Sample records for abdool karim attacking

  1. Antibodies Expressed by Intratumoral B Cells as the Basis for a Diagnostic Test for Lung Cancer

    DTIC Science & Technology

    2014-07-01

    Kepler , T. B., Denny, T., Moody, M. A., and Haynes, B. F. (2009) High-throughput isolation of immunoglobulin genes from single human B cells and...Parks, R., Foulger, A., Jaeger, F., Donathan, M., Bilska, M., Gray, E. S., Abdool Karim, S. S., Kepler , T. B., Whitesides, J., Montefiori, D., Moody...Vandergrift, N. A., Alam, S. M., Tomaras, G. D., Kepler , T. B., Kelsoe, G., Liao, H. X., and Haynes, B. F. (2011) H3N2 influenza infection elicits

  2. Antibodies Expressed by Intratumoral B Cells as the Basis for a Diagnostic Test for Lung Cancer

    DTIC Science & Technology

    2015-06-01

    Dixon, A., Zhang, R., Walter, E., Parks, R., Whitesides, J., Marshall, D. J., Hwang, K. K., Yang, Y., Chen, X., Gao, F., Munshaw, S., Kepler , T. B...A., Jaeger, F., Donathan, M., Bilska, M., Gray, E. S., Abdool Karim, S. S., Kepler , T. B., Whitesides, J., Montefiori, D., Moody, M. A., Liao, H...A., Alam, S. M., Tomaras, G. D., Kepler , T. B., Kelsoe, G., Liao, H. X., and Haynes, B. F. (2011) H3N2 influenza infection elicits more cross

  3. Research and reform are priorities for South Africa's new AIDS chiefs.

    PubMed

    Hambridge, M

    1995-06-01

    Beginning her political career as vice-president of the South Africa Students' Organization, Dr. Nkosazana Zuma has recently been appointed Minister of Health of South Africa. Zuma's appointment reflects her prominent role as an African National Congress (ANC) activist during apartheid, as well as her solid credentials and qualifications for the position. Dr. Zuma has been Director of the Health Refugee Trust, a scientist focused mainly upon AIDS at the Medical Research Council, and head of the ANC Women's League in Southern Natal over the period 1991-94. South African President Nelson Mandela has charged her with restructuring a fragmented and mainly urban-based health system so that all South Africans have access to affordable health care. To that end, Minister Zuma has thus far introduced free health care for children under six and for pregnant women, and a primary school nutrition scheme expected to reach four million children. AIDS has been given high priority. A National AIDS Plan has been adopted with regions given help in developing implementation plans. More money as well as private-public sector collaboration are, however, needed to accomplish the goals of the National Plan. Quarraisha Abdool Karim was appointed in January 1995 by Minister Zuma as the first National AIDS Director of the new South Africa. She is committed to reforming the health system and using intervention-based research as the main tool of change. Karim's extensive background in AIDS research, her involvement in the development of the National AIDS Plan, and her reputation as a campaigner for health reform make her an ideal candidate for the job. She helped draft the national AIDS strategy designed to meet the needs of women, and in 1991 helped establish an AIDS plan for KwaZulu/Natal which was subsequently integrated into the National AIDS Committee of South Africa (NACOSA). Karim's research has earned international acclaim. Among others, she also received a grant from the US National Institutes for Health in 1994 to teach at Colombia University. Finally, Karim has also worked as a consultant for the HIV/AIDS Program of the UN Development Program and the World Health Organization's Global Program on AIDS.

  4. Functional Response of Aphidoletes aphidimyza Rondani (Diptera: Cecidomyiidae) to Aphis gossypii Glover (Hemiptera: Aphididae): Effects of Vermicompost and Host Plant Cultivar.

    PubMed

    Mottaghinia, L; Hassanpour, M; Razmjou, J; Hosseini, M; Chamani, E

    2016-02-01

    Interactions between natural enemies and herbivores may be affected by application of fertilizers and different cultivars. We investigated the functional response of the predatory gall midge, Aphidoletes aphidimyza Rondani (Diptera: Cecidomyiidae) larvae to the nymphs of the melon aphid, Aphis gossypii Glover (Hemiptera: Aphididae), reared on two commonly grown cucumber cultivars in Iran (Khasib and Karim) treated with different vermicompost/soil ratios (0:100, 10:90, 20:80, and 30:70%). Based on logistic regression analysis, A. aphidimyza revealed a type II functional response to the aphid in all treatments. Attack rates and handling times of A. aphidimyza larvae on different vermicompost/soil ratios ranged from 0.076 to 0.140 h(-1) and 0.969 to 1.164 h on Khasib and from 0.092 to 0.123 h(-1) and 0.905 to 1.229 h on Karim, respectively. Furthermore, increasing the density of the melon aphid on both cultivars amended with vermicompost/soil ratios resulted in increased prey consumption by the predator. Density of trichomes increased when plants received higher concentrations of vermicompost. So, trichomes may be responsible for different attack rates and handling times of A. aphidimyza on both cultivars.

  5. 75 FR 2920 - In the Matter of the Designation of Nasir al-Wahishi, Also Known as Abu Basir, Also Known as Abu...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-19

    ..., Also Known as Abu Basir, Also Known as Abu Basir Nasir al-Wahishi, Also Known as Naser Abdel Karim al-Wahishi, Also Known as Nasir Abd al-Karim al- Wuhayshi, Also Known as Abu Basir Nasir al-Wuhayshi, Also Known as Nasser Abdul-karim Abdullah al-Wouhichi, Also Known as Abu Baseer al- Wehaishi, Also Known as...

  6. Differential response of NADP-dehydrogenases and carbon metabolism in leaves and roots of two durum wheat (Triticum durum Desf.) cultivars (Karim and Azizi) with different sensitivities to salt stress.

    PubMed

    Bouthour, Donia; Kalai, Tawba; Chaffei, Haouari C; Gouia, Houda; Corpas, Francisco J

    2015-05-01

    Wheat (Triticum durum Desf.) is a common Mediterranean species of considerable agronomic importance. Salinity is one of the major threats to sustainable agricultural production mainly because it limits plant productivity. After exposing the Karim and Azizi durum wheat cultivars, which are of agronomic significance in Tunisia, to 100mM NaCl salinity, growth parameters (dry weight and length), proline content and chlorophylls were evaluated in their leaves and roots. In addition, we analyzed glutathione content and key enzymatic activities, including phosphoenolpyruvate carboxylase (PEPC), NADP-isocitrate dehydrogenase (NADP-ICDH), NADP-malic enzyme (NADP-ME), glucose-6-phosphate dehydrogenase (G6PDH) and 6-phosphogluconate dehydrogenase (6PGDH), involved in the carbon metabolism and NADPH-generating system. The sensitivity index indicates that cv Karim was more tolerant to salinity than cv Azizi. This higher tolerance was corroborated at the biochemical level, as cv Karim showed a greater capacity to accumulate proline, especially in leaves, while the enzyme activities studied were differentially regulated in both organs, with NADP-ICDH being the only activity to be unaffected in all organs. In summary, the data indicate that higher levels of proline accumulation and the differential responses of some key enzymes involved in the carbon metabolism and NADPH regeneration contribute to the salinity tolerance mechanism and lead to increased biomass accumulation in cv Karim. Copyright © 2015 Elsevier GmbH. All rights reserved.

  7. IUE detector saturation and the new 2800 A absorption feature 'discovered' by Karim, Hoyle, and Wickramasinghe

    NASA Astrophysics Data System (ADS)

    Savage, B. D.; Sitko, M. L.

    1984-03-01

    The 2800 A feature of Karim et al. (1983) is shown to be the result of IUE detector saturation effects in overexposed spectra. A properly exposed spectrum and an overexposed one are shown. The latter shows a broad absorption peak at 2800 A while the former does not.

  8. Official Languages and the Economy. New Canadian Perspectives. Papers Presented at a Colloquium (Ottawa, Ontario, Canada, May 5, 1995).

    ERIC Educational Resources Information Center

    Canadian Heritage, Ottawa (Ontario).

    Papers from a colloquium on the relationship between Canada's official languages and its economy include: "Economic Dimensions of Minority and Foreign Language Use: An International Overview" (Karim H. Karim); "European Research on the economics of Language: Recent Results and Relevance to Canada" (Francois Grin);…

  9. Comments on Awad El Karim M. Ibrahim's "Becoming Black: Rap and Hip-Hop, Race, Gender, and Identity and the Politics of ESL Learning" [and] A Reader Reacts . . . [and] Identity or Identification? A Response to Some Objections.

    ERIC Educational Resources Information Center

    Goldstein, Lynn; Ibrahim, Awad El Karim M.

    2000-01-01

    Goldstein questions the way Awad El Karim M. Ibrahim portrayed her research on the language and identity of Hispanic English-as-a-Second-Language learners in his article, "Becoming Black: Rap and Hip-Hop, Race, Gender, and Identity and the Politics of ESL Learning." Ibrahim responds to these comments. (Author/VWL)

  10. Role of relativity in electron impact ionization

    NASA Astrophysics Data System (ADS)

    Saha, Bidhan C.; Basak, Arun K.; Alfaz Uddin, M.

    2006-03-01

    The recently modified MBELL parameters[1] are generalized in terms of nl quantum numbers and applied to few selective systems. We intend to describe the procedure and to report the excellent predictive role of this simple procedure[2]. [1] A. K. F. Haque, M. A. Uddin, A.K. Basak, K. R. Karim and B. C. Saha, Phys. Rev. A 76 (in press) [2] A. K. F. Haque, M. A. Uddin, A.K. Basak, K. R. Karim, B. C. Saha, and F. B. Malik, Phys. Rev. Lett (under consideration)

  11. More on the lambda 2800 A 'interstellar extinction' feature

    NASA Astrophysics Data System (ADS)

    McLachlan, A.; Nandy, K.

    1985-02-01

    In a response made to a recent letter by Karim et al. (1984), it is shown that the examples of interstellar absorption at 2800 A that they attribute to proteinaceous material can all be attributed to overexposure of IUE detectors. It is pointed out that stars in the Large Magellanic Cloud show pronounced absorption at 2800 A which cannot be due to interstellar protein since there is no associated absorption at 2200 A; this lack of absorption cannot be due to presence of graphite, whose absorption is weak in the Cloud. The claim by Karim et al. that the spectra of eight stars show 2800 A absorption and that these spectra are saturation-free is considered, and it is shown that data processing problems at IUE ground stations make these spectra unreliable.

  12. Rapid evaluation for dielectronic recombination rate coefficients of the H-like isoelectronic sequence.

    NASA Astrophysics Data System (ADS)

    Teng, H.; Xu, Z.

    1996-09-01

    The authors present a set of accurate formulae for the rapid calculation of dielectronic recombination rate coefficients of H-like ions from Ne (Z = 10) to Ni (Z = 29) with an electron temperature range from 0.6 to 10 keV. This set of formulae are obtained by fitting directly the dielectronic recombination rate coefficients calculated on the basis of the intermediate - coupling multi - configuration Hartree-Fock model made by Karim and Bhalla (1988). The dielectronic recombination rate coefficients from these formulae are in close agreement with the original results of Karim et al. The errors are generally less than 0.1%. The results are also compared with the ones obtained by a set of new rate formulae developed by Hahn. These formulae can be used for generating dielectronic recombination rate coefficients of some H-like ions where the explicit calculations are unavailable. The detailed results are tabulated and discussed.

  13. TechNovation Lecture Series

    NASA Image and Video Library

    2011-02-17

    Karim R. Lakhani, assistant professor at Harvard Business School, kicked off the Office of the Chief Technologist TechNovation Lecture series with his talk "Accessing the Ideas Cloud" on Thursday, Feb. 17, 2011 at NASA Headquarters in Washington. Photo Credit: (NASA/Carla Cioffi)

  14. 75 FR 61757 - Ocean Transportation Intermediary License Applicants

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-06

    ... Cargo Corp. (NVO & OFF), 8430 N.W. 66th Street, Miami, FL 33166. Officers: Karime Zawady, Vice President...), Jinho Um, CFO. Application Type: New NVO & OFF License. Junction Int'l Logistics, Inc. (NVO), 17870 Castleton Street, Suite 107, City of Industry, CA 91748. Officers: Charles Kuo, Secretary (Qualifying...

  15. Building a Flexible Nework Infrastructure for Moving Target Defense

    DTIC Science & Technology

    2017-10-13

    testbed. We have published a paper in the CAN Workshop held in conjunction with the ACM CoNext 2016 conference [3]. ML implementations on OpenNetVM...Artificial Intelligence applications in the network Workshop held in conjunction with IEEE ICNP 2017 [4]. [1] Azeem Aqil, Karim Khalil, Ahmed Atya

  16. The First World War Mesopotamian Campaigns: Military Lessons on Iraqi Ground Warfare

    DTIC Science & Technology

    2005-06-01

    during the monarchy of King Faisal II, and then General Abdel-Karim Kassem and finally strongman Colonel Abdel-Rahman Arif. The quality of such... Political Officer. The task was to embolden the population to make it as uncomfortable as possible for British forces on their way to Baghdad. Another

  17. Extending Methods: Using Bourdieu's Field Analysis to Further Investigate Taste

    ERIC Educational Resources Information Center

    Dimick, Alexandra Schindel

    2015-01-01

    In this commentary on Per Anderhag, Per-Olof Wickman and Karim Hamza's article "Signs of taste for science," I consider how their study is situated within the concern for the role of science education in the social and cultural production of inequality. Their article provides a finely detailed methodology for analyzing the constitution…

  18. Global Jihad: The Role of Europe’s Radical Muslims

    DTIC Science & Technology

    2007-12-01

    Abdelhak Najib and Karim Serraj, “Said Chedadi and Sheik Najib, the Missing Link of May 16?” La Gazette Du Maroc , 29 October 2003, http...Chedadi and Sheik Najib, the Missing Link of May 16?” La Gazette Du Maroc , 29 October 2003. http://translate.google.com/translate?u=http%3 A%2F%2

  19. Iraq: Politics, Governance, and Human Rights

    DTIC Science & Technology

    2014-02-05

    3 December 15, 2005, Elections Establish the First Full-Term Goverment ...First Full-Term Goverment The December 15, 2005, elections were for a full-term (four-year) national government (also in line with the schedule laid...and Social Affairs, Ministry of Planning, and Tourism and Antiquities, as well as one of two deputy COR speakerships. An INA technocrat, Abd al Karim

  20. Condom Use Behaviors and Correlates of Condom Use in the Botswana Defence Force

    DTIC Science & Technology

    2013-10-10

    female adolescents from Venda, South Africa. Br J Health Psychol 2007; 12: 51 63. 29. Magnani RJ, Karim AM, Weiss LA, et al. Reproductive health risk...and protective factors among youth in Lusaka, Zambia. J Adolesc Health 2002; 30(1): 76 86. 30. Tapia Aguirre V, Arillo Santillán E, Allen B, et al

  1. Inviting Children's Life Stories into the Elementary Classroom: The Storied Life of a Second-Language Learner.

    ERIC Educational Resources Information Center

    Wason-Ellam, Linda

    An ethnographic study examined the experiences of Karim (a member of the Ismaili cultural community in Canada), enrolled in an urban grade two multi-lingual classroom comprised of Canadian-born children who are second generation immigrants and whose daily lives are conducted in a language other than English. A researcher participated in the…

  2. Emergency and Higher Education: A Study of Impact and Prospects

    ERIC Educational Resources Information Center

    Job, P. S.; And Others

    1976-01-01

    The impact of the National Emergency in India on higher education is discussed by a group of educators: P. S. Job, Malcolm Adiseshiah, M. V. Rajagopal, N. A. Karim, I. C. Menon, P. T. Chandy, J. N. Kapur, John Vallamattom, and R. C. Mehrotra. Questions were posed to them concerning improving the quality of education, and the role of the…

  3. New Method for Calculating The Electron Impact Ionization of Ions

    NASA Astrophysics Data System (ADS)

    Saha, Bidhan; Basak, Arun K.; Uddin, M. A.

    2005-11-01

    The electron impact single ionization of ionic targets ( 1 <= Z <= 92) is reported using a recently proposed method [1]. It is based on the simplified version of the improved-binary-encounter-dipