre-existing CVD, statin-contraindicating conditions or a statin prescription within the 24 months prior to the study start. One or more statin prescriptions during a 24-month 'baseline' period (vs no statin prescription during the same period). The primary outcome was combined first myocardial infarction and stroke. All-cause mortality and total cholesterol concentration were secondary outcomes. We identified 2944 statin users and 42 886 statin non-users across the staggered cohorts. Statin prescribing was not associated with significant reduction in CVD events (incident rate ratio 0.89; 95% CI 0.68 to 1.15) or all-cause mortality (0.89; 95% CI 0.78 to 1.02). Statin prescribing was, however, associated with statistically significant reductions in total cholesterol of 1.2 mmol/L (95% CI 1.1 to 1.3) for up to 2 years after adjusting for differences in baseline characteristics. On average, total cholesterol decreased from 6.3 to 4.6 in statin users and 5.4 to 5.3 mmol/L in non-users. We found that statin prescribing to people with SMI in UK primary care was effective for lipid modification but not CVD events. The latter finding may reflect insufficient power to detect a smaller effect size than that observed in randomised controlled trials of statins in people without SMI. Published by the BMJ Publishing Group Limited. For

  10. Combined Heuristic Attack Strategy on Complex Networks

    Directory of Open Access Journals (Sweden)

    Marek Šimon

    2017-01-01

    Full Text Available Usually, the existence of a complex network is considered an advantage feature and efforts are made to increase its robustness against an attack. However, there exist also harmful and/or malicious networks, from social ones like spreading hoax, corruption, phishing, extremist ideology, and terrorist support up to computer networks spreading computer viruses or DDoS attack software or even biological networks of carriers or transport centers spreading disease among the population. New attack strategy can be therefore used against malicious networks, as well as in a worst-case scenario test for robustness of a useful network. A common measure of robustness of networks is their disintegration level after removal of a fraction of nodes. This robustness can be calculated as a ratio of the number of nodes of the greatest remaining network component against the number of nodes in the original network. Our paper presents a combination of heuristics optimized for an attack on a complex network to achieve its greatest disintegration. Nodes are deleted sequentially based on a heuristic criterion. Efficiency of classical attack approaches is compared to the proposed approach on Barabási-Albert, scale-free with tunable power-law exponent, and Erdős-Rényi models of complex networks and on real-world networks. Our attack strategy results in a faster disintegration, which is counterbalanced by its slightly increased computational demands.

  11. On the anatomy of social engineering attacks: A literature-based dissection of successful attacks

    OpenAIRE

    Bullée, Jan Willem Hendrik; Montoya, Lorena; Pieters, W.; Junger, M.; Hartel, P.H.

    2018-01-01

    The aim of this study was to explore the extent to which persuasion principles are used in successful social engineering attacks. Seventy-four scenarios were extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenario was split into attack steps, containing single interactions between offender and target. For each attack step, persuasion principles were identified. The main findings are that (a) persuasion principles are often used in social engineer...

  12. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  13. Predicting Factors of Zone 4 Attack in Volleyball.

    Science.gov (United States)

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  14. Periodically fully developed laminar flow and heat transfer in a two-dimensional horizontal channel with staggered fins

    Directory of Open Access Journals (Sweden)

    Turgut Oğuz

    2017-01-01

    Full Text Available The 2-D periodically fully developed laminar forced convection fluid flow and heat transfer characteristics in a horizontal channel with staggered fins are investigated numerically under constant wall heat flux boundary condition. Study is performed using ANSYS Fluent 6.3.26 which uses finite volume method. Air (Pr @ 0.7 and Freon-12 (Pr @ 3.5 are used as working fluids. Effects of Reynolds number, Prandtl number, fin height, and distances between two fins on heat transfer and friction factor are examined. Results are given in the form of non-dimensional average Nusselt number and average Darcy friction factor as a function of Reynolds number for different fin distances and Prandtl numbers. The velocity and temperature profiles are also obtained. It is seen that as the fin distance increases, behavior approaches the finless channel, as expected. Also, thermal enhancement factors are given graphically for working fluids. It is seen that heat transfer dominates the friction as both the distance between two fins and Prandtl number increase. It is also seen that fins having blockage ratio of 0.10 in 2-D periodically fully developed laminar flow is not advantageous in comparison to smooth channel without fins.

  15. Interim analysis based on the weighted log-rank test for delayed treatment effects under staggered patient entry.

    Science.gov (United States)

    Yoshida, Mizuki; Matsuyama, Yutaka

    2016-01-01

    Fleming and Harrington's G(ρ,γ) class of weighted log-rank tests is appropriate for detecting delayed treatment effects such as those seen in cancer vaccines. A conditional power (CP) and an alpha spending function (ASF) approach are useful for interim analyses that are conducted with the aim of early termination due to futility and efficacy, respectively. However, calculation of the CP and the total Type I error probability are often not considered for delayed effects under the staggered patient entry. In this article, we first propose methods for calculating the CP analytically based on the weighted log-rank test. We compared the performances of the proposed methods with two other methods (i.e., usual log-rank test and optimal one) under the delayed alternatives. Our simulations demonstrated that the CP based on the weighted log-rank test was more powerful than that of the usual log-rank test and was comparable to the CP based on the optimal log-rank test. Second, we quantitatively evaluated the degree to which the Type I error probability was inflated when an ASF approach with forced independent increments assumption was applied to the weighted log-rank test. The proposed method will provide valuable tools in the decision-making stage of the interim analysis.

  16. Localizing gene regulation reveals a staggered wood decay mechanism for the brown rot fungus Postia placenta

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Jiwei; Presley, Gerald N.; Hammel, Kenneth E.; Ryu, Jae-San; Menke, Jon R.; Figueroa, Melania; Hu, Dehong; Orr, Galya; Schilling, Jonathan S.

    2016-09-12

    The fungi that cause brown rot of wood are essential contributors to biomass recycling in forest ecosystems. Their highly efficient cellulolytic systems, which may have practical applications, apparently depend on a combination of two mechanisms: nonselective oxidation of the lignocellulose by reactive oxygen species (ROS) coupled with hydrolysis of the polysaccharide components by a limited set of glycoside hydrolases (GHs). Since the production of strongly oxidizing ROS appears incompatible with the operation of GHs, it has been proposed that the fungi regulate ROS production by maintaining concentration gradients of the chelated metal ions they use to generate extracellular oxidants. However, calculations have indicated that this protective mechanism is physically infeasible. We examined a different hypothesis, that expression of ROS and GH components is temporally staggered by brown rot fungi in wood. We sectioned thin wafers of spruce and aspen that had been colonized directionally by Postia placenta and measured expression of relevant genes and some of the encoded enzymes, thus using the spatial distribution of fungal hyphae to resolve a fine-scale temporal sequence. Hierarchical clustering of gene expression for eight oxidoreductases thought to have a role in ROS production and of eight GHs revealed a zone of oxidoreductase upregulation at the hyphal front that persisted about 48 h before upregulation of the GHs. Additional evidence for differential expression was provided by localization of endoglucanase, xylanase, mannanase, and laccase activities in the colonized wood. Our results support a two-step mechanism for brown rot, in which substrate oxidation precedes enzymatic hydrolysis.

  17. Pathologic features of fatal shark attacks.

    Science.gov (United States)

    Byard, R W; Gilbert, J D; Brown, K

    2000-09-01

    To examine the pattern of injuries in cases of fatal shark attack in South Australian waters, the authors examined the files of their institution for all cases of shark attack in which full autopsies had been performed over the past 25 years, from 1974 to 1998. Of the seven deaths attributed to shark attack during this period, full autopsies were performed in only two cases. In the remaining five cases, bodies either had not been found or were incomplete. Case 1 was a 27-year-old male surfer who had been attacked by a shark. At autopsy, the main areas of injury involved the right thigh, which displayed characteristic teeth marks, extensive soft tissue damage, and incision of the femoral artery. There were also incised wounds of the right wrist. Bony injury was minimal, and no shark teeth were recovered. Case 2 was a 26-year-old male diver who had been attacked by a shark. At autopsy, the main areas of injury involved the left thigh and lower leg, which displayed characteristic teeth marks, extensive soft tissue damage, and incised wounds of the femoral artery and vein. There was also soft tissue trauma to the left wrist, with transection of the radial artery and vein. Bony injury was minimal, and no shark teeth were recovered. In both cases, death resulted from exsanguination following a similar pattern of soft tissue and vascular damage to a leg and arm. This type of injury is in keeping with predator attack from underneath or behind, with the most severe injuries involving one leg. Less severe injuries to the arms may have occurred during the ensuing struggle. Reconstruction of the damaged limb in case 2 by sewing together skin, soft tissue, and muscle bundles not only revealed that no soft tissue was missing but also gave a clearer picture of the pattern of teeth marks, direction of the attack, and species of predator.

  18. Analysis and Optimization of a Novel 2-D Magnet Array with Gaps and Staggers for a Moving-Magnet Planar Motor

    Science.gov (United States)

    Chen, Xuedong; Zeng, Lizhan

    2018-01-01

    This paper presents a novel 2-D magnet array with gaps and staggers, which is especially suitable for magnetically levitated planar motor with moving magnets. The magnetic flux density distribution is derived by Fourier analysis and superposition. The influences of gaps and staggers on high-order harmonics and flux density were analyzed, and the optimized design is presented. Compared with the other improved structures based on traditional Halbach magnet arrays, the proposed design has the lowest high-order harmonics percentage, and the characteristics of flux density meet the demand of high acceleration in horizontal directions. It is also lightweight and easy to manufacture. The proposed magnet array was built, and the calculation results have been verified with experiment. PMID:29300323

  19. Know the Warning Signs of a Heart Attack

    Science.gov (United States)

    ... No. 22 Know the Warning Signs of a Heart Attack What is a heart attack? Aheart attack happens when the blood vessels that ... hurting your heart muscle. Another name for a heart attack is myocardial infarction, or MI. If you have ...

  20. 12 CFR 263.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  1. 12 CFR 509.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding....17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  2. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  3. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  4. Panic Attack during Elective Gastrointestinal Endoscopy

    Directory of Open Access Journals (Sweden)

    Charalampos Mitsonis

    2011-01-01

    Full Text Available Background. Esophagogastroduodenoscopy (EGD and colonoscopy (CS can evoke anxiety, embarrassment, and discomfort. These concerns can culminate in panic attacks, which may traumatize patients and significantly decrease their compliance to the procedure. The objective of this study was to evaluate the relationship between preendoscopic anxiety and the possibility of a panic attack during an elective gastrointestinal endoscopy (EGE. Methods. The study population comprised of 79 Greek outpatients. The examination was carried out without the use of conscious sedation. Patients' anxiety levels were assessed before the procedure using the Greek version of the Spielberger State-Trait Anxiety Inventory (STAI-Y. Results. Seventy-nine patients were enrolled: 45 EGD and 34 CS. Females had higher state and trait anxiety levels than males (48.14 ± 7.94 versus 44.17 ± 7.43, <0.05; and 43.68 ± 6.95 versus 39.86 ± 7.46, <0.05. Patients who experienced panic attack had significantly higher levels of both trait and state anxiety, compared to those who were panic-free. There was no significant relationship between panic attacks and sex or type of procedure. Conclusions. Patients who experience panic attacks during endoscopic procedures appear to have significantly higher anxiety levels before the procedure. Administering the STAI questionnaire prior to the endoscopy seems to be a useful screening method for vulnerable patients.

  5. Theoretical investigation of GaAsBi/GaAsN tunneling field-effect transistors with type-II staggered tunneling junction

    Science.gov (United States)

    Wang, Yibo; Liu, Yan; Han, Genquan; Wang, Hongjuan; Zhang, Chunfu; Zhang, Jincheng; Hao, Yue

    2017-06-01

    We investigate GaAsBi/GaAsN system for the design of type-II staggered hetero tunneling field-effect transistor (hetero-TFET). Strain-symmetrized GaAsBi/GaAsN with effective lattice match to GaAs exhibits a type-II band lineup, and the effective bandgap EG,eff at interface is significantly reduced with the incorporation of Bi and N elements. The band-to-band tunneling (BTBT) rate and drive current of GaAsBi/GaAsN hetero-TFETs are boosted due to the utilizing of the type-II staggered tunneling junction with the reduced EG,eff. Numerical simulation shows that the drive current and subthreshold swing (SS) characteristics of GaAsBi/GaAsN hetero-TFETs are remarkably improved by increasing Bi and N compositions. The dilute content GaAs0.85Bi0.15/GaAs0.92N0.08 staggered hetero-nTFET achieves 7.8 and 550 times higher ION compared to InAs and In0.53Ga0.47As homo-TFETs, respectively, at the supply voltage of 0.3 V. GaAsBi/GaAsN heterostructure is a potential candidate for high performance TFET.

  6. A Study of the Transient Response of Duct Junctions: Measurements and Gas-Dynamic Modeling with a Staggered Mesh Finite Volume Approach

    Directory of Open Access Journals (Sweden)

    Antonio J. Torregrosa

    2017-05-01

    Full Text Available Duct junctions play a major role in the operation and design of most piping systems. The objective of this paper is to establish the potential of a staggered mesh finite volume model as a way to improve the description of the effect of simple duct junctions on an otherwise one-dimensional flow system, such as the intake or exhaust of an internal combustion engine. Specific experiments have been performed in which different junctions have been characterized as a multi-port, and that have provided precise and reliable results on the propagation of pressure pulses across junctions. The results obtained have been compared to simulations performed with a staggered mesh finite volume method with different flux limiters and different meshes and, as a reference, have also been compared with the results of a more conventional pressure loss-based model. The results indicate that the staggered mesh finite volume model provides a closer description of wave dynamics, even if further work is needed to establish the optimal calculation settings.

  7. A Priori Estimates of Solution of a Homogeneous Boundary Value Problem for Parabolic Type Equations by the Discontinuous Galerkin Method on Staggered Grids

    Directory of Open Access Journals (Sweden)

    Ruslan V. Zhalnin

    2017-12-01

    Full Text Available Introduction: In this paper, we present a priori error analysis of the solution of a homogeneous boundary value problem for a second-order differential equation by the discontinuous Galerkin method on staggered grids. Materials and Methods: This study is based on the unified hp-version error analysis of local discontinuous Galerkin method proposed by Castillo et al. [Optimal a priori error estimates for the hp-version of the local discontinuous Galerkin method for convection-diffusion problems, 2002]. The purpose of this paper is to present a new approach to the error analysis of the solution of parabolic equations by the discontinuous Galerkin method on staggered grids. Results: We suggest that approximation errors depend on the characteristic size of the cells and the degree of polynomials used in the basis functions. The necessary lemmas are formulated for the problem solution. The complete proof of the lemmas formulated is carried out. We formulated and proved a theorem, in which a priori error estimates are given for solving parabolic equations using the discontinuous Galerkin method on staggered grids Discussion and Conclusions: The obtained results are consistent with similar studies of other authors and complement them. Further work on this topic involves the study of diffusion-type equations of order higher than the first and the production of a posteriori error estimates.

  8. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullée, Jan Willem Hendrik; Montoya, Lorena; Pieters, W.; Junger, M.; Hartel, P.H.

    2018-01-01

    The aim of this study was to explore the extent to which persuasion principles are used in successful social engineering attacks. Seventy-four scenarios were extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenario was split into attack steps,

  9. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing

  10. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

    Directory of Open Access Journals (Sweden)

    Željko Gavrić

    2018-01-01

    Full Text Available Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.

  11. Attack-tolerant networked control system: an approach for detection the controller stealthy hijacking attack

    Science.gov (United States)

    Atta Yaseen, Amer; Bayart, Mireille

    2017-01-01

    In this work, a new approach will be introduced as a development for the attack-tolerant scheme in the Networked Control System (NCS). The objective is to be able to detect an attack such as the Stuxnet case where the controller is reprogrammed and hijacked. Besides the ability to detect the stealthy controller hijacking attack, the advantage of this approach is that there is no need for a priori mathematical model of the controller. In order to implement the proposed scheme, a specific detector for the controller hijacking attack is designed. The performance of this scheme is evaluated be connected the detector to NCS with basic security elements such as Data Encryption Standard (DES), Message Digest (MD5), and timestamp. The detector is tested along with networked PI controller under stealthy hijacking attack. The test results of the proposed method show that the hijacked controller can be significantly detected and recovered.

  12. A Traceability Attack against e-Passports

    Science.gov (United States)

    Chothia, Tom; Smirnov, Vitaliy

    Since 2004, many nations have started issuing "e-passports" containing an RFID tag that, when powered, broadcasts information. It is claimed that these passports are more secure and that our data will be protected from any possible unauthorised attempts to read it. In this paper we show that there is a flaw in one of the passport's protocols that makes it possible to trace the movements of a particular passport, without having to break the passport's cryptographic key. All an attacker has to do is to record one session between the passport and a legitimate reader, then by replaying a particular message, the attacker can distinguish that passport from any other. We have implemented our attack and tested it successfully against passports issued by a range of nations.

  13. Liability for damage caused by terrorist attacks

    International Nuclear Information System (INIS)

    Heller, W.

    2004-01-01

    After the terrorist attacks on September 11, 2001, one of the questions raised was about the potential liability of the operator of a nuclear power plant for damage sustained by a third party as a result of a comparable terrorist attack on a nuclear power plant. Internationally, this situation is regulated by the Convention on Third-Party Liability in Nuclear Power, the so-called Paris Liability Convention, of 1960, 1964, 1982. Among other things, that Convention excludes liability in cases directly resulting form 'actions of armed conflict..'. The problem arises, among other things, from the absence of an internationally acknowledged definition of terrorism or terrorist attack, and from the idea that, according to the Paris Convention, the legal entities assumed to be involved in such actions are states and weapons. National and international agreements and laws about the liability of the operator of nuclear facility for damage to third parties as a result of terrorist actions are analyzed and discussed. (orig.)

  14. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria

    2014-01-01

    and wireless networks. All these schemes use well-established and secure components such as the AES, Grain-like NFSRs, ChaCha and SipHash as their building blocks. However, we discover key recovery attacks for all three designs, featuring square-root complexities. Using a key collision technique, we can...... recover the secret key of AVALANCHE in 2n/2, where n 2∈ {28; 192; 256} is the key length. This technique also applies to the authentication part of Calico whose 128-bit key can be recovered in 264 time. For RBS, we can recover its full 132-bit key in 265 time with a guess-and-determine attack. All attacks...

  15. Discovering Collaborative Cyber Attack Patterns Using Social Network Analysis

    Science.gov (United States)

    Du, Haitao; Yang, Shanchieh Jay

    This paper investigates collaborative cyber attacks based on social network analysis. An Attack Social Graph (ASG) is defined to represent cyber attacks on the Internet. Features are extracted from ASGs to analyze collaborative patterns. We use principle component analysis to reduce the feature space, and hierarchical clustering to group attack sources that exhibit similar behavior. Experiments with real world data illustrate that our framework can effectively reduce from large dataset to clusters of attack sources exhibiting critical collaborative patterns.

  16. Playing Attack and Defense with Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe; Bouganim, Luc

    2014-01-01

    It is often convenient to assume in a data management platform that one or several computing devices are trusted, specially when the goal is to provide privacy guarantees over personal data. But what does it take for a computing device to be trusted? More specifically, how can a personal device...... provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service...... running on a secure device, than to attack the same service running on a general purpose device....

  17. Attacks and infections in percolation processes

    International Nuclear Information System (INIS)

    Janssen, Hans-Karl; Stenull, Olaf

    2017-01-01

    We discuss attacks and infections at propagating fronts of percolation processes based on the extended general epidemic process. The scaling behavior of the number of the attacked and infected sites in the long time limit at the ordinary and tricritical percolation transitions is governed by specific composite operators of the field-theoretic representation of this process. We calculate corresponding critical exponents for tricritical percolation in mean-field theory and for ordinary percolation to 1-loop order. Our results agree well with the available numerical data. (paper)

  18. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Ahmed, Z.; Nazir, B.; Zafar, M.F.; Anwar, M.M.; Azam, K.; Asar, A.U.

    2007-01-01

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  19. A simple and universal ligation mediated fusion of genes based on hetero-staggered PCR for generating immunodominant chimeric proteins.

    Science.gov (United States)

    Reddy, Prakash K; Ramlal, Shylaja; Sripathy, Murali H; Batra, Harshvardhan

    2012-11-01

    We developed a simple T4 DNA ligase mediated strategy for inframe splicing of two or more cohesive genes generated by hetero-staggered PCR and directionally cloning the spliced product bearing sticky overhangs in to a correspondingly cut vector. For this, two pairs of primers are used in two different parallel PCRs, for generation of each cohesive gene product. We exemplified this strategy by splicing two major super-antigen genes of Staphylococcus aureus, namely, staphylococcal enterotoxin A (sea), and toxic shock syndrome toxin (tsst-1) followed by its directional cloning into pre-digested pRSET A vector. The fusion gene encoding chimeric recombinant SEA-TSST protein (32kDa) was expressed in E. coli BL21(DE3) host strain. The recombinant chimeric protein retained the antigenicity of both toxins as observed by the strong immunoreactivity with commercial antibodies against both SEA and TSST-1 toxin components by Western blot analysis. We observed that the present method for gene splicing with cohesive ends is simple since it does not require elaborate standardization and a single fusion product is obtained consistently during nested PCR with forward primer of first gene and reverse primer of second gene. For comparison, we fused the same genes using splicing by overlap extension PCR (SOE-PCR) and consistently obtained DNA smearing and multiple non-specific bands even after several rounds of PCRs from gel excised product. Moreover, the newly described method requires only two to six complimentary sticky ends between the genes to be spliced, in contrast to long stretch of overlapping nucleotides in case of SOE-PCR. Copyright © 2012 Elsevier B.V. All rights reserved.

  20. A Study on the Uncertainty of Flow-Induced Vibration in a Cross Flow over Staggered Tubes

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Ji-Su; Park, Jong-Woon [Dongguk univ, Gyeong Ju (Korea, Republic of); Choi, Hyeon-Kyeong [HanNam University, Daejeon (Korea, Republic of)

    2015-05-15

    Cross-flow in many support columns of very high temperature reactor (VHTR) lower plenum would have FIV issues under high speed flow jetting from the core. For a group of multiple circular cylinders subjected to a cross-flow, three types of potential vibration mechanisms may exist: (1) Vortex-induced vibration (VIV), (2) Fluid-elastic vibration (FEV) and (3) Turbulence-induced vibration (TIV). Kevalahan studied the free vibration of circular cylinders in a tightly packed periodic square inline array of cylinders. Pandey et al. studied the flue gas flow distribution in the Low Temperature Super Heater (LTSH) tube bundles situated in second pass of a utility boiler and the phenomenon of flow induced vibration. Nakamura et al. studied flow instability of cylinder arrays resembling U-bend tubes in steam generators. The FIV evaluation is usually performed with computational fluid dynamic (CFD) analysis to obtain unknown frequency of oscillation of the multiple objects under turbulent flow and thus the uncertainty residing in the turbulence model used should be quantified. In this paper, potential FIV uncertainty arising from the turbulence phenomena are evaluated for a typical cross flow through staggered tube bundles resembling the VHTR lower plenum support columns. Flow induced vibration (FIV) is one of the important mechanical and fatigue issues in nuclear systems. Especially, cross-flow in many support structures of VHTR lower plenum would have FIV issues under highly turbulent jet flows from the core. The results show that the effect of turbulence parameters on FIV is not negligible and the uncertainty is 5 to 10%. Present method can be applied to future FIV evaluations of nuclear systems. More extensive studies on flow induced vibration in a plant scale by using more rigorous computational methods are under way.

  1. Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics

    Directory of Open Access Journals (Sweden)

    Sárkány Zoltán

    2016-03-01

    Full Text Available Introduction: The objective of this study was to investigate with the help of a computerized simulation model whether the treatment of an acute asthma attack can be individualized based on the severity of the attack and the characteristics of the patient. Material and Method: A stochastic lung model was used to simulate the deposition of 1 nm - 10 μm particles during a mild and a moderate asthma attack. Breathing parameters were varied to maximize deposition, and simulation results were compared with those obtained in the case of a severe asthma attack. In order to investigate the effect of height on the deposition of inhaled particles, another series of simulations was carried out with identical breathing parameters, comparing patient heights of 155 cm, 175 cm and 195 cm. Results: The optimization process yielded an increase in the maximum deposition values of around 6-7% for each type of investigated asthma attack, and the difference between attacks of different degree of severity was around 5% for both the initial and the optimized values, a higher degree of obstruction increasing the amount of deposited particles. Conclusions: Our results suggest that the individualization of asthma attack treatment cannot be based on particles of different size, as the highest deposited fraction in all three types of attacks can be obtained using 0.01 μm particles. The use of a specific set of breathing parameters yields a difference between a mild and a moderate, as well as a moderate and a severe asthma attack of around 5%.

  2. Afghanistan: Green-on-Blue Attacks

    Science.gov (United States)

    2013-05-02

    killing infidels in their land. In order to mitigate attacks within the ANSF embedded Afghan intelligence agents to watch for any ANA soldier or ANP...said, “Americans use the word f--k all the time.” 37 Many Afghan troops take the meaning sexually , not as a meaningless expletive, the understanding

  3. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Increased frequency and intensity of DoS/DDoS. Few Gbps is now normal; Anonymous VPNs being used; Botnets being used as a vehicle for launching DDoS attacks. Large scale booking of domain names. Hundred thousands of domains registered in short duration via few registrars; Single registrant; Most of the domains ...

  4. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Stux, DuQu, Nitro, Luckycat, Exploit Kits, FLAME. ADSL/SoHo Router Compromise. Botnets of compromised ADSL/SoHo Routers; User Redirection via malicious DNS entry. Web Application attacks. SQL Injection, RFI etc. More and more Webshells. More utility to hackers; Increasing complexity and evading mechanisms.

  5. Attack Classification Schema for Smart City WSNs

    Directory of Open Access Journals (Sweden)

    Victor Garcia-Font

    2017-04-01

    Full Text Available Urban areas around the world are populating their streets with wireless sensor networks (WSNs in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  6. Attack Classification Schema for Smart City WSNs.

    Science.gov (United States)

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2017-04-05

    Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  7. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  8. Sequential and Parallel Attack Tree Modelling

    NARCIS (Netherlands)

    Arnold, Florian; Guck, Dennis; Kumar, Rajesh; Stoelinga, Mariëlle Ida Antoinette; Koornneef, Floor; van Gulijk, Coen

    The intricacy of socio-technical systems requires a careful planning and utilisation of security resources to ensure uninterrupted, secure and reliable services. Even though many studies have been conducted to understand and model the behaviour of a potential attacker, the detection of crucial

  9. Wrap-Attack Pack: Product Packaging Exercise

    Science.gov (United States)

    Lee, Seung Hwan; Hoffman, K. Douglas

    2016-01-01

    Although many marketing courses discuss traditional concepts pertaining to product strategy, concepts specifically relating to packaging are often glossed over. This exercise, "Wrap-Attack Pack," teaches students about the utilitarian and hedonic design elements of packaging. More specifically, the primary objective is to creatively…

  10. Shark attack: review of 86 consecutive cases.

    Science.gov (United States)

    Woolgar, J D; Cliff, G; Nair, R; Hafez, H; Robbs, J V

    2001-05-01

    On average there are approximately 50 confirmed shark attacks worldwide annually. Despite their rarity, such incidents often generate much public and media attention. The injuries of 86 consecutive victims of shark attack were reviewed from 1980 to 1999. Clinical data retrieved from the South African Shark Attack Files, maintained by the Natal Sharks Board, were retrospectively analyzed to determine the nature, treatment, and outcome of injuries. The majority of victims (n = 68 [81%]) had relatively minor injuries that required simple primary suture. Those patients (n = 16 [19%]) with more extensive limb lacerations longer than 20 cm or with soft-tissue loss of more than one myofascial compartment were associated with higher morbidity and limb loss. In 8 of the 10 fatalities, death occurred as a result of exsanguinating hemorrhage from a limb vascular injury. Victims of shark attack usually sustain only minor injuries. In more serious cases, particularly if associated with a major vascular injury, hemorrhage control and early resuscitation are of utmost importance during the initial management if these patients are to survive.

  11. Shark Attack! Sinking Your Teeth into Anatomy.

    Science.gov (United States)

    House, Herbert

    2002-01-01

    Presents a real life shark attack story and studies arm reattachment surgery to teach human anatomy. Discusses how knowledge of anatomy can be put to use in the real world and how the arm functions. Includes teaching notes and suggestions for classroom management. (YDS)

  12. Algebraic Side-Channel Attack on Twofish

    Directory of Open Access Journals (Sweden)

    Chujiao Ma

    2017-05-01

    Full Text Available While algebraic side-channel attack (ASCA has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish. Compared to other algorithms that ASCA has been used on, Twofish is more difficult to attack due to the key-dependent S-boxes as well as the complex key scheduling. In this paper, we propose the first algebraic side-channel attack on Twofish, and examine the importance of side-channel information in getting past the key-dependent S-boxes and the complex key scheduling. The cryptographic algorithm and side-channel information are both expressed as boolean equations and a SAT solver is used to recover the key. While algebraic attack by itself is not sufficient to break the algorithm, with the help of side-channel information such as Hamming weights, we are able to correctly solve for 96 bits of the 128 bits key in under 2 hours with known plaintext/ciphertext.

  13. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the…

  14. Fighting Through a Logistics Cyber Attack

    Science.gov (United States)

    2015-06-19

    Infiltrating GATES ............................................................................................................ 19 SCADA Vulnerability...not adequately protected; there isn’t sufficient guidance, or funding allocated to the security of our Supervisory Control and Data Acquisition ( SCADA ...attack against a vital system such as GATES, and instead focus her efforts on a less secure more conspicuous system 6 such as the SCADA systems

  15. Strengthening Crypto-1 Cipher Against Algebraic Attacks

    Directory of Open Access Journals (Sweden)

    Farah Afianti

    2015-08-01

    Full Text Available In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. In order to strengthen Crypto-1 against SAT solver attacks, a modification of the feedback function with better cryptographic properties is proposed. It applies a primitive polynomial companion matrix. SAT solvers cannot directly attack the feedback shift register that uses the modified Boolean feedback function, the register has to be split into smaller groups. Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function. In addition, another modified Crypto-1, using the modified feedback function and a modified filter function, had the lowest percentage of revealed variables. It can be concluded that the security strength and performance of the modified Crypto-1 using the modified feedback function and the modified filter function are better than those of the original Crypto-1.

  16. Intrusion-Tolerant Replication under Attack

    Science.gov (United States)

    Kirsch, Jonathan

    2010-01-01

    Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…

  17. Rhode Island School Terrorist Attack Preparedness

    Science.gov (United States)

    Dube, Michael W. M.

    2012-01-01

    This study examined the state of safety and terrorist attack preparedness in Rhode Island Schools as determined by Rhode Island school leader perceptions. The study is descriptive in nature as it gathers data to describe a particular event or situation. Using a researcher generated survey based on terrorist preparedness guidelines and suggestions…

  18. Modeling of Aggregate Attacks on Complex Networks

    Directory of Open Access Journals (Sweden)

    F. Galindo

    2010-09-01

    Full Text Available An order factor in combinations of random and targeted attacks on modern scale free network model has been explored. Protection concepts based on timely restructuring of topologies have been discussed. Vulnerability parameter defined by investment value has been introduced, and protection financing strategies depending on node connectivity has been analyzed.

  19. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Few Gbps is now normal; Anonymous VPNs being used; Botnets being used as a vehicle for launching DDoS attacks ... Single registrant; Most of the domains kept unresolved; Mostly being used for spamming and malware distribution; Many domains are listed as malicious; Poor process control by Domain Registrars.

  20. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They represent in an intuitive, graphical way the interaction between an attacker and a defender who compete in order to achieve conflicting objectives. We propose a novel framework for the formal...... analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack......-defence trees to two-player stochastic games, and then employ probabilistic model checking techniques to formally analyse these models. This provides a means to both verify formally specified security properties of the attack-defence scenarios and, dually, to synthesise strategies for attackers or defenders...

  1. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2016-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations...... that helps in structuring attack identification and can integrate physical, virtual, and social components. These models form a solid basis for guiding the manual identification of attack scenarios. Their main benefit, however, is in the analytic generation of attacks. In this work we present a systematic...... approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  2. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  3. Error and attack vulnerability of temporal networks

    Science.gov (United States)

    Trajanovski, S.; Scellato, S.; Leontiadis, I.

    2012-06-01

    The study of real-world communication systems via complex network models has greatly expanded our understanding on how information flows, even in completely decentralized architectures such as mobile wireless networks. Nonetheless, static network models cannot capture the time-varying aspects and, therefore, various temporal metrics have been introduced. In this paper, we investigate the robustness of time-varying networks under various failures and intelligent attacks. We adopt a methodology to evaluate the impact of such events on the network connectivity by employing temporal metrics in order to select and remove nodes based on how critical they are considered for the network. We also define the temporal robustness range, a new metric that quantifies the disruption caused by an attack strategy to a given temporal network. Our results show that in real-world networks, where some nodes are more dominant than others, temporal connectivity is significantly more affected by intelligent attacks than by random failures. Moreover, different intelligent attack strategies have a similar effect on the robustness: even small subsets of highly connected nodes act as a bottleneck in the temporal information flow, becoming critical weak points of the entire system. Additionally, the same nodes are the most important across a range of different importance metrics, expressing the correlation between highly connected nodes and those that trigger most of the changes in the optimal information spreading. Contrarily, we show that in randomly generated networks, where all the nodes have similar properties, random errors and intelligent attacks exhibit similar behavior. These conclusions may help us in design of more robust systems and fault-tolerant network architectures.

  4. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim.

  5. Modelling Social-Technical Attacks with Timed Automata

    DEFF Research Database (Denmark)

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof

    2015-01-01

    Attacks on a system often exploit vulnerabilities that arise from human behaviour or other human activity. Attacks of this type, so-called socio-technical attacks, cover everything from social engineering to insider attacks, and they can have a devastating impact on an unprepared organisation....... In this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible attacks...

  6. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore......, in periods following large attacks a new attack is more likely to be small compared to other periods. Finally, we analyze the long-run consequences of the recruitment effect. We show that it leads to more counterterrorism, more small attacks, and a higher sum of terrorism damage and counterterrorism costs...

  7. Theoretical study of O- and Zn-face polarity effect on the optical properties of the conventional and staggered ZnO/Zn{sub 1−x}Cd{sub x}O/ZnO quantum wells

    Energy Technology Data Exchange (ETDEWEB)

    Shtepliuk, I., E-mail: ivan.shtepliuk@liu.se; Khranovskyy, V.; Yakimova, R.

    2015-11-02

    In this work we present a comparative study of Zn-face and O-face polarity Zn{sub 1−x}CdxO-based conventional and staggered quantum-well (QW) structures. The calculation of optical properties of QWs was performed by means of self-consistent Schrodinger–Poisson solver with consideration of polarization-induced effects. The conventional Zn-face and O-face QWs possess similar values of transition energy and an overlap of electron and hole wave functions. A change of the polarity from Zn-face to O-face for the conventional QWs influences only a shape of the conduction and valence band edge profile. It is revealed that the utilization of the staggered QWs leads to an improvement of the confinement characteristics. In addition, the O-face staggered QW structure has larger values of transition energy and overlap integral compared to the Zn-face staggered QW structure. O-terminated staggered QW structure is less dependent on the well thickness and has lower sensitivity to Cd content in embedded Zn{sub 1−x}CdxO layer. Control of the material polarity and design of the staggered QWs provide cost-effective approach for engineering the QW band structures with enhanced QW performance. This enables constructing of the Zn{sub 1−x}CdxO-based light emission diodes with improved radiative efficiency emitting, applicable for solid state lighting. - Highlights: • Effect of polar face on properties of Zn{sub 1−x}Cd{sub x}O quantum wells (QWs) was studied. • O-face staggered QWs were found to possess improved optical properties. • Sensitivity of transition energy to well width was found to be weaker for O-face QW. • Using of the embedded layer in QW reduces quantum confinement Stark effect.

  8. Comparison of the 2nd-order and 4th-order Staggered-Grid Finite-Difference Implementations of the TSN Method for Rupture Propagation

    Science.gov (United States)

    Kristek, J.; Moczo, P.; Galis, M.

    2006-12-01

    The TSN (Traction-at-Split-Nodes) method has been developed independently by Andrews (1973, 1976, 1999) and Day (1977, 1982). Andrews implemented his TSN formulation in the finite-difference scheme in which spatial differentiation is equivalent to the 2nd-order finite-element method. Day implemented his slightly different formulation of the TSN method in the 2nd-order partly-staggered finite-difference scheme. Dalguer and Day (2006) adapted the TSN method to the velocity-stress staggered-grid finite-difference scheme. Whereas the 4th-order spatial differencing is applied outside the fault, the 2nd-order differencing is applied along the fault plane. We present two implementations of the Day's TSN formulation in the velocity-stress staggered-grid finite-difference scheme for a 3D viscoelastic medium. In the first one we apply the 2nd-order spatial differencing everywhere in the grid including derivatives at the fault in the direction perpendicular to the fault plane. In the second implementation we similarly apply the 4th-order spatial differencing. In both cases we use the adjusted finite-difference approximations (AFDA, Kristek et al. 2002, Moczo et al. 2004) to derivatives in the direction perpendicular to the fault plane in order to have the same order of approximation everywhere. We numerically investigate convergence rates of both implementations with respect to rupture-time, final-slip, and peak-slip-rate metrics. Moreover, we compare the numerical solutions to those obtained by the finite-element implementation of the TSN method.

  9. Diverticulitis Diet: Can Certain Foods Trigger an Attack?

    Science.gov (United States)

    ... there trigger foods I should avoid to prevent diverticulitis attacks? Answers from Katherine Zeratsky, R.D., L. ... Actually, no specific foods are known to trigger diverticulitis attacks. And no special diet has been proved ...

  10. Heart Attack or Sudden Cardiac Arrest: How Are They Different?

    Science.gov (United States)

    ... Attack or Sudden Cardiac Arrest: How Are They Different? Updated:Mar 15,2018 People often use these ... The heart attack symptoms in women can be different than men. What is cardiac arrest? Sudden cardiac ...

  11. Cyber Attacks During the War on Terrorism: A Predictive Analysis

    National Research Council Canada - National Science Library

    Vatis, Michael

    2001-01-01

    ... responsible for the attack. This paper examines case studies of political conflicts that have led to attacks on cyber systems, such as the recent clashes between India and Pakistan, Israel and the Palestinians, and NATO...

  12. Information Warfare: Defining the Legal Response to An Attack

    National Research Council Canada - National Science Library

    Pottorff, James

    1999-01-01

    This paper discusses the difficulty in determining whether an information warfare attack, such as a computer virus, can be treated as an "armed attack" for purposes of national defense under the United Nations charter. As the U.S...

  13. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  14. Cyber Attacks During the War on Terrorism: A Predictive Analysis

    National Research Council Canada - National Science Library

    Vatis, Michael

    2001-01-01

    .... Just as the terrorist attacks of September 11, 2001 defied what many thought possible, cyber attacks could escalate in response to United States and allied retaliatory measures against the terrorists...

  15. Virological failure of staggered and simultaneous treatment interruption in HIV patients who began Efavirenz-based regimens after allergic reactions to nevirapine

    Directory of Open Access Journals (Sweden)

    Siripassorn Krittaecho

    2013-01-01

    Full Text Available Abstract Objective The objective of this work was to study the virological outcomes associated with two different types of treatment interruption strategies in patients with allergic reactions to nevirapine (NVP. We compared the virological outcomes of (1 HIV-1-infected patients who discontinued an initial NVP-based regimen because of cutaneous allergic reactions to NVP; different types of interruption strategies were used, and second-line regimen was based on efavirenz (EFV; and (2 HIV-1-infected patients who began an EFV-based regimen as a first-line therapy (controls. Methods This retrospective cohort included patients who began an EFV-based regimen, between January 2002 and December 2008, as either an initial regimen or as a subsequent regimen after resolving a cutaneous allergic reaction against an initial NVP-based regimen. The study ended in March 2010. The primary outcome was virological failure, which was defined as either (a two consecutive plasma HIV-1 RNA levels >400 copies/mL or (b a plasma HIV-1 RNA level >1,000 copies/mL plus any genotypic resistance mutation. Results A total of 559 patients were stratified into three groups: (a Simultaneous Interruption, in which the subjects simultaneously discontinued all the drugs in an NVP-based regimen following an allergic reaction (n=161; (b Staggered Interruption, in which the subjects discontinued NVP treatment while continuing nucleoside reverse transcriptase inhibitor (NRTI backbone therapy for a median of 7 days (n=82; and (c Control, in which the subjects were naïve to antiretroviral therapy (n=316. The overall median follow-up time was 43 months. Incidence of virological failure in Simultaneous Interruption was 12.9 cases per 1,000 person-years, which trended toward being higher than the incidences in Staggered Interruption (5.4 and Control (6.6. However, differences were not statistically significant. Conclusions Among the patients who had an acute allergic reaction to first

  16. Satellite Threat Warning and Attack Reporting

    Energy Technology Data Exchange (ETDEWEB)

    Hilland, D. [Kirkland AFB, NM (United States). Air Force Research Lab.; Phipps, G. [Sandia National Labs., Albuquerque, NM (United States). Optics & Technologies Dept.; Jingle, C.; Newton, G. [Schafer Corp., Albuquerque, NM (United States)

    1997-12-31

    The Air Force Research Laboratory`s Satellite Threat Warning and Attack Reporting (STW/AR) program will provide technologies for advanced threat warning and reporting of radio frequency (RF) and laser threats. The STW/AR program objectives are: (a) develop cost- effective technologies to detect, identify, locate, characterize, and report attacks or interference against U.S. and Allied satellites. (b) demonstrate innovative, light-weight, low-power, laser and RF sensors. The program focuses on the demonstration of RF and laser sensors. The RF sensor effort includes the investigation of interferometric antenna arrays, multi-arm spiral and butler matrix antennas, wideband receivers, adaptive processors, and improved processing algorithms. The laser sensor effort includes the investigation of alternative detectors, broadband grating and optical designs, active pixel sensing, and improved processing algorithms.

  17. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  18. Research About Attacks Over Cloud Environment

    Directory of Open Access Journals (Sweden)

    Li Jie

    2017-01-01

    Full Text Available Cloud computing is expected to continue expanding in the next few years and people will start to see some of the following benefits in their real lives. Security of cloud computing environments is the set of control-based technologies and policies absolute to adhere regulatory compliance rules and protect information data applications and infrastructure related with cloud use. In this paper we suggest a model to estimating the cloud computing security and test the services provided to users. The simulator NG-Cloud Next Generation Secure Cloud Storage is used and modified to administer the proposed model. This implementation achieved security functions potential attacks as defined in the proposed model. Finally we also solve some attacks over cloud computing to provide the security and safety of the cloud.

  19. Two fatal tiger attacks in zoos.

    Science.gov (United States)

    Tantius, Britta; Wittschieber, Daniel; Schmidt, Sven; Rothschild, Markus A; Banaschak, Sibylle

    2016-01-01

    Two captive tiger attacks are presented that took place in Cologne and Münster zoos. Both attacks occurred when the handlers, intent on cleaning the enclosures, entered whilst the tigers accidently retained access to the location, and thus defended their territory against the perceived intruders. Both victims suffered fatal neck injuries from the bites. At Münster, colleagues managed to lure the tiger away from its victim to enable treatment, whilst the Cologne zoo tiger had to be shot in order to allow access to be gained. Whilst it was judged that human error led to the deaths of the experienced zookeepers, the investigation in Münster was closed as no third party was found to be at fault, whereas the Cologne zoo director was initially charged with being negligent. These charges were subsequently dismissed as safety regulations were found to be up to date.

  20. Presentation attack detection in voice biometrics

    OpenAIRE

    Korshunov, Pavel; Marcel, Sébastien; Vielhauer, Claus

    2017-01-01

    Recent years have shown an increase in both the accuracy of biometric systems and their practical use. The application of biometrics is becoming widespread with fingerprint sensors in smartphones, automatic face recognition in social networks and video-based applications, and speaker recognition in phone banking and other phone-based services. The popularization of the biometric systems, however, exposed their major flaw --- high vulnerability to spoofing attacks. A fingerprint sensor can be ...

  1. A Study of Gaps in Attack Analysis

    Science.gov (United States)

    2016-10-12

    necessarily reflect the views of the Department of Defense. © 2016 MASSACHUSETTS INSTITUTE OF TECHNOLOGY Delivered to the U.S. Government with...and identify cyber attacks reflects the “arms race” na- ture of the cyber domain. While defenders develop new and improved techniques to detect known...Trost. Digging into ShellShock Exploitation attempts using ShockPot Data. https://www.threatstream.com/ blog /shockpot-exploitation-analysis, September

  2. Collision attack against Tav-128 hash function

    Science.gov (United States)

    Hariyanto, Fajar; Hayat Susanti, Bety

    2017-10-01

    Tav-128 is a hash function which is designed for Radio Frequency Identification (RFID) authentication protocol. Tav-128 is expected to be a cryptographically secure hash function which meets collision resistance properties. In this research, a collision attack is done to prove whether Tav-128 is a collision resistant hash function. The results show that collisions can be obtained in Tav-128 hash function which means in other word, Tav-128 is not a collision resistant hash function.

  3. Attacking Paper-Based E2E Voting Systems

    Science.gov (United States)

    Kelsey, John; Regenscheid, Andrew; Moran, Tal; Chaum, David

    In this paper, we develop methods for constructing vote-buying/coercion attacks on end-to-end voting systems, and describe vote-buying/coercion attacks on three proposed end-to-end voting systems: Punchscan, Prêt-à-voter, and ThreeBallot. We also demonstrate a different attack on Punchscan, which could permit corrupt election officials to change votes without detection in some cases. Additionally, we consider some generic attacks on end-to-end voting systems.

  4. Fuzzy Expert System for Heart Attack Diagnosis

    Science.gov (United States)

    Hassan, Norlida; Arbaiy, Nureize; Shah, Noor Aziyan Ahmad; Afizah Afif@Afip, Zehan

    2017-08-01

    Heart attack is one of the serious illnesses and reported as the main killer disease. Early prevention is significant to reduce the risk of having the disease. The prevention efforts can be strengthen through awareness and education about risk factor and healthy lifestyle. Therefore the knowledge dissemination is needed to play role in order to distribute and educate public in health care management and disease prevention. Since the knowledge dissemination in medical is important, there is a need to develop a knowledge based system that can emulate human intelligence to assist decision making process. Thereby, this study utilized hybrid artificial intelligence (AI) techniques to develop a Fuzzy Expert System for Diagnosing Heart Attack Disease (HAD). This system integrates fuzzy logic with expert system, which helps the medical practitioner and people to predict the risk and as well as diagnosing heart attack based on given symptom. The development of HAD is expected not only providing expert knowledge but potentially become one of learning resources to help citizens to develop awareness about heart-healthy lifestyle.

  5. Iraqi violence, Saudi attack and further bombings

    Energy Technology Data Exchange (ETDEWEB)

    Anon

    2006-03-15

    Iraq moved closer to all-out civil war following an attack on the Imam Ali al-Hadi mosque in Samarra, one of Shi'i Islam's holiest shrines, on 22nd February. In the days that followed, several hundred Iraqis died in inter-communal violence. Attacks on installations close to the Basrah Oil Terminal were reported. Earlier in the month, the main oil storage facility in Kirkuk was bombed, forcing the Northern Oil Company to shut-in the 0.3 mn bpd field. Oil and electricity supplies in southern Iraq were cut by attacks on installations some 40 miles south of Baghdad. Turkey agreed to resume product exports to Iraq after a deal was agreed on repaying Iraqi debts of $1 bn to Turkish suppliers. An official Australian inquiry into illegal payments made under the UN's oil-for-food programme is to investigate allegations involving two Australian-controlled oil firms. (author)

  6. Smoking behaviour under intense terrorist attacks.

    Science.gov (United States)

    Keinan-Boker, Lital; Kohn, Robert; Billig, Miriam; Levav, Itzhak

    2011-06-01

    Smoking is one of the varied psychological reactions to stress. This study examined the rate and changes in cigarette smoking among former Gaza and current West Bank Jewish settlers subjected to direct and indirect terrorist attacks during the Al-Aksa Intifada. The relationship with degree of religious observance and emotional distress was explored as well. In this cross-sectional study, the respondents were settlers randomly selected and interviewed by telephone (N = 706). The interview schedule included socio-demographic items, information on direct exposure to terrorist attacks (e.g. threat to life or physical integrity, personal losses, property damage) and on steady and changes in smoking habits, and a scale to measure emotional distress. In contrast with the country population, a larger percentage of settlers who smoked increased the number of cigarettes consumed with exposure to terrorism (10 and 27%, respectively). Respondents who were injured or had their home damaged reported a higher rate of smoking during the preceding year (30 and 20%, respectively). Emotional distress was related to cigarette smoking, but not in the controlled analysis. Religious observance had no effect. Direct or indirect exposure to terrorist attacks had an impact on smoking prevalence rates and on changes in smoking habits. Studies investigating reactions to traumatic events should include a detailed section on smoking while mental health interventions should address the needs of smokers.

  7. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  8. Link-layer Jamming Attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    2004-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  9. What Can We Learn?--The Algonquin Bear Attack.

    Science.gov (United States)

    Strickland, Dan

    1992-01-01

    Describes a bear attack in Algonquin Park in Lake Opeongo (Canada) in which a man and woman were killed. Hypothesizes that the bear deliberately preyed on its victims and concludes that the bear was physically normal. Despite this isolated attack, the chance of being attacked by a black bear when camping is virtually nonexistent. (KS)

  10. STAR Performance with SPEAR (Signal Processing Electronic Attack RFIC)

    Science.gov (United States)

    2017-03-01

    STAR Performance with SPEAR ( Signal Processing Electronic Attack RFIC) Luciano Boglione, Clayton Davis, Joel Goodman, Matthew McKeon, David...Parrett, Sanghoon Shin and Naomi Walker Naval Research Laboratory Washington, DC, 20375 Figure 1: The Signal Processing Electronic Attack RFIC...SPEAR) system. Abstract: The Signal Processing Electronic Attack RFIC (SPEAR) is a simultaneous transmit and receive (STAR) system capable of

  11. Quantitative Verification and Synthesis of Attack-Defence Scenarios Conference

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They represent in an intuitive, graphical way the interaction between an attacker and a defender who compete in order to achieve conflicting objectives. We propose a novel framework for the formal

  12. Regression Nodes: Extending attack trees with data from social sciences

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    In the field of security, attack trees are often used to assess security vulnerabilities probabilistically in relation to multi-step attacks. The nodes are usually connected via AND-gates, where all children must be executed, or via OR-gates, where only one action is necessary for the attack step to

  13. Quantitative Attack Tree Analysis via Priced Timed Automata

    NARCIS (Netherlands)

    Kumar, Rajesh; Ruijters, Enno Jozef Johannes; Stoelinga, Mariëlle Ida Antoinette; Sankaranarayanan, Sriram; Vicario, Enrico

    The success of a security attack crucially depends on the resources available to an attacker: time, budget, skill level, and risk appetite. Insight in these dependencies and the most vulnerable system parts is key to providing effective counter measures. This paper considers attack trees, one of the

  14. Pareto Efficient Solution of Attack-Defence Trees

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as

  15. Vulnerability Assessment by Learning Attack Specifications in Graphs

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Lopes, Raul H.C.

    This paper presents an evolutionary approach for learning attack specifications that describe attack scenarios. The objective is to find vulnerabilities in computer networks which minimise the cost of an attack with maximum impact. Although we focus on Insider Threat, the proposed approach applies

  16. Limit Asthma Attacks Caused by Colds or Flu

    Science.gov (United States)

    Asthma: Limit asthma attacks caused by colds or flu A cold or the flu can trigger an asthma attack. Here's why — and how to keep your sneeze ... plan. If you notice warning signs of an asthma attack — such as coughing, wheezing, chest tightness or shortness ...

  17. Modeling and Analysis of Information Attack in Computer Networks

    National Research Council Canada - National Science Library

    Pepyne, David

    2003-01-01

    ... (as opposed to physical and other forms of attack) . Information based attacks are attacks that can be carried out from anywhere in the world, while sipping cappuccino at an Internet cafe' or while enjoying the comfort of a living room armchair...

  18. Attacks on the AJPS Mersenne-based cryptosystem

    NARCIS (Netherlands)

    K. de Boer (Koen); L. Ducas (Léo); S. Jeffery (Stacey); R. M. de Wolf (Ronald)

    2018-01-01

    textabstractAggarwal, Joux, Prakash and Santha recently introduced a new potentially quantum-safe public-key cryptosystem, and suggested that a brute-force attack is essentially optimal against it. They consider but then dismiss both Meet-in-the-Middle attacks and LLL-based attacks. Very soon after

  19. 12 CFR 747.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... INVESTIGATIONS Uniform Rules of Practice and Procedure § 747.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all or any part of an...

  20. 12 CFR 308.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... PRACTICE RULES OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 308.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any...

  1. 12 CFR 19.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 19.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all...

  2. A representation of curved boundaries for the solution of the Navier-Stokes equations on a staggered three-dimensional Cartesian grid

    International Nuclear Information System (INIS)

    Kirkpatrick, M.P.; Armfield, S.W.; Kent, J.H.

    2003-01-01

    A method is presented for representing curved boundaries for the solution of the Navier-Stokes equations on a non-uniform, staggered, three-dimensional Cartesian grid. The approach involves truncating the Cartesian cells at the boundary surface to create new cells which conform to the shape of the surface. We discuss in some detail the problems unique to the development of a cut cell method on a staggered grid. Methods for calculating the fluxes through the boundary cell faces, for representing pressure forces and for calculating the wall shear stress are derived and it is verified that the new scheme retains second-order accuracy in space. In addition, a novel 'cell-linking' method is developed which overcomes problems associated with the creation of small cells while avoiding the complexities involved with other cell-merging approaches. Techniques are presented for generating the geometric information required for the scheme based on the representation of the boundaries as quadric surfaces. The new method is tested for flow through a channel placed oblique to the grid and flow past a cylinder at Re=40 and is shown to give significant improvement over a staircase boundary formulation. Finally, it is used to calculate unsteady flow past a hemispheric protuberance on a plate at a Reynolds number of 800. Good agreement is obtained with experimental results for this flow

  3. Universal scaling of Néel temperature, staggered magnetization density, and spin-wave velocity of three-dimensional disordered and clean quantum antiferromagnets

    Science.gov (United States)

    Tan, D.-R.; Jiang, F.-J.

    2017-02-01

    The Néel temperature, staggered magnetization density, as well as the spin-wave velocity of a three-dimensional (3D) quantum Heisenberg model with antiferromagnetic disorder (randomness) are calculated using first-principles nonperturbative quantum Monte Carlo simulations. In particular, we examine the validity of universal scaling relations that are related to these three studied physical quantities. These relations are relevant to experimental data and are firmly established for clean (regular) 3D dimerized spin-1/2 Heisenberg models. Remarkably, our numerical results show that the considered scaling relations remain true for the investigated model with the introduced disorder. In addition, while the presence of disorder may change the physical properties of regular dimerized models, hence leading to different critical theories, both the obtained data of Néel temperature and staggered magnetization density in our study are fully compatible with the expected critical behavior for clean dimerized systems. As a result, it is persuasive to conclude that the related quantum phase transitions of the considered disordered model and its clean analogues are governed by the same critical theory, which is not always the case in general. Finally, we also find smooth scaling curves even emerging when both the data of the investigated disordered model as well as its associated clean system are taken into account concurrently. This in turn implies that, while in a restricted sense, the considered scaling relations for 3D spin-1/2 antiferromagnets are indeed universal.

  4. Identical Bands and ΔI=2 Staggering in Superdeformed Nuclei in A~150 Mass Region Using Three Parameters Rotational Model

    Directory of Open Access Journals (Sweden)

    Khalaf A. M.

    2012-10-01

    Full Text Available By using a computer simulated search program, the experimental gamma transition en- ergies for superdeformed rotational bands (SDRB’s in A 150 region are fitted to proposed three-parameters model. The model parameters and the spin of the bandhead were obtained for the selected ten SDRB’s namely: 150 Gd (yrast and excited SD bands, 151 Tb (yrast and excited SD bands, 152 Dy (yrast SD bands, 148 Gd (SD-1,SD-6, 149 Gd (SD-1, 153 Dy (SD-1 and 148 Eu (SD-1. The Kinematic J (1 and dynamic J (2 moments of inertia are studied as a function of the rotational frequency ~ ω . From the calculated results, we notic that the excited SD bands have identical energies to their Z + 1 neigh- bours for the twinned SD bands in N = 86 nuclei. Also the analysis done allows us to confirm Δ I = 2 staggering in the yrast SD bands of 148 Gd, 149 Gd, 153 Dy, and 148 Eu and in the excited SD bands of 148 Gd, by performing a staggering parameter analysis. For each band, we calculated the deviation of the gamma ray energies from smooth ref- erence representing the finite di ff erence approximation to the fourth derivative of the gamma ray transition energies at a given spin.

  5. Unified communications forensics anatomy of common UC attacks

    CERN Document Server

    Grant, Nicholas Mr

    2013-01-01

    Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures

  6. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    OpenAIRE

    Khaled Elleithy; Drazen Blagovic; Wang Cheng; Paul Sideleau

    2005-01-01

    A denial of service attack (DOS) is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack wil...

  7. False Positive and False Negative Effects on Network Attacks

    Science.gov (United States)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  8. Web Forms and Untraceable DDoS Attacks

    Science.gov (United States)

    Jakobsson, Markus; Menczer, Filippo

    We analyze a Web vulnerability that allows an attacker to perform an email-based attack on selected victims, using standard scripts and agents. What differentiates the attack we describe from other, already known forms of distributed denial of service (DDoS) attacks is that an attacker does not need to infiltrate the network in any manner - as is normally required to launch a DDoS attack. Thus, we see this type of attack as a poor man's DDoS. Not only is the attack easy to mount, but it is also almost impossible to trace back to the perpetrator. Along with descriptions of our attack, we demonstrate its destructive potential with (limited and contained) experimental results. We illustrate the potential impact of our attack by describing how an attacker can disable an email account by flooding its inbox; block competition during on-line auctions; harm competitors with an on-line presence; disrupt phone service to a given victim; disconnect mobile corporate leaders from their networks; and disrupt electronic elections. Finally, we propose a set of countermeasures that are light-weight, do not require modifications to the infrastructure, and can be deployed in a gradual manner.

  9. Machine Learning Methods for Attack Detection in the Smart Grid.

    Science.gov (United States)

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  10. Hybrid attacks on model-based social recommender systems

    Science.gov (United States)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  11. Noncombatants and liability to be attacked in wars

    DEFF Research Database (Denmark)

    Lippert-Rasmussen, Kasper

    2013-01-01

    attack," I mean that S has forfeited his or her right not to be attacked by armed forces. Here, "liable" is used in a normative-cum-legal sense, not descriptively as it is when one says "some colors are liable to darken in perpetual shade," and "attack" is used passively, as an equivalent of be attacked....... Colloquially, then, "S is liable to attack" means roughly that S is a legitimate target. Given this, it should be clear that when I talk about the criteria of "liability to attack," I am talking in effect about the features separating people who may and may not be attacked. Unless I indicate otherwise, I also...... mean to focus on intended, as opposed to incidental, attacks. Finally, although "attack" often implies initiation of a conflict ("I didn't attack him! He started it!"), it does not do so here. An unjust aggressor who initiates a conflict can be, and indeed very often is, liable to attack. All...

  12. Cyber Attacks and Energy Infrastructures: Anticipating Risks

    International Nuclear Information System (INIS)

    Desarnaud, Gabrielle

    2017-01-01

    This study analyses the likelihood of cyber-attacks against European energy infrastructures and their potential consequences, particularly on the electricity grid. It also delivers a comparative analysis of measures taken by different European countries to protect their industries and collaborate within the European Union. The energy sector experiences an unprecedented digital transformation upsetting its activities and business models. Our energy infrastructures, sometimes more than a decade old and designed to remain functional for many years to come, now constantly interact with light digital components. The convergence of the global industrial system with the power of advanced computing and analytics reveals untapped opportunities at every step of the energy value chain. However, the introduction of digital elements in old and unprotected industrial equipment also exposes the energy industry to the cyber risk. One of the most compelling example of the type of threat the industry is facing, is the 2015 cyber-attack on the Ukraine power grid, which deprived about 200 000 people of electricity in the middle of the winter. The number and the level of technical expertise of cyber-attacks rose significantly after the discovery of the Stuxnet worm in the network of Natanz uranium enrichment site in 2010. Energy transition policies and the growing integration of renewable sources of energy will intensify this tendency, if cyber security measures are not part of the design of our future energy infrastructures. Regulators try to catch up and adapt, like in France where the authorities collaborate closely with the energy industry to set up a strict and efficient regulatory framework, and protect critical operators. This approach is adopted elsewhere in Europe, but common measures applicable to the whole European Union are essential to protect strongly interconnected energy infrastructures against a multiform threat that defies frontiers

  13. Neuroradiological study of transient ischemic attack

    International Nuclear Information System (INIS)

    Takusagawa, Yoshihiko; Fujiwara, Yasuhiro; Ichiki, Ken; Suga, Takeshi; Nishigaki, Shinichi

    1986-01-01

    Fifty-two patients with carotid TIAs and thirteen patients with vertebrobasilar TIAs were investigated by angiography and computed tomography. TIA was diagnosed by clinical symptoms in accordance with the criteria for TIA of the Joint Committee for Stroke Facilities in the U.S.A. (1974). The 65 patients with TIAs included 49 males and 16 females with average age of 63.5 years old at the initial episode of TIA. As for the diseases associated with TIA, hypertension (51 %), diabetes mellitus (15 %) and ischemic heart diseases (11 %) were the major disorders. Atrial fibrillation was observed in 2 cases. Intervals from last TIA attack to angiography were less than 7 days in 22 cases, 8 ∼ 30 days in 19 cases, 1 ∼ 4 monthes in 14 cases and more than 4 monthes in 10 cases, respectively. The cases in which angiography was done earlier after attacks displayed more abnormal findings. In 52 patients with caroted TIAs the artherosclerotic change of extracranial portion of the internal carotid artery was found in 14 cases (27 %), that of intracranial portion of the artery in 11 cases (21 %) and both lesions in 2 cases (4 %). On the other hand, in 13 patients with vertebrobasilar TIAs, this change was observed in 4 cases at the extracranival potion and in 1 case at the intracranial potion (siphon) of the internal carotid artery. Abnormal CT findings were found in 29 of 65 patients, namely 9 had ventricular dilatation and brain atrophy, 6 had cerebral infarction which was not associated with associated with symptoms of TIA. In carotid TIAs, Cerebral infarction was associated with symptoms of TIAs in 15 cases, namely 10 had a small low density area in the basal ganglia near the internal capsule and 5 had a low density area in the cortical or subcortical region. All of these 5 cases had cerebral embolism, which recanalized after attacks. (J.P.N.)

  14. Suicide bomb attack causing penetrating craniocerebral injury

    OpenAIRE

    Hussain Manzar; Bari Muhammad Ehsan

    2013-01-01

    【Abstract】Penetrating cerebral injuries caused by foreign bodies are rare in civilian neurosurgical trauma, al-though there are various reports of blast or gunshot inju-ries in warfare due to multiple foreign bodies like pellets and nails. In our case, a 30-year-old man presented to neurosur-gery clinic with signs and symptoms of right-sided weak-ness after suicide bomb attack. The skull X-ray showed a single intracranial nail. Small craniotomy was done and the nail was removed wi...

  15. Suicide bomb attack causing penetrating craniocerebral injury.

    Science.gov (United States)

    Hussain, Manzar; Bari, Muhammad-Ehsan

    2013-01-01

    Penetrating cerebral injuries caused by foreign bodies are rare in civilian neurosurgical trauma, although there are various reports of blast or gunshot injuries in warfare due to multiple foreign bodies like pellets and nails. In our case, a 30-year-old man presented to neurosurgery clinic with signs and symptoms of right-sided weakness after suicide bomb attack. The skull X-ray showed a single intracranial nail. Small craniotomy was done and the nail was removed with caution to avoid injury to surrounding normal brain tissue. At 6 months'follow-up his right-sided power improved to against gravity.

  16. Close Air Support versus Close Combat Attack

    Science.gov (United States)

    2012-12-06

    consequence when discussing the two different processes of close air support and close combat attack. This section focuses on service culture. Understanding...According to a RAND study written by Carl Builder, the Air Force “could be said to worship at the altar of technology.”67 These are not what Hofstede...characteristics that are highly prized in a culture and thus serve as models for behavior,” people like Billy Mitchell, Hap Arnold, Tooey Spaatz to name a

  17. Consciousness in non-epileptic attack disorder.

    Science.gov (United States)

    Reuber, Markus; Kurthen, M

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consciousness should not only distinguish between the 'level' and `content' of consciousness but also between 'phenomenal consciousness' (consciousness of states it somehow "feels to be like") and 'access consciousness' (having certain 'higher' cognitive processes at one's disposal). The existing evidence shows that there is a great intra- and interindividual variability of NEA experience. However, in most NEAs phenomenal experience - and, as a precondition for that experience, vigilance or wakefulness - is reduced to a lesser degree than in those epileptic seizures involving impairment of consciousness. In fact, complete loss of "consciousness" is the exception rather than the rule in NEAs. Patients, as well as external observers, may have a tendency to overestimate impairments of consciousness during the seizures.

  18. Recent computer attacks via Instant Messaging

    CERN Multimedia

    IT Department

    2008-01-01

    Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. Several computers at CERN have recently been broken into by attackers who have tricked users of Instant Messaging applications (e.g. MSN, Yahoo Messenger, etc.) into clicking on web links which appeared to come from known contacts. The links appeared to be photos from ‘friends’ and requested software to be installed. In practice, attacker software was installed and the messages did not come from real contacts. In the past such fake messages were mainly sent by email but now a wider range of applications are being targeted, including Instant Messaging. Cybercriminals are making growing use of fake messages to try to trick you into clicking on Web links which will help them to install malicious software on your computer. Anti-virus software cann...

  19. [Diagnosis, pathogenesis and treatment of panic attacks].

    Science.gov (United States)

    Turczyński, J

    Panic accompanies several diseases both psychological and somatic. It may be secondary, i.e. produced by other symptoms and morbid processes. It may also be primary--"neurotic". In such cases there are two forms of panic: generalized and paroxysmal. Attacks of panic are seen in 1.6-2.9% of women and in 0.4-1.7% of men. Main pathogenetic role is played by the psychologic factors (psychical trauma precedes the onset of diseases). The role of biological factors is also important. It is believed that disorders of the noradrenergic, serotonin-ergic, and GABA-ergic transmission may produce the attacks of panic. Psychotherapy is a treatment of choice. Pharmacotherapy plays only an adjuvant role. Antidepressants (tricyclic of II generation) are most frequently used for this purpose and--exceptionally due to possible addiction--benzodiazepines. The highest impact on the development of disease has first contact physician attitude. Patient and thoughtful listening to the patient, explanation of the complaints and their source often produce and improvement, and even complete recovery.

  20. Consciousness in Non-Epileptic Attack Disorder

    Science.gov (United States)

    Reuber, M.; Kurthen, M.

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consciousness should not only distinguish between the ‘level’ and ‘content’ of consciousness but also between ‘phenomenal consciousness’ (consciousness of states it somehow “feels to be like”) and ‘access consciousness’ (having certain ‘higher’ cognitive processes at one’s disposal). The existing evidence shows that there is a great intra- and interindividual variability of NEA experience. However, in most NEAs phenomenal experience – and, as a precondition for that experience, vigilance or wakefulness – is reduced to a lesser degree than in those epileptic seizures involving impairment of consciousness. In fact, complete loss of “consciousness” is the exception rather than the rule in NEAs. Patients, as well as external observers, may have a tendency to overestimate impairments of consciousness during the seizures. PMID:21447903

  1. STABILITY OF UNDERWATER STRUCTURE UNDER WAVE ATTACK

    Directory of Open Access Journals (Sweden)

    C. Paotonan

    2012-02-01

    Full Text Available Geotube is, among others, a type of coastal structure that is increasingly accepted for coastal protection especially underwater breakwater. Besides its relatively low cost, it has other advantages such as flexibility, ease of construction and the fact that it can be filled with local sand material. Similar to all other coastal structures, it should also be stable under wave attack. A simple theoretical approach based on linear wave was adopted to estimate the stability of such structure. The theoretical solution was then compared with an experimental study. The experimental study was conducted at the Hydraulics and Hydrology Laboratory of Universitas Gadjah Mada. However, instead of a real geotube, PVC pipe was used where the weight of the PVC was varied by adjusting the volume of sand in the pipe. The result indicated that the agreement between the theoretical solution and the experiment was encouraging. The analytical solution may be utilized to predict underwater pipe stability under wave attack with certain degree of accuracy.

  2. Baiting Inside Attackers Using Decoy Documents

    Science.gov (United States)

    Bowen, Brian M.; Hershkop, Shlomo; Keromytis, Angelos D.; Stolfo, Salvatore J.

    The insider threat remains one of the most vexing problems in computer security. A number of approaches have been proposed to detect nefarious insider actions including user modeling and profiling techniques, policy and access enforcement techniques, and misuse detection. In this work we propose trap-based defense mechanisms and a deployment platform for addressing the problem of insiders attempting to exfiltrate and use sensitive information. The goal is to confuse and confound an adversary requiring more effort to identify real information from bogus information and provide a means of detecting when an attempt to exploit sensitive information has occurred. “Decoy Documents” are automatically generated and stored on a file system by the D3 System with the aim of enticing a malicious user. We introduce and formalize a number of properties of decoys as a guide to design trap-based defenses to increase the likelihood of detecting an insider attack. The decoy documents contain several different types of bogus credentials that when used, trigger an alert. We also embed “stealthy beacons” inside the documents that cause a signal to be emitted to a server indicating when and where the particular decoy was opened. We evaluate decoy documents on honeypots penetrated by attackers demonstrating the feasibility of the method.

  3. Command Disaggregation Attack and Mitigation in Industrial Internet of Things.

    Science.gov (United States)

    Xun, Peng; Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-10-21

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  4. Quantitative Method for Network Security Situation Based on Attack Prediction

    Directory of Open Access Journals (Sweden)

    Hao Hu

    2017-01-01

    Full Text Available Multistep attack prediction and security situation awareness are two big challenges for network administrators because future is generally unknown. In recent years, many investigations have been made. However, they are not sufficient. To improve the comprehensiveness of prediction, in this paper, we quantitatively convert attack threat into security situation. Actually, two algorithms are proposed, namely, attack prediction algorithm using dynamic Bayesian attack graph and security situation quantification algorithm based on attack prediction. The first algorithm aims to provide more abundant information of future attack behaviors by simulating incremental network penetration. Through timely evaluating the attack capacity of intruder and defense strategies of defender, the likely attack goal, path, and probability and time-cost are predicted dynamically along with the ongoing security events. Furthermore, in combination with the common vulnerability scoring system (CVSS metric and network assets information, the second algorithm quantifies the concealed attack threat into the surfaced security risk from two levels: host and network. Examples show that our method is feasible and flexible for the attack-defense adversarial network environment, which benefits the administrator to infer the security situation in advance and prerepair the critical compromised hosts to maintain normal network communication.

  5. Command Disaggregation Attack and Mitigation in Industrial Internet of Things

    Directory of Open Access Journals (Sweden)

    Peng Xun

    2017-10-01

    Full Text Available A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1 the command sequence is disordered and (2 disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  6. Simulation of Attacks for Security in Wireless Sensor Network.

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-11-18

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  7. Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions

    NARCIS (Netherlands)

    M.M.J. Stevens (Marc); D. Shumow

    2017-01-01

    textabstractCounter-cryptanalysis, the concept of using cryptanalytic techniques to detect cryptanalytic attacks, was introduced by Stevens at CRYPTO 2013 [22] with a hash collision detection algorithm. That is, an algorithm that detects whether a given single message is part of a colliding message

  8. Minimizing Expected Maximum Risk from Cyber-Attacks with Probabilistic Attack Success

    Energy Technology Data Exchange (ETDEWEB)

    Bhuiyan, Tanveer H.; Nandi, Apurba; Medal, Hugh; Halappanavar, Mahantesh

    2016-07-16

    The goal of our work is to enhance network security by generating partial cut-sets, which are a subset of edges that remove paths from initially vulnerable nodes (initial security conditions) to goal nodes (critical assets), on an attack graph given costs for cutting an edge and a limited overall budget.

  9. LaMEM: a Massively Parallel Staggered-Grid Finite-Difference Code for Thermo-Mechanical Modeling of Lithospheric Deformation with Visco-Elasto-Plastic Rheologies

    Science.gov (United States)

    Kaus, B.; Popov, A.

    2014-12-01

    The complexity of lithospheric rheology and the necessity to resolve the deformation patterns near the free surface (faults and folds) sufficiently well places a great demand on a stable and scalable modeling tool that is capable of efficiently handling nonlinearities. Our code LaMEM (Lithosphere and Mantle Evolution Model) is an attempt to satisfy this demand. The code utilizes a stable and numerically inexpensive finite difference discretization with the spatial staggering of velocity, pressure, and temperature unknowns (a so-called staggered grid). As a time discretization method the forward Euler, or a combination of the predictor-corrector and the fourth-order Runge-Kutta can be chosen. Elastic stresses are rotated on the markers, which are also used to track all relevant material properties and solution history fields. The Newtonian nonlinear iteration, however, is handled at the level of the grid points to avoid spurious averaging between markers and grid. Such an arrangement required us to develop a non-standard discretization of the effective strain-rate second invariant. Important feature of the code is its ability to handle stress-free and open-box boundary conditions, in which empty cells are simply eliminated from the discretization, which also solves the biggest problem of the sticky-air approach - namely large viscosity jumps near the free surface. We currently support an arbitrary combination of linear elastic, nonlinear viscous with multiple creep mechanisms, and plastic rheologies based on either a depth-dependent von Mises or pressure-dependent Drucker-Prager yield criteria.LaMEM is being developed as an inherently parallel code. Structurally all its parts are based on the building blocks provided by PETSc library. These include Jacobian-Free Newton-Krylov nonlinear solvers with convergence globalization techniques (line search), equipped with different linear preconditioners. We have also implemented the coupled velocity-pressure multigrid

  10. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia.

    Science.gov (United States)

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources.

  11. Analysis of Network Vulnerability Under Joint Node and Link Attacks

    Science.gov (United States)

    Li, Yongcheng; Liu, Shumei; Yu, Yao; Cao, Ting

    2018-03-01

    The security problem of computer network system is becoming more and more serious. The fundamental reason is that there are security vulnerabilities in the network system. Therefore, it’s very important to identify and reduce or eliminate these vulnerabilities before they are attacked. In this paper, we are interested in joint node and link attacks and propose a vulnerability evaluation method based on the overall connectivity of the network to defense this attack. Especially, we analyze the attack cost problem from the attackers’ perspective. The purpose is to find the set of least costs for joint links and nodes, and their deletion will lead to serious network connection damage. The simulation results show that the vulnerable elements obtained from the proposed method are more suitable for the attacking idea of the malicious persons in joint node and link attack. It is easy to find that the proposed method has more realistic protection significance.

  12. A Secure Localization Approach against Wormhole Attacks Using Distance Consistency

    Directory of Open Access Journals (Sweden)

    Lou Wei

    2010-01-01

    Full Text Available Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or wireless link to another point, and the other relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization and propose a novel distance-consistency-based secure localization scheme against wormhole attacks, which includes three phases of wormhole attack detection, valid locators identification and self-localization. The theoretical model is further formulated to analyze the proposed secure localization scheme. The simulation results validate the theoretical results and also demonstrate the effectiveness of our proposed scheme.

  13. Why cryptography should not rely on physical attack complexity

    CERN Document Server

    Krämer, Juliane

    2015-01-01

    This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two indepe...

  14. Attack and Vulnerability Penetration Testing: FreeBSD

    Directory of Open Access Journals (Sweden)

    Abdul Hanan Abdullah

    2013-07-01

    Full Text Available Computer system security has become a major concern over the past few years. Attacks, threasts or intrusions, against computer system and network have become commonplace events. However, there are some system devices and other tools that are available to overcome the threat of these attacks. Currently, cyber attack is a major research and inevitable. This paper presents some steps of penetration in FreeBSD operating system, some tools and new steps to attack used in this experiment, probes for reconnaissance, guessing password via brute force, gaining privilege access and flooding victim machine to decrease availability. All these attacks were executed and infiltrate within the environment of Intrusion Threat Detection Universiti Teknologi Malaysia (ITD UTM data set. This work is expected to be a reference for practitioners to prepare their systems from Internet attacks.

  15. Spreading of localized attacks in spatial multiplex networks

    Science.gov (United States)

    Vaknin, Dana; Danziger, Michael M.; Havlin, Shlomo

    2017-07-01

    Many real-world multilayer systems such as critical infrastructure are interdependent and embedded in space with links of a characteristic length. They are also vulnerable to localized attacks or failures, such as terrorist attacks or natural catastrophes, which affect all nodes within a given radius. Here we study the effects of localized attacks on spatial multiplex networks of two layers. We find a metastable region where a localized attack larger than a critical size induces a nucleation transition as a cascade of failures spreads throughout the system, leading to its collapse. We develop a theory to predict the critical attack size and find that it exhibits novel scaling behavior. We further find that localized attacks in these multiplex systems can induce a previously unobserved combination of random and spatial cascades. Our results demonstrate important vulnerabilities in real-world interdependent networks and show new theoretical features of spatial networks.

  16. Marginal flow and gap flow in strongly staggered cascades of slightly convex profiles; Rand- und Spaltstroemungen in stark gestaffelten Verdichtergittern aus schwach gewoelbten Profilen

    Energy Technology Data Exchange (ETDEWEB)

    Sasongko, H. [Technische Univ. Braunschweig (Germany). Inst. fuer Stroemungsmechanik

    1997-09-01

    Marginal flow and gap flow through a highly staggered cascade consisting of slightly convex profiles were investigated in two steps. Cascades without gap were investigated in the first step and cascades with gap in the second. In the first step, a slightly staggered cascade of identical geometry was used for comparison. In the second step, an external rotor cascade of 9C7/32,5C50 profiles with a division ratio t/l = 1.0 and a staggering angle of {lambda} = 50 was used. At a Reynolds number Re{sub j} = 3.5 x 10{sup 5} and gap widths of s/l = 0.0, 0.01 and 0.3, flows, wakes and pressure distributions were measured and diagrams made. The measurements were evaluated by mass averaging and with the aid of the pulse method. In addition to the averaged results of a standard investigation, the dissertation comprises extensive data on 3D flow near the blade ends and at the side wall as a function of blade angles and gap widths between blades and side wall. This was the first time that marginal flow and gap flow of strongly staggered cascades with slightly convex profiles were investigated in a cascade wind tunnel. The findings are therefore quite new and deviate strongly from the results of earlier investigations on strongly convex profiles. The findings were compared with the results of compressor investigations, and good agreement was found. (orig./AKF) [Deutsch] Die vorliegende Arbeit berichtet ueber die in zwei Schritten durchgefuehrten Untersuchungen der Rand- und Spaltstroemungen eines hoch gestaffelten Verdichtergitters aus schwach gewoelbten Profilen. Im ersten Schritt wurde das Gitter ohne Spalt, im zweiten Schritt mit Spalt untersucht. Vergleichsgitter im ersten Schritt war ein zusaetzlich untersuchtes Gitter schwacher Staffelung mit sonst gleicher Geometrie. Vergleichsgitter im zweiten Schritt war das hoch gestaffelte Gitter aus dem ersten Schritt. Das untersuchte Verdichtergitter ist ein Rotor-Aussenschnitt-Gitter aus 9C7/32,5C50-Profilen mit einem

  17. Experimental process investigation of a latent heat energy storage system with a staggered heat exchanger with different phase change materials for solar thermal energy storage applications

    Science.gov (United States)

    Tsolakoglou, Nikolas P.; Koukou, Maria K.; Vrachopoulos, Michalis Gr.; Tachos, Nikolaos; Lymberis, Kostas; Stathopoulos, Vassilis

    2017-11-01

    This work investigates melting and solidification processes of four different Phase Change Materials (PCM) used as latent heat thermal storage system. The experimental rig was consisted of an insulated tank, filled with the under investigation PCM, a staggered heat exchanger to supply or extract heat from the PCM cavity and a water pump to circulate Heat Transfer Fluid (HTF). Both charging (melting) and discharging (solidification) processes were conducted for two different HTF flow rates. The main scope of this work was to develop a first approach and to investigate the behaviour of PCM under various load conditions (different HTF flow rates). Results show that different HTF flow rates affect melting and solidification time periods; in both processes time was reduced while HTF flow rate was increased but in differentways due to the transition from conduction to convection heat transfer mechanisms.

  18. Experimental process investigation of a latent heat energy storage system with a staggered heat exchanger with different phase change materials for solar thermal energy storage applications

    Directory of Open Access Journals (Sweden)

    Tsolakoglou Nikolas P.

    2017-01-01

    Full Text Available This work investigates melting and solidification processes of four different Phase Change Materials (PCM used as latent heat thermal storage system. The experimental rig was consisted of an insulated tank, filled with the under investigation PCM, a staggered heat exchanger to supply or extract heat from the PCM cavity and a water pump to circulate Heat Transfer Fluid (HTF. Both charging (melting and discharging (solidification processes were conducted for two different HTF flow rates. The main scope of this work was to develop a first approach and to investigate the behaviour of PCM under various load conditions (different HTF flow rates. Results show that different HTF flow rates affect melting and solidification time periods; in both processes time was reduced while HTF flow rate was increased but in differentways due to the transition from conduction to convection heat transfer mechanisms.

  19. Attribution Of Cyber Attacks On Process Control Systems

    Science.gov (United States)

    Hunker, Jeffrey; Hutchinson, Robert; Margulies, Jonathan

    The attribution of cyber attacks is an important problem. Attribution gives critical infrastructure asset owners and operators legal recourse in the event of attacks and deters potential attacks. This paper discusses attribution techniques along with the associated legal and technical challenges. It presents a proposal for a voluntary network of attributable activity, an important first step towards a more complete attribution methodology for the control systems community.

  20. Attack polish for nickel-base alloys and stainless steels

    Science.gov (United States)

    Not Available

    1980-05-28

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels is described. The chemical attack polich comprises FeNO/sub 3/, concentrated CH/sub 3/COOH, concentrated H/sub 2/SO/sub 4/ and H/sub 2/O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  1. Different Types of Attacks on Integrated MANET-Internet Communication

    OpenAIRE

    Abhay Kumar Rai, Rajiv Ranjan Tewari & Saurabh Kant Upadhyay

    2010-01-01

    Security is an important issue in the integrated MANET-Internet environment because inthis environment we have to consider the attacks on Internet connectivity and also onthe ad hoc routing protocols. The focus of this work is on different types of attacks onintegrated MANET-Internet communication. We consider most common types of attackson mobile ad hoc networks and on access point through which MANET is connected tothe Internet. Specifically, we study how different attacks affect the perfor...

  2. Backside polishing detector: a new protection against backside attacks

    OpenAIRE

    Manich Bou, Salvador; Arumi Delgado, Daniel; Rodríguez Montañés, Rosa; Mujal Colell, Jordi; Hernández García, David

    2015-01-01

    Secure chips are in permanent risk of attacks. Physical attacks usually start removing part of the package and accessing the dice by different means: laser shots, electrical or electromagnetic probes, etc. Doing this from the backside of the chip gives some advantages since no metal layers interfere between the hacker and the signals of interest. The bulk silicon is thinned from hundreds to some tens of micrometers in order to improve the performance of the attack. In thi...

  3. Flow-based Brute-force Attack Detection

    OpenAIRE

    Drašar, Martin; Vykopal, Jan; Winter, Philipp

    2013-01-01

    Brute-force attacks are a prevalent phenomenon that is getting harderto successfully detect on a network level due to increasing volume and en-cryption of network traffic and growing ubiquity of high-speed networks.Although the research in this field advanced considerably, there still remainclasses of attacks that are undetectable. In this chapter, we present sev-eral methods for the detection of brute-force attacks based on the analysisof network flows. We discuss their strengths and shortco...

  4. TCP-SYN Flooding Attack in Wireless Networks

    OpenAIRE

    Bogdanoski, Mitko; Suminoski, Tomislav; Risteski, Aleksandar

    2012-01-01

    This paper concerns the TCP (Transmission Control Protocol) vulnerabilities which gives space for a DoS (Denial of Service) attacks called TCP-SYN flooding which is well-known to the community for several years. The paper shows this attack in wireless as well as wired networks using perl synflood script, Wireshark network analyzer server, Windows 2008 server, and OPNET simulation environment. Using these tools an effects of this attack are shown. Finally, some effective practical mitigation t...

  5. Resveratrol products resulting by free radical attack

    Science.gov (United States)

    Bader, Yvonne; Quint, R. M.; Getoff, Nikola

    2008-06-01

    Trans-resveratrol ( trans-3,4',5-trihydroxystilbene; RES), which is contained in red wine and many plants, is one of the most relevant and extensively investigated stilbenes with a broad spectrum of biological activities. Among other duties, RES has been reported to have anti-carcinogenetic activities, which could be attributed to its antioxidant properties. The degradation of RES was studied under various conditions. The products (aldehydes, carboxylic acids, etc.) generated from RES by the attack of free radicals were registered as a function of the radical concentration (absorbed radiation dose). Based on the obtained data it appears that the OH radicals are initiating the rather complicated process, which involves of the numerous consecutive reactions. A possible starting reaction mechanism is presented.

  6. Entanglement generation secure against general attacks

    Science.gov (United States)

    Pirker, Alexander; Dunjko, Vedran; Dür, Wolfgang; Briegel, Hans J.

    2017-11-01

    We present a security proof for establishing private entanglement by means of recurrence-type entanglement distillation protocols over noisy quantum channels. We consider protocols where the local devices are imperfect, and show that nonetheless a confidential quantum channel can be established, and used to e.g. perform distributed quantum computation in a secure manner. While our results are not fully device independent (which we argue to be unachievable in settings with quantum outputs), our proof holds for arbitrary channel noise and noisy local operations, and even in the case where the eavesdropper learns the noise. Our approach relies on non-trivial properties of distillation protocols which are used in conjunction with de-Finetti and post-selection-type techniques to reduce a general quantum attack in a non-asymptotic scenario to an i.i.d. setting. As a side result, we also provide entanglement distillation protocols for non-i.i.d. input states.

  7. Detecting Cyber Attacks On Nuclear Power Plants

    Science.gov (United States)

    Rrushi, Julian; Campbell, Roy

    This paper proposes an unconventional anomaly detection approach that provides digital instrumentation and control (I&C) systems in a nuclear power plant (NPP) with the capability to probabilistically discern between legitimate protocol frames and attack frames. The stochastic activity network (SAN) formalism is used to model the fusion of protocol activity in each digital I&C system and the operation of physical components of an NPP. SAN models are employed to analyze links between protocol frames as streams of bytes, their semantics in terms of NPP operations, control data as stored in the memory of I&C systems, the operations of I&C systems on NPP components, and NPP processes. Reward rates and impulse rewards are defined in the SAN models based on the activity-marking reward structure to estimate NPP operation profiles. These profiles are then used to probabilistically estimate the legitimacy of the semantics and payloads of protocol frames received by I&C systems.

  8. Suicide bomb attack causing penetrating craniocerebral injury

    Directory of Open Access Journals (Sweden)

    Hussain Manzar

    2013-02-01

    Full Text Available 【Abstract】Penetrating cerebral injuries caused by foreign bodies are rare in civilian neurosurgical trauma, al-though there are various reports of blast or gunshot inju-ries in warfare due to multiple foreign bodies like pellets and nails. In our case, a 30-year-old man presented to neurosur-gery clinic with signs and symptoms of right-sided weak-ness after suicide bomb attack. The skull X-ray showed a single intracranial nail. Small craniotomy was done and the nail was removed with caution to avoid injury to surround-ing normal brain tissue. At 6 months’ follow-up his right-sided power improved to against gravity. Key words: Head injury, penetrating; Bombs; Nails

  9. Cyber-physical attacks: A growing invisible threat

    OpenAIRE

    Loukas, George

    2015-01-01

    Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building’s lights, make a car veer off the road, or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Pe...

  10. Attacks on biometric systems: a case study in fingerprints

    Science.gov (United States)

    Uludag, Umut; Jain, Anil K.

    2004-06-01

    In spite of numerous advantages of biometrics-based personal authentication systems over traditional security systems based on token or knowledge, they are vulnerable to attacks that can decrease their security considerably. In this paper, we analyze these attacks in the realm of a fingerprint biometric system. We propose an attack system that uses a hill climbing procedure to synthesize the target minutia templates and evaluate its feasibility with extensive experimental results conducted on a large fingerprint database. Several measures that can be utilized to decrease the probability of such attacks and their ramifications are also presented.

  11. Neural network classifier of attacks in IP telephony

    Science.gov (United States)

    Safarik, Jakub; Voznak, Miroslav; Mehic, Miralem; Partila, Pavol; Mikulec, Martin

    2014-05-01

    Various types of monitoring mechanism allow us to detect and monitor behavior of attackers in VoIP networks. Analysis of detected malicious traffic is crucial for further investigation and hardening the network. This analysis is typically based on statistical methods and the article brings a solution based on neural network. The proposed algorithm is used as a classifier of attacks in a distributed monitoring network of independent honeypot probes. Information about attacks on these honeypots is collected on a centralized server and then classified. This classification is based on different mechanisms. One of them is based on the multilayer perceptron neural network. The article describes inner structure of used neural network and also information about implementation of this network. The learning set for this neural network is based on real attack data collected from IP telephony honeypot called Dionaea. We prepare the learning set from real attack data after collecting, cleaning and aggregation of this information. After proper learning is the neural network capable to classify 6 types of most commonly used VoIP attacks. Using neural network classifier brings more accurate attack classification in a distributed system of honeypots. With this approach is possible to detect malicious behavior in a different part of networks, which are logically or geographically divided and use the information from one network to harden security in other networks. Centralized server for distributed set of nodes serves not only as a collector and classifier of attack data, but also as a mechanism for generating a precaution steps against attacks.

  12. Cyber-physical attacks a growing invisible threat

    CERN Document Server

    Loukas, George

    2015-01-01

    Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road,  or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral

  13. Further attacks on Yeung-Mintzer fragile watermarking scheme

    Science.gov (United States)

    Fridrich, Jessica; Goljan, Miroslav; Memon, Nasir D.

    2000-05-01

    In this paper, we describe new and improved attacks on the authentication scheme previously proposed by Yeung and Mintzer. Previous attacks assumed that the binary watermark logo inserted in an image for the purposes of authentication was known. Here we remove that assumption and show how the scheme is still vulnerable, even if the binary logo is not known but the attacker has access to multiple images that have been watermarked with the same secret key and contain the same (but unknown) logo. We present two attacks. The first attack infers the secret watermark insertion function and the binary logo, given multiple images authenticated with the same key and containing the same logo. We show that a very good approximation to the logo and watermark insertion function can be constructed using as few as two images. With color images, one needs many more images, nevertheless the attack is still feasible. The second attack we present, which we call the 'collage-attack' is a variation of the Holliman-Memon counterfeiting attack. The proposed variation does not require knowledge of the watermark logo and produces counterfeits of superior quality by means of a suitable dithering process that we develop.

  14. Cluster headache attack remission with sphenopalatine ganglion stimulation

    DEFF Research Database (Denmark)

    Barloese, Mads C J; Jürgens, Tim P; May, Arne

    2016-01-01

    attacks. Methods: We monitored self-reported attack frequency, headache disability, and medication intake in 33 patients with medically refractory, chronic CH (CCH) in an open label follow-up study of the original Pathway CH-1 study. Patients were followed for at least 24 months (average 750 ± 34 days...... disability improvements remained and patient satisfaction measures were positive in 100 % (10/10). Conclusions: In this population of 33 refractory CCH patients, in addition to providing the ability to treat acute attacks, neuromodulation of the SPG induced periods of remission from cluster attacks...

  15. The Need for Situational Awareness in a CBRNE Attack

    Directory of Open Access Journals (Sweden)

    Jordan Nelms

    2011-02-01

    Full Text Available Six years before the terrorist attacks on the World Trade Center and the Pentagon, and eight years before the United States went to war with Saddam Hussein for his alleged concealment of chemical and biological weapons caches, Japan's Tokyo subway was struck by one of the most vicious terror attacks in modern history.  The 1995 Sarin terrorist attack represents an important case study for post-9/11 emergency managers because it highlights the key issues first responders and public health officials face when confronted with a CBRNE ('C'hemical, 'B'iological, 'R'adiological, 'N'uclear, 'E'xplosive mass-casualty attack.

  16. Attack Pattern Analysis Framework for a Multiagent Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Krzysztof Juszczyszyn

    2008-08-01

    Full Text Available The paper proposes the use of attack pattern ontology and formal framework for network traffic anomalies detection within a distributed multi-agent Intrusion Detection System architecture. Our framework assumes ontology-based attack definition and distributed processing scheme with exchange of communicates between agents. The role of traffic anomalies detection was presented then it has been discussed how some specific values characterizing network communication can be used to detect network anomalies caused by security incidents (worm attack, virus spreading. Finally, it has been defined how to use the proposed techniques in distributed IDS using attack pattern ontology.

  17. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  18. Network attacks and defenses a hands-on approach

    CERN Document Server

    Trabelsi, Zouheir; Al Braiki, Arwa; Mathew, Sujith Samuel

    2012-01-01

    The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both offensive and defensive techniques. Using step-by-step processes to build and generate attacks using offensive techniques, Network Attacks and Defenses: A Hands-on Approach enables students to implement appropriate network security solutions within a laborat

  19. RFA: R-Squared Fitting Analysis Model for Power Attack

    Directory of Open Access Journals (Sweden)

    An Wang

    2017-01-01

    Full Text Available Correlation Power Analysis (CPA introduced by Brier et al. in 2004 is an important method in the side-channel attack and it enables the attacker to use less cost to derive secret or private keys with efficiency over the last decade. In this paper, we propose R-squared fitting model analysis (RFA which is more appropriate for nonlinear correlation analysis. This model can also be applied to other side-channel methods such as second-order CPA and collision-correlation power attack. Our experiments show that the RFA-based attacks bring significant advantages in both time complexity and success rate.

  20. A Review Of Recent Cyber-Attacks In Fiji

    Directory of Open Access Journals (Sweden)

    Neeraj A. Sharma

    2015-08-01

    Full Text Available Computing technology has evolved in such dramatic ways that a child can use such technology and their features. Internet is one such technology which allows peripheral devices to be connected to each other creating a network to share information. In the same way information can be attacked. In this paper we will be discussing the different types of cyber-attack that recently took place in Fiji. Common attacks discussed in this review paper are phishing email scams website defacement and skimming. Apart from common preventative methods some novel recommendations have been made. We believe the Fiji experiences and recommendations will assist technology users prepare better against such attacks.

  1. The timing of terrorist attacks: An optimal stopping approach

    Directory of Open Access Journals (Sweden)

    Thomas Jensen

    2016-02-01

    Full Text Available I use a simple optimal stopping model to derive policy relevant insights on the timing of one-shot attacks by small autonomous terrorist units or “lone wolf” individuals. A main insight is that an increase in proactive counterterrorism measures can lead to a short term increase in the number of attempted terrorist attacks because it makes it more risky for existing terrorist units to pursue further development of capabilities. This is consistent with the events in London in 2005 where a terrorist attack on 7 July was followed by a similar but unsuccessful attack two weeks later.

  2. Software test attacks to break mobile and embedded devices

    CERN Document Server

    Hagar, Jon Duncan

    2013-01-01

    Address Errors before Users Find Them Using a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of ""smart"" devices driven by software, the book focuses on attack-based testing that can be used by individuals and teams. The numerous test attacks show you when a software product does not work (i.e., has bugs) and provide you with information about the software product under test. The book guides you step by step starting with the basics. It

  3. Application distribution model and related security attacks in VANET

    Science.gov (United States)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  4. Privacy Leaks through Data Hijacking Attack on Mobile Systems

    Directory of Open Access Journals (Sweden)

    Zhang Daojuan

    2017-01-01

    Full Text Available To persistently eavesdrop on the mobile devices, attackers may obtain the elevated privilege and inject malicious modules into the user devices. Unfortunately, the attackers may not be able to obtain the privilege for a long period of time since the exploitable vulnerabilities may be fixed or the malware may be removed. In this paper, we propose a new data hijacking attack for the mobile apps. By employing the proposed method, the attackers are only required to obtain the root privilege of the user devices once, and they can persistently eavesdrop without any change to the original device. Specifically, we design a new approach to construct a shadow system by hijacking user data files. In the shadow system, attackers possess the identical abilities to the victims. For instance, if a victim has logged into the email app, the attacker can also access the email server in the shadow system without authentication in a long period of time. Without reauthentication of the app, it is difficult for victims to notice the intrusion since the whole eavesdropping is performed on other devices (rather than the user devices. In our experiments, we evaluate the effectiveness of the proposed attack and the result demonstrates that even the Android apps released by the top developers cannot resist this attack. Finally, we discuss some approaches to defend the proposed attack.

  5. Computer Network Attacks and Modern International Law

    Directory of Open Access Journals (Sweden)

    Andrey L. Kozik

    2014-01-01

    Full Text Available Computer network attacks (CNA is a no doubt actual theoretical and practical topic today. Espionage, public and private computer-systems disruptions committed by states have been a real life. States execute CNA's involving its agents or hiring private hacker groups. However, the application of lex lata remains unclear in practice and still undeveloped in doctrine. Nevertheless the international obligations, which states have accepted under the UN Charter and other treaties as well as customs - with any related exemptions and reservations - are still in force and create a legal framework, which one cannot ignore. Taking into account the intensity level or the consequences of a CNA the later could be considered as an unfriendly, but legal doing, or, as a use of force (prohibited under the article 2(4 of the UN Charter, or - in the case the proper threshold is taken - as an armed attack (which gives the victim-state the right to use force in self-defence under the customs and the article 51 of the UN Charter. Researches in the field of lex lata applicability to the CNAs could highlight gaps and week points of the nowadays legal regime. The subject is on agenda in western doctrine, and it is a pity - not in Russian one - the number of publication here is still unsatisfied. The article formulates issues related to CNAs and the modern international legal regime. The author explores the definition, legal volume of the term CNA, highlights main issues, which have to be analyzed from the point of the contemporary law.

  6. Real time stagger of electric network advanced analysis functions of a modern control center; Escalonamento em tempo real das funcoes avancadas de analise de rede eletrica de um moderno centro de controle

    Energy Technology Data Exchange (ETDEWEB)

    Zagari, Eduardo Nicola Ferraz

    1996-02-01

    This work presents two models for implementation of staggers for network analysis functions in real time for a control center. The methodology is described. Tests were performed in a electric power system of Campinas region, Sao Paulo sate - Southeast Brazil. Results are presented.

  7. Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment

    Science.gov (United States)

    Kebert, Alan; Barnejee, Bikramjit; Solano, Juan; Solano, Wanda

    2013-01-01

    The cloud computing environment offers malicious users the ability to spawn multiple instances of cloud nodes that are similar to virtual machines, except that they can have separate external IP addresses. In this paper we demonstrate how this ability can be exploited by an attacker to distribute his/her attack, in particular SQL injection attacks, in such a way that an intrusion detection system (IDS) could fail to identify this attack. To demonstrate this, we set up a small private cloud, established a vulnerable website in one instance, and placed an IDS within the cloud to monitor the network traffic. We found that an attacker could quite easily defeat the IDS by periodically altering its IP address. To detect such an attacker, we propose to use multi-agent plan recognition, where the multiple source IPs are considered as different agents who are mounting a collaborative attack. We show that such a formulation of this problem yields a more sophisticated approach to detecting SQL injection attacks within a cloud computing environment.

  8. Attacks on Mobile Phones that Use the Automatic Configuration Mechanism

    Directory of Open Access Journals (Sweden)

    A. G. Beltov

    2012-09-01

    Full Text Available The authors analyze the attacks on mobile devices that use the mechanism of an automatic configuration OMA/OTA, whose aim is listening to the Internet traffic of subscribers and the intrusion of malicious software on the user’s device, and suggest ways to protect mobile phones against such attacks.

  9. Harvesting Smartphone Privacy Through Enhanced Juice Filming Charging Attacks

    DEFF Research Database (Denmark)

    Meng, Weizhi; Fei, Fei; Li, Wenjuan

    2017-01-01

    information and data from smartphone users. Juice filming charging (JFC) attack is a particular type of charging attacks, which is capable of stealing users’ sensitive information from both Android OS and iOS devices, through automatically monitoring and recording phone screen during the whole charging period...

  10. Understanding How Components of Organisations Contribute to Attacks

    DEFF Research Database (Denmark)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    components quickly results in a large quantity of interrelations, which are hard to grasp. In this work we present several approaches for visualising attributes of attacks such as likelihood of success, impact, and required time or skill level. The resulting visualisations provide a link between attacks...

  11. Randomized, controlled trial of telcagepant over four migraine attacks

    DEFF Research Database (Denmark)

    Ho, Andrew P; Dahlöf, Carl Gh; Silberstein, Stephen D

    2010-01-01

    This study evaluated the calcitonin gene-related peptide (CGRP) receptor antagonist telcagepant (tablet formulation) for treatment of a migraine attack and across four attacks. Adults with migraine were randomized, double-blind, to telcagepant 140 mg, telcagepant 280 mg, or control treatment sequ...

  12. Quantitative security and safety analysis with attack-fault trees

    NARCIS (Netherlands)

    Kumar, Rajesh; Stoelinga, Mariëlle Ida Antoinette

    2017-01-01

    Cyber physical systems, like power plants, medical devices and data centers have to meet high standards, both in terms of safety (i.e. absence of unintentional failures) and security (i.e. no disruptions due to malicious attacks). This paper presents attack fault trees (AFTs), a formalism that

  13. Can a Copycat Effect be Observed in Terrorist Suicide Attacks?

    Directory of Open Access Journals (Sweden)

    Nicholas Farnham

    2017-03-01

    Full Text Available The purpose of this paper is to explore how a copycat effect – established within the field of suicide studies – may manifest itself in terrorist suicide attacks, and takes an exploratory approach in evaluating the prospect of incorporating open-data resources in future counter-terrorism research. This paper explores a possible ‘copycat effect’ in cases of suicide terrorism, which entails a perpetrator being inspired by a preceding attack to carry out a similar attack not long after the original. In the wake of mounting risks of lone wolf terrorist attacks today and due to the general difficulties faced in preventing such attacks, in this paper we explore a potential area of future prevention in media reporting, security and anti-terrorism policies today. Using the START Global Terrorism Database (GTD, this paper investigates terrorist suicide-attack clusters and analyses the relationship between attacks found within the same cluster. Using a mixed-method approach, our analyses did not uncover clear evidence supporting a copycat effect among the studied attacks. These and other findings have numerous policy and future research implications.

  14. Hereditary Angioedema Attacks: Local Swelling at Multiple Sites.

    Science.gov (United States)

    Hofman, Zonne L M; Relan, Anurag; Hack, C Erik

    2016-02-01

    Hereditary angioedema (HAE) patients experience recurrent local swelling in various parts of the body including painful swelling of the intestine and life-threatening laryngeal oedema. Most HAE literature is about attacks located in one anatomical site, though it is mentioned that HAE attacks may also involve multiple anatomical sites simultaneously. A detailed description of such multi-location attacks is currently lacking. This study investigated the occurrence, severity and clinical course of HAE attacks with multiple anatomical locations. HAE patients included in a clinical database of recombinant human C1-inhibitor (rhC1INH) studies were evaluated. Visual analog scale scores filled out by the patients for various symptoms at various locations and investigator symptoms scores during the attack were analysed. Data of 219 eligible attacks in 119 patients was analysed. Thirty-three patients (28%) had symptoms at multiple locations in anatomically unrelated regions at the same time during their first attack. Up to five simultaneously affected locations were reported. The observation that severe HAE attacks often affect multiple sites in the body suggests that HAE symptoms result from a systemic rather than from a local process as is currently believed.

  15. The Icatibant Outcome Survey: treatment of laryngeal angioedema attacks

    Science.gov (United States)

    Aberer, Werner; Bouillet, Laurence; Caballero, Teresa; Maurer, Marcus; Fabien, Vincent; Zanichelli, Andrea

    2016-01-01

    Objective To characterize the management and outcomes of life-threatening laryngeal attacks of hereditary angioedema (HAE) treated with icatibant in the observational Icatibant Outcome Survey (NCT01034969) registry. Methods This retrospective analysis was based on data from patients with HAE type I/II who received healthcare professional-administered or self-administered icatibant to treat laryngeal attacks between September 2008 and May 2013. Results Twenty centers in seven countries contributed data. Overall, 42 patients with HAE experienced 67 icatibant-treated laryngeal attacks. Icatibant was self-administered for 62.3% of attacks (healthcare professional-administered, 37.7%). One icatibant injection was used for 87.9% of attacks, with rescue or concomitant medication used for 9.0%. The median time to treatment was 2.0 h (n=31 attacks) and the median time to resolution was 6.0 h (n=35 attacks). Conclusions This analysis describes successful use of icatibant for the treatment of laryngeal HAE attacks in a real-world setting. PMID:27116379

  16. Effectiveness of the Call in Beach Volleyball Attacking Play

    Directory of Open Access Journals (Sweden)

    Künzell Stefan

    2014-12-01

    Full Text Available In beach volleyball the setter has the opportunity to give her or his hitter a “call”. The call intends that the setter suggests to her or his partner where to place the attack in the opponent’s court. The effectiveness of a call is still unknown. We investigated the women’s and men’s Swiss National Beach Volleyball Championships in 2011 and analyzed 2185 attacks. We found large differences between female and male players. While men called in only 38.4% of attacks, women used calls in 85.5% of attacks. If the male players followed a given call, 63% of the attacks were successful. The success rate of attacks without any call was 55.8% and 47.6% when the call was ignored. These differences were not significant (χ2(2 = 4.55, p = 0.103. In women’s beach volleyball, the rate of successful attacks was 61.5% when a call was followed, 35% for attacks without a call, and 42.6% when a call was ignored. The differences were highly significant (χ2(2 = 23.42, p < 0.0005. Taking into account the findings of the present study, we suggested that the call was effective in women’s beach volleyball, while its effect in men’s game was unclear. Considering the quality of calls we indicate that there is a significant potential to increase the effectiveness of a call.

  17. Defender-Attacker Decision Tree Analysis to Combat Terrorism.

    Science.gov (United States)

    Garcia, Ryan J B; von Winterfeldt, Detlof

    2016-12-01

    We propose a methodology, called defender-attacker decision tree analysis, to evaluate defensive actions against terrorist attacks in a dynamic and hostile environment. Like most game-theoretic formulations of this problem, we assume that the defenders act rationally by maximizing their expected utility or minimizing their expected costs. However, we do not assume that attackers maximize their expected utilities. Instead, we encode the defender's limited knowledge about the attacker's motivations and capabilities as a conditional probability distribution over the attacker's decisions. We apply this methodology to the problem of defending against possible terrorist attacks on commercial airplanes, using one of three weapons: infrared-guided MANPADS (man-portable air defense systems), laser-guided MANPADS, or visually targeted RPGs (rocket propelled grenades). We also evaluate three countermeasures against these weapons: DIRCMs (directional infrared countermeasures), perimeter control around the airport, and hardening airplanes. The model includes deterrence effects, the effectiveness of the countermeasures, and the substitution of weapons and targets once a specific countermeasure is selected. It also includes a second stage of defensive decisions after an attack occurs. Key findings are: (1) due to the high cost of the countermeasures, not implementing countermeasures is the preferred defensive alternative for a large range of parameters; (2) if the probability of an attack and the associated consequences are large, a combination of DIRCMs and ground perimeter control are preferred over any single countermeasure. © 2016 Society for Risk Analysis.

  18. A Survey of Man in the Middle Attacks

    DEFF Research Database (Denmark)

    Conti, Mauro; Dragoni, Nicola; Lesyk, Viktor

    2016-01-01

    The Man-In-The-Middle (MITM) attack is one of the most well known attacks in computer security, representing one of the biggest concerns for security professionals. MITM targets the actual data that flows between endpoints, and the confidentiality and integrity of the data itself. In this paper, ...

  19. Optimizing power system investments and resilience against attacks

    International Nuclear Information System (INIS)

    Fang, Yiping; Sansavini, Giovanni

    2017-01-01

    This paper studies the combination of capacity expansion and switch installation in electric systems that ensures optimum performance under nominal operations and attacks. The planner–attacker–defender model is adopted to develop decisions that minimize investment and operating costs, and functionality loss after attacks. The model bridges long-term system planning for transmission expansion and short-term switching operations in reaction to attacks. The mixed-integer optimization is solved by decomposition via two-layer cutting plane algorithm. Numerical results on an IEEE system shows that small investments in transmission line switching enhance resilience by responding to disruptions via system reconfiguration. Sensitivity analyses show that transmission planning under the assumption of small-scale attacks provides the most robust strategy, i.e. the minimum-regret planning, if many constraints and limited investment budget affect the planning. On the other hand, the assumption of large-scale attacks provides the most robust strategy if the planning process involves large flexibility and budget. - Highlights: • Investment optimization in power systems under attacks is presented. • Capacity expansion and switch installation for system reconfiguration are combined. • The problem is solved by decomposition via two-layer cutting plane algorithm. • Small investments in switch installation enhance resilience by response to attacks. • Sensitivity analyses identify robust planning against different attack scenarios.

  20. Rebound Attack on the Full LANE Compression Function

    DEFF Research Database (Denmark)

    Matusiewicz, Krystian; Naya-Plasencia, Maria; Nikolic, Ivica

    2009-01-01

    In this work, we apply the rebound attack to the AES based SHA-3 candidate Lane. The hash function Lane uses a permutation based compression function, consisting of a linear message expansion and 6 parallel lanes. In the rebound attack on Lane, we apply several new techniques to construct...

  1. The Rebound Attack and Subspace Distinguishers: Application to Whirlpool

    DEFF Research Database (Denmark)

    Lamberger, Mario; Mendel, Florian; Schläffer, Martin

    2015-01-01

    We introduce the rebound attack as a variant of differential cryptanalysis on hash functions and apply it to the hash function Whirlpool, standardized by ISO/IEC. We give attacks on reduced variants of the 10-round Whirlpool hash function and compression function. Our results are collisions for 5...

  2. Transforming Graphical System Models To Graphical Attack Models

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Mauw, S.; Kordy, B.

    2015-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations that

  3. Pattern association--a key to recognition of shark attacks.

    Science.gov (United States)

    Cirillo, G; James, H

    2004-12-01

    Investigation of a number of shark attacks in South Australian waters has lead to recognition of pattern similarities on equipment recovered from the scene of such attacks. Six cases are presented in which a common pattern of striations has been noted.

  4. Impacts Of Xenophobia Attacks On Tourism | Adeleke | IFE ...

    African Journals Online (AJOL)

    economic and social roles is Xenophobia. Safety has always been an important prerequisite for the altraction of international tourists. Xenophobic attacks puts tourism is a difficult trading environment as it scares tourist away. As tourism aids in building nation\\'s image, this is damaged easily by xenophobic attacks, and also ...

  5. Attacking process characterization of elite water polo female teams

    Directory of Open Access Journals (Sweden)

    Sofia Canossa

    2009-06-01

    Full Text Available The purpose of the present study was to analyze the attacking tasks and tactical organization of elite Women’s Water Polo. The sample consisted of 442 attack sequences of 8 games played by the top teams in a European Championship. Seventeen variables were analyzed according to the position and player’s participation, tactical organization and playing styles, as well as the efficacy of actions performed. The results from this study indicate that positional attack was the predominant performance factor in the attacking process. To this occurrence, the mixed floating defense was identified as the most frequent opposition. The counter-attack proved to be the most efficient strategy. The attacking process frequently started by ball recovering, in anticipation, and by the defense of the goal-keeper in the 2m zone. In central path, a first long-range pass to the right wing predominated. Teams preferred spontaneous shot on goal supported by assisted displacements, and extra player man offence situations. In general, the attacking sequences, do not take longer than 35s to be developed. Teams efficiency emerged related to the tactical means adopted, namely the spontaneous shot at goal on the front line and numerical superiority of players in attacking game situations.

  6. Attacking process characterization of elite water polo female teams

    Directory of Open Access Journals (Sweden)

    S. Canossa

    2009-01-01

    Full Text Available The purpose of the present study was to analyze the attacking tasks and tactical organization of elite Women’s Water Polo. The sample consisted of 442 attack sequences of 8 games played by the top teams in a European Championship. Seventeen variables were analyzed according to the position and player’s participation, tactical organization and playing styles, as well as the efficacy of actions performed. The results from this study indicate that positional attack was the predominant performance factor in the attacking process. To this occurrence, the mixed floating defense was identified as the most frequent opposition. The counter-attack proved to be the most efficient strategy. The attacking process frequently started by ball recovering, in anticipation, and by the defense of the goal-keeper in the 2m zone. In central path, a first long-range pass to the right wing predominated. Teams preferred spontaneous shot on goal supported by assisted displacements, and extra player man offence situations. In general, the attacking sequences, do not take longer than 35s to be developed. Teams efficiency emerged related to the tactical means adopted, namely the spontaneous shot at goal on the front line and numerical superiority of players in attacking game situations.

  7. 12 CFR 1780.16 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... Rules § 1780.16 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral... subpart shall be excused based on the pendency before any court of any interlocutory appeal or collateral...

  8. Measuring the effectiveness of SDN mitigations against cyber attacks

    NARCIS (Netherlands)

    Koning, R.; de Graaff, B.; Meijer, R.; de Laat, C.; Grosso, P.

    2017-01-01

    To address increasing problems caused by cyber attacks, we leverage Software Defined networks and Network Function Virtualisation governed by a SARNET-agent to enable autonomous response and attack mitigation. A Secure Autonomous Response Network (SARNET) uses a control loop to constantly assess the

  9. Extended KCI attack against two-party key establishment protocols

    NARCIS (Netherlands)

    Tang, Qiang; Chen, Liqun

    2011-01-01

    We introduce an extended Key Compromise Impersonation (KCI) attack against two-party key establishment protocols, where an adversary has access to both long-term and ephemeral secrets of a victim. Such an attack poses serious threats to both key authentication and key confirmation properties of a

  10. Understanding Bifurcation of Slow Versus Fast Cyber-Attackers

    NARCIS (Netherlands)

    van Wieren, Maarten; Doerr, Christian; Jacobs, Vivian; Pieters, Wolter; Livraga, Giovanni; Torra, Vicenç; Aldini, Alessandro; Martinelli, Fabio; Suri, Neeraj

    2016-01-01

    Anecdotally, the distinction between fast “Smash-and-Grab‿ cyber-attacks on the one hand and slow attacks or “Advanced Persistent Threats‿ on the other hand is well known. In this article, we provide an explanation for this phenomenon as the outcome of an optimization from the perspective of the

  11. Securing ARP and DHCP for mitigating link layer attacks

    Indian Academy of Sciences (India)

    Osama S Younes

    2017-11-24

    Nov 24, 2017 ... issues were not considered. Hence, the DHCP lacks some security mechanisms and is vulnerable to many attacks, such as the rogue DHCP server, DHCP starvation, and malicious DHCP client attacks [1]. The main source of. DHCP vulnerabilities is that it cannot authenticate entities. (the DHCP server and ...

  12. Israeli Adolescents' Coping Strategies in Relation to Terrorist Attacks

    Science.gov (United States)

    Tatar, Moshe; Amram, Sima

    2007-01-01

    Exposure to terrorism seriously threatens the well-being of children and adolescents. Israeli citizens have witnessed massive ongoing terrorist attacks during the last few years. The present research, conducted among 330 Israeli adolescents, examined coping strategies in relation to terrorist attacks. We found that adolescents utilize more…

  13. Are Risk Assessments of a Terrorist Attack Coherent?

    Science.gov (United States)

    Mandel, David R.

    2005-01-01

    Four experiments examined 3 types of violations of coherence criteria in risk assessments of a terrorist attack. First, the requirement that extensionally equivalent descriptions be assigned the same probability (i.e., additivity) was violated. Unpacking descriptions of an attack into subtypes led to an increase in assessed risk. Second,…

  14. Information on and Comments Concerning Suicide Plane Attacks

    Science.gov (United States)

    1945-06-25

    Attacks -’Defense Against. Reference: (a) CTF 51 Despatch 060900 of LUay 1945. 1.. This vessel has ’been subjected to suicide attacks from medium and lom...reports on the folloving ships: BOIERS (DE 637), RITHEUPINE ( YPD -25), I’ILSON (DD-408), TiALUGO (AO), RiLPH T;,LBOT (DD-39O), H. Ai. WTILEY (DI,-29

  15. Python Source Code Plagiarism Attacks on Introductory Programming Course Assignments

    Science.gov (United States)

    Karnalim, Oscar

    2017-01-01

    This paper empirically enlists Python plagiarism attacks that have been found on Introductory Programming course assignments for undergraduate students. According to our observation toward 400 plagiarism-suspected cases, there are 35 plagiarism attacks that have been conducted by students. It starts with comment & whitespace modification as…

  16. DDoS Attack Detection Algorithms Based on Entropy Computing

    Science.gov (United States)

    Li, Liying; Zhou, Jianying; Xiao, Ning

    Distributed Denial of Service (DDoS) attack poses a severe threat to the Internet. It is difficult to find the exact signature of attacking. Moreover, it is hard to distinguish the difference of an unusual high volume of traffic which is caused by the attack or occurs when a huge number of users occasionally access the target machine at the same time. The entropy detection method is an effective method to detect the DDoS attack. It is mainly used to calculate the distribution randomness of some attributes in the network packets' headers. In this paper, we focus on the detection technology of DDoS attack. We improve the previous entropy detection algorithm, and propose two enhanced detection methods based on cumulative entropy and time, respectively. Experiment results show that these methods could lead to more accurate and effective DDoS detection.

  17. Matrix metalloproteinases during and outside of migraine attacks without aura

    DEFF Research Database (Denmark)

    Ashina, M.; Tvedskov, J.F.; Thiesen, Kerstin Lipka

    2010-01-01

    Ashina M, Tvedskov JF, Lipka K, Bilello J, Penkowa M & Olesen J. Matrix metalloproteinases during and outside of migraine attacks without aura. Cephalalgia 2009. London. ISSN 0333-1024To test the hypothesis that permeability of the blood-brain barrier (BBB) is altered during migraine attack due...... to enhanced activation of matrix metalloproteinases (MMPs), we investigated MMP-3, MMP-9 and tissue inhibitor of metalloproteases (TIMP)-1 in the external jugular vein during and outside of migraine attacks in 21 patients with migraine without aura. In addition, we measured plasma levels of several other...... of MMP-3 in the external jugular (P = 0.002) and cubital (P = 0.008) vein during attacks compared with outside of attacks. We found no correlation of ictal or interictal MMP-3, MMP-9 and TIMP-1 to migraine duration and frequency analysed in 21 patients (P > 0.05). There was no difference between ictal...

  18. Improved Impossible Differential Attacks on Large-Block Rijndael

    DEFF Research Database (Denmark)

    Wang, Qingju; Gu, Dawu; Rijmen, Vincent

    2012-01-01

    . The improvement can lead to 10-round attack on Rijndael-256 as well. With 2198.1 chosen plaintexts, an attack is demonstrated on 9-round Rijndael-224 with 2 195.2 encryptions and 2140.4 bytes memory. Increasing the data complexity to 2216 plaintexts, the time complexity can be reduced to 2130 encryptions...... and the memory requirements to 2 93.6 bytes. For 9-round Rijndael-256, we provide an attack requiring 2229.3 chosen plaintexts, 2194 encryptions, and 2 139.6 bytes memory. Alternatively, with 2245.3 plaintexts, an attack with a reduced time of 2127.1 encryptions and a memory complexity of 290.9 bytes can...... be mounted. With 2244.2 chosen plaintexts, we can attack 10-round Rijndael-256 with 2253.9 encryptions and 2186.8 bytes of memory....

  19. Pareto Efficient Solutions of Attack-Defence Trees

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2015-01-01

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes......, such as probability or cost of attacks and defences. In case of multiple parameters most analytical methods optimise one parameter at a time, e.g., minimise cost or maximise probability of an attack. Such methods may lead to sub-optimal solutions when optimising conflicting parameters, e.g., minimising cost while...... maximising probability. In order to tackle this challenge, we devise automated techniques that optimise all parameters at once. Moreover, in the case of conflicting parameters our techniques compute the set of all optimal solutions, defined in terms of Pareto efficiency. The developments are carried out...

  20. Anti-discrimination Analysis Using Privacy Attack Strategies

    KAUST Repository

    Ruggieri, Salvatore

    2014-09-15

    Social discrimination discovery from data is an important task to identify illegal and unethical discriminatory patterns towards protected-by-law groups, e.g., ethnic minorities. We deploy privacy attack strategies as tools for discrimination discovery under hard assumptions which have rarely tackled in the literature: indirect discrimination discovery, privacy-aware discrimination discovery, and discrimination data recovery. The intuition comes from the intriguing parallel between the role of the anti-discrimination authority in the three scenarios above and the role of an attacker in private data publishing. We design strategies and algorithms inspired/based on Frèchet bounds attacks, attribute inference attacks, and minimality attacks to the purpose of unveiling hidden discriminatory practices. Experimental results show that they can be effective tools in the hands of anti-discrimination authorities.

  1. Toward Security Verification against Inference Attacks on Data Trees

    Directory of Open Access Journals (Sweden)

    Ryo Iwase

    2013-11-01

    Full Text Available This paper describes our ongoing work on security verification against inference attacks on data trees. We focus on infinite secrecy against inference attacks, which means that attackers cannot narrow down the candidates for the value of the sensitive information to finite by available information to the attackers. Our purpose is to propose a model under which infinite secrecy is decidable. To be specific, we first propose tree transducers which are expressive enough to represent practical queries. Then, in order to represent attackers' knowledge, we propose data tree types such that type inference and inverse type inference on those tree transducers are possible with respect to data tree types, and infiniteness of data tree types is decidable.

  2. Step to improve neural cryptography against flipping attacks.

    Science.gov (United States)

    Zhou, Jiantao; Xu, Qinzhen; Pei, Wenjiang; He, Zhenya; Szu, Harold

    2004-12-01

    Synchronization of neural networks by mutual learning has been demonstrated to be possible for constructing key exchange protocol over public channel. However, the neural cryptography schemes presented so far are not the securest under regular flipping attack (RFA) and are completely insecure under majority flipping attack (MFA). We propose a scheme by splitting the mutual information and the training process to improve the security of neural cryptosystem against flipping attacks. Both analytical and simulation results show that the success probability of RFA on the proposed scheme can be decreased to the level of brute force attack (BFA) and the success probability of MFA still decays exponentially with the weights' level L. The synchronization time of the parties also remains polynomial with L. Moreover, we analyze the security under an advanced flipping attack.

  3. Pre-attack signs and symptoms in cluster headache

    DEFF Research Database (Denmark)

    Snoer, Agneta; Lund, Nunu; Beske, Rasmus

    2018-01-01

    Introduction In contrast to the premonitory phase of migraine, little is known about the pre-attack (prodromal) phase of a cluster headache. We aimed to describe the nature, prevalence, and duration of pre-attack symptoms in cluster headache. Methods Eighty patients with episodic cluster headache...... or chronic cluster headache, according to ICHD-3 beta criteria, were invited to participate. In this observational study, patients underwent a semi-structured interview where they were asked about the presence of 31 symptoms/signs in relation to a typical cluster headache attack. Symptoms included previously...... reported cluster headache pre-attack symptoms, premonitory migraine symptoms and accompanying symptoms of migraine and cluster headache. Results Pre-attack symptoms were reported by 83.3% of patients, with an average of 4.25 (SD 3.9) per patient. Local and painful symptoms, occurring with a median of 10...

  4. Attacks on Bluetooth Security Architecture and Its Countermeasures

    Science.gov (United States)

    Iqbal, Mian Muhammad Waseem; Kausar, Firdous; Wahla, Muhammad Arif

    WPANs compliment the traditional IEEE 802.11 wireless networks by facilitating the clients with flexibility in network topologies, higher mobility and relaxed configuration/hardware requirements. Bluetooth, a WPAN technology, is an open standard for short-range radio frequency (RF) communication. However, it is also susceptible to typical security threats found in wireless LANs. This paper discuses some of the attack scenarios against the bluetooth network such as hostile intrusion, active Man-in-the-Middle (MITM) attack using unit key and various forms of denial of service (DoS) attacks. These threats and attacks compromise the confidentiality and availability of bluetooth data and services. This paper proposes an improved security architecture for bluetooth device which provides protection against the above mentioned attacks.

  5. Variability of clinical features in attacks of migraine with aura

    DEFF Research Database (Denmark)

    Hansen, Jakob M; Goadsby, Peter J; Charles, Andrew C

    2016-01-01

    BACKGROUND: There is significant variability in the clinical presentation of migraine, both among patients, and between attacks in an individual patient. We examined clinical features of migraine with aura in a large group of patients enrolled in a clinical trial, and compared retrospective...... a detailed retrospective description of the clinical features of their attacks of migraine. During the trial, clinical symptoms in migraine attacks starting with aura were recorded prospectively in 861 attacks. RESULTS: Retrospectively reported visual aura symptoms were variable and often overlapping...... in recalling or speaking words. A significant percentage of patients also reported a change in olfaction. There were several inconsistencies between the features of prospectively recorded and retrospectively reported attacks. Headache, nausea, photophobia, and phonophobia were all less common in prospectively...

  6. THE REPRISAL ATTACKS BY AL-SHABAAB AGAINST KENYA

    Directory of Open Access Journals (Sweden)

    E.O.S.ODHIAMBO

    2013-10-01

    Full Text Available The incursion of Kenya Defence Forces (KDF into Somalia was met by a series of threats from the Al-Shabaab that it would increase the attacks against Kenya if the troops were not withdrawn. The capture of Kismayu by KDF has weakened the nerve of Al-Shabaab but has not eliminated the imminent danger of a substantive terror attack. Since the incursion by KDF, Kenya has succumbed to a sequence of grenade and Improvised Explosive Devices attacks, roadside bombs, landmines and raids by fighters using small arms and light weapons and Rocket Propelled Grenades against Kenyans mostly in North Eastern, Coastal and Nairobi counties, marking the resurgence of terrorism in the country. We argue that Kenya is more vulnerable to Al-Shabaab terrorists attack than before the KDF incursion by citing the frequencies of reprisal attacks from October 2011 to January 2013. Hence, our troops should be withdrawn and deployed within our boundary.

  7. Detecting peripheral-based attacks on the host memory

    CERN Document Server

    Stewin, Patrick

    2015-01-01

    This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals generally communicate with the host via the host’s main memory, storing cryptographic keys, passwords, opened files and other sensitive data in the process – an aspect attackers are quick to exploit.  Here, stealthy malicious software based on isolated micro-controllers is implemented to conduct an attack analysis, the results of which provide the basis for developing a novel runtime detector. The detector reveals stealthy peripheral-based attacks on the host’s main memory by exploiting certain hardware properties, while a permanent and resource-efficient measurement strategy ensures that the detector is also capable of detecting transient attacks, which can otherwise succeed when the applied strategy only me...

  8. Metrics for Assessment of Smart Grid Data Integrity Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  9. Preventing Heart Attacks and Strokes: Increasing Awareness ...

    Science.gov (United States)

    Summary: Chronic cardiovascular disease imposes a significant health and economic burden on individuals and communities. Despite decades of improvement in cardiovascular mortality, cardiovascular disease and stroke remain the leading cause of death in the U.S. and disparities in health outcomes persist. Moreover, the continuous improvement in cardiovascular mortality typical of the last four decades has ended motivating new and innovative approaches to improve population health and wellbeing. Apart from continued focus on traditional risk factor modification such as identification and treatment of high blood pressure and cholesterol, cessation of smoking, and appropriate use of evidence-based pharmacological prevention measures and disease management, other factors should be considered such as increasing physical activity, dietary sodium reduction and modification of social and environmental determinants known to cause heart attacks and stroke and exacerbate vascular disease. Such an approach will require greater cooperation among public health, environmental health, the broader public and private healthcare delivery and payment systems, and federal agencies. To introduce this concept the U.S. EPA held a workshop in September 2016 bringing together representatives of local and state public health officials, the healthcare system, educators, data analytics, and federal partners (CMS, CDC, Dept. of State and EPA) for the purpose of exploring the idea of prom

  10. Neurons under viral attack: victims or warriors?

    Science.gov (United States)

    Chakraborty, Swarupa; Nazmi, Arshed; Dutta, Kallol; Basu, Anirban

    2010-01-01

    When the central nervous system (CNS) is under viral attack, defensive antiviral responses must necessarily arise from the CNS itself to rapidly and efficiently curb infections with minimal collateral damage to the sensitive, specialized and non-regenerating neural tissue. This presents a unique challenge because an intact blood-brain barrier (BBB) and lack of proper lymphatic drainage keeps the CNS virtually outside the radar of circulating immune cells that are at constant vigilance for antigens in peripheral tissues. Limited antigen presentation skills of CNS cells in comparison to peripheral tissues is because of a total lack of dendritic cells and feeble expression of major histocompatibility complex (MHC) proteins in neurons and glia. However, research over the past two decades has identified immune effector mechanisms intrinsic to the CNS for immediate tackling, attenuating and clearing of viral infections, with assistance pouring in from peripheral circulation in the form of neutralizing antibodies and cytotoxic T cells at a later stage. Specialized CNS cells, microglia and astrocytes, were regarded as sole sentinels of the brain for containing a viral onslaught but neurons held little recognition as a potential candidate for protecting itself from the proliferation and pathogenesis of neurotropic viruses. Accumulating evidence however indicates that extracellular insult causes neurons to express immune factors characteristic of lymphoid tissues. This article aims to comprehensively analyze current research on this conditional alteration in the protein expression repertoire of neurons and the role it plays in CNS innate immune response to counter viral infections. Copyright 2010 Elsevier Ltd. All rights reserved.

  11. Current therapy for chronic cerebrovascular attack

    Directory of Open Access Journals (Sweden)

    A. A. Shmonin

    2015-01-01

    Full Text Available Chronic cerebrovascular attack (CCVA is a brain lesion caused by vascular factors. CCVA appears as cognitive impairments (CIs, affective (emotional disorders and focal syndromes. Treatment for CCVA requires a comprehensive approach. Effective combination therapy for CCVA involves secondary prevention of stroke and CIs; treatment of CIs; treatment of depression and other affective disorders; and neuroprotective therapy. Basic therapy for CCVA includes modification of risk factors, antihypertensive, hypolipidemic, and antithrombotic therapies. Central acetylcholinesterase inhibitors (galantamine, rivastigmine, donepezil and a reversible NMDA receptor blocker (memantine are symptomatically used at a stage of vascular and mixed dementia. There are no unique guidelines for the therapy of mild and moderate vascular nondementia-related CIs. Drug use, based on the neurochemical mechanisms underlying the development of vascular CIs, is substantiated. When choosing psychotropic agents, it is necessary to take into account the causes and clinical manifestations of neuromediator deficiency. Antidepressants are used as essential drugs. Neuroleptics and tranquilizers are additionally administered in complex-pattern syndromes, such as depression with marked anxiety. Prescription of neuroprotectors may be effective in treating both stroke and CCVA. These medicaments are most effective when a damaging factor acts, i.e. neuroprotectors should be given in a risk situation and to reduce damage. Citicoline is one of the most test drugs in a group of neuroprotectors. 

  12. Intergranular attack evaluation from hideout return

    International Nuclear Information System (INIS)

    Nordmann, F.; Dupin, M.; Menet, O.; Fiquet, J.-M.

    1989-01-01

    Intergranular Attack (IGA) is the secondary side corrosion mechanism on PWR steam generator tubing, which can occur most frequently even with a good waterchemistry. It has moderately developed in a few French units. Consequently, several remedies have been implemented, such as sodium content decrease in makeup water and application of more stringent chemistry specifications. In order to evaluate the local chemistry in restricted areas where IGA may occur, a large hideout return programme has been carried out on many units. It shows that free alkalinity returning during shutdown is usually ranging from 0.5 to 5 g of sodium per steam generator, and that the required time to let it return is about 40 hours. However, high temperature pH calculations indicate that such an amount of alkalinity can correspond to a potentially corrosive solution in restricted areas, where a concentration factor of 10 5 to 10 7 can be reached, inducing a pH of 10 at 300 o C. Studies are still in progress in order to define when a shutdown should be required to allow hideout return and help to prevent IGA. (author)

  13. Effects of Permanent Bounded Cyber-Attacks on Networked Control Systems

    OpenAIRE

    Gerard, Benjamin; Voos, Holger; Li, Yumei; Darouach, Mohamed

    2015-01-01

    In this paper, the problem of permanent bounded cyber-attacks on networked control systems is treated. After a characterisation of malicious cyber attacks, the danger of permanent bounded cyber-attacks of two types is proved, the step attacks on system with invariant zero with zero real part and the free attacks. Simulation examples demonstrate the obtained results.

  14. Fatal injection: a survey of modern code injection attack countermeasures

    Directory of Open Access Journals (Sweden)

    Dimitris Mitropoulos

    2017-11-01

    Full Text Available With a code injection attack (CIA an attacker can introduce malicious code into a computer program or system that fails to properly encode data that comes from an untrusted source. A CIA can have different forms depending on the execution context of the application and the location of the programming flaw that leads to the attack. Currently, CIAs are considered one of the most damaging classes of application attacks since they can severely affect an organisation’s infrastructure and cause financial and reputational damage to it. In this paper we examine and categorize the countermeasures developed to detect the various attack forms. In particular, we identify two distinct categories. The first incorporates static program analysis tools used to eliminate flaws that can lead to such attacks during the development of the system. The second involves the use of dynamic detection safeguards that prevent code injection attacks while the system is in production mode. Our analysis is based on nonfunctional characteristics that are considered critical when creating security mechanisms. Such characteristics involve usability, overhead, implementation dependencies, false positives and false negatives. Our categorization and analysis can help both researchers and practitioners either to develop novel approaches, or use the appropriate mechanisms according to their needs.

  15. Changes in vestibular evoked myogenic potentials after Meniere attacks.

    Science.gov (United States)

    Kuo, Shih-Wei; Yang, Ting-Hua; Young, Yi-Ho

    2005-09-01

    The aim of this study was to apply videonystagmography (VNG) and vestibular evoked myogenic potential (VEMP) tests to patients with Meniere attacks, to explore the mechanics of where saccular disorders may affect the semicircular canals. From January 2001 to December 2003, 12 consecutive patients with unilateral definite Meniere's disease with vertiginous attacks underwent VNG for recording spontaneous nystagmus, as well as VEMP tests. At the very beginning of the Meniere attack, the spontaneous nystagmus beat toward the lesion side in 5 patients (42%) and toward the healthy side in 7 patients (58%). Twenty-four hours later, only 6 patients (50%) showed spontaneous nystagmus beating toward the healthy side. Nevertheless, spontaneous nystagmus subsided in all patients within 48 hours. The VEMP test was performed within 24 hours of a Meniere attack; the VEMPs were normal in 4 patients and abnormal in 8 patients (67%). After 48 hours, 4 patients with initially abnormal VEMPs had resolution and return to normal VEMPs, and the other 4 patients still had absent VEMPs. Most patients (67%) with Meniere attacks revealed abnormal VEMPs, indicating that the saccule participates in a Meniere attack. This is an important idea that stimulates consideration of the mechanism of Meniere attacks.

  16. Risk factors for hypertensive attack during pheochromocytoma resection

    Directory of Open Access Journals (Sweden)

    Se Yun Kwon

    2016-05-01

    Full Text Available Purpose: We aimed to retrospectively evaluate the risk factors for hypertensive attack during adrenalectomy in patients with pheochromocytoma. Despite the development of newer surgical and anesthetic techniques for the management of pheochromocytoma, intraoperative hypertensive attack continues to present a challenge. Materials and Methods: Data from 53 patients diagnosed with pheochromocytoma at Kyungpook National Uriversity Medical Center between January 2000 and June 2012 were retrospectively analyzed. The subjects were divided into 2 groups depending on the presence or absence of hypertensive attack at the time of surgery. Patient demographic characteristics and preoperative evaluations were assessed for their prognostic relevance with respect to hypertensive attack. A univariate analysis was conducted, and a multivariate logistic regression analysis was also performed. Results: In the univariate analysis, systolic blood pressure at presentation, preoperative hormonal status (including epinephrine, norepinephrine, vanillylmandelic acid, and metanephrine levels in a 24-hour urine sample, tumor size, and postoperative systolic blood pressure were significantly associated with the development of hypertensive attack. In the multivariate analysis, preoperative epinephrine level and tumor size were independent factors that predicted hypertensive attack. The highest odds ratio for tumor size (2.169 was obtained at a cutoff value of 4.25 cm and the highest odds ratio for preoperative epinephrine (1.020 was obtained at a cutoff value of 166.3 μg/d. Conclusions: In this study, a large tumor size and an elevated preoperative urinary epinephrine level were risk factors for intraoperative hypertensive attack in patients with pheochromocytoma.

  17. Construction of a Cyber Attack Model for Nuclear Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Varuttamaseni, Athi; Bari, Robert A.; Youngblood, Robert

    2017-05-01

    The consideration of how one compromised digital equipment can impact neighboring equipment is critical to understanding the progression of cyber attacks. The degree of influence that one component may have on another depends on a variety of factors, including the sharing of resources such as network bandwidth or processing power, the level of trust between components, and the inclusion of segmentation devices such as firewalls. The interactions among components via mechanisms that are unique to the digital world are not usually considered in traditional PRA. This means potential sequences of events that may occur during an attack may be missed if one were to only look at conventional accident sequences. This paper presents a method where, starting from the initial attack vector, the progression of a cyber attack can be modeled. The propagation of the attack is modeled by considering certain attributes of the digital components in the system. These attributes determine the potential vulnerability of a component to a class of attack and the capability gained by the attackers once they are in control of the equipment. The use of attributes allows similar components (components with the same set of attributes) to be modeled in the same way, thereby reducing the computing resources required for analysis of large systems.

  18. Data-plane Defenses against Routing Attacks on Tor

    Directory of Open Access Journals (Sweden)

    Tan Henry

    2016-10-01

    Full Text Available Tor is susceptible to traffic correlation attacks in which an adversary who observes flows entering and leaving the anonymity network can apply statistical techniques to correlate flows and de-anonymize their endpoints. While an adversary may not be naturally positioned to conduct such attacks, a recent study shows that the Internet’s control-plane can be manipulated to increase an adversary’s view of the network, and consequently, improve its ability to perform traffic correlation. This paper explores, in-depth, the effects of control-plane attacks on the security of the Tor network. Using accurate models of the live Tor network, we quantify Tor’s susceptibility to these attacks by measuring the fraction of the Tor network that is vulnerable and the advantage to the adversary of performing the attacks. We further propose defense mechanisms that protect Tor users from manipulations at the control-plane. Perhaps surprisingly, we show that by leveraging existing trust anchors in Tor, defenses deployed only in the data-plane are sufficient to detect most control-plane attacks. Our defenses do not assume the active participation of Internet Service Providers, and require only very small changes to Tor. We show that our defenses result in a more than tenfold decrease in the effectiveness of certain control-plane attacks.

  19. Attack resilience of the evolving scientific collaboration network.

    Directory of Open Access Journals (Sweden)

    Xiao Fan Liu

    Full Text Available Stationary complex networks have been extensively studied in the last ten years. However, many natural systems are known to be continuously evolving at the local ("microscopic" level. Understanding the response to targeted attacks of an evolving network may shed light on both how to design robust systems and finding effective attack strategies. In this paper we study empirically the response to targeted attacks of the scientific collaboration networks. First we show that scientific collaboration network is a complex system which evolves intensively at the local level--fewer than 20% of scientific collaborations last more than one year. Then, we investigate the impact of the sudden death of eminent scientists on the evolution of the collaboration networks of their former collaborators. We observe in particular that the sudden death, which is equivalent to the removal of the center of the egocentric network of the eminent scientist, does not affect the topological evolution of the residual network. Nonetheless, removal of the eminent hub node is exactly the strategy one would adopt for an effective targeted attack on a stationary network. Hence, we use this evolving collaboration network as an experimental model for attack on an evolving complex network. We find that such attacks are ineffectual, and infer that the scientific collaboration network is the trace of knowledge propagation on a larger underlying social network. The redundancy of the underlying structure in fact acts as a protection mechanism against such network attacks.

  20. Familial patterns in patients with infrequent panic attacks.

    Science.gov (United States)

    Dumas, C A; Katerndahl, D A; Burge, S K

    1995-10-01

    To evaluate the family environment in patients with infrequent panic attacks. Survey. Waiting room of a family health center at a university-based family practice residency program. The center primarily serves low-income or underinsured patients, 80% of whom are Hispanic. Randomly selected patients completed the panic disorder section of the Structured Clinical Interview of the Diagnostic and Statistical Manual of Mental Disorders, Third Edition. Thirty patients with infrequent panic attacks were compared with 30 control patients without panic attacks matched for age, gender, and ethnicity. Both groups completed in-depth interviews. None. The in-depth structured interview included family environment instruments--Family Adaptability and Cohesion Evaluation Scales and Duke Social Support and Stress Scale--as well as a genogram. Family violence and sexual abuse were assessed by means of the Conflict Tactic Scales and the Sexual Stress Questionnaire. Although patients with infrequent panic attacks were of lower birth order than patients without panic attacks (Wilcoxon chi 2 = 2.13, P family functioning were found. However, patients with infrequent panic attacks reported higher levels of childhood (paired t = 3.97, P family stress. Although the prevalence of family violence was similar between groups, the group with infrequent panic attacks reported more violent events in the past year (paired t = 2.60, P family functioning or support were found, the group with infrequent panic attacks reported more frequent violent events currently and higher levels of family stress. The high rate of childhood sexual abuse may have important causative implications for infrequent panic attacks.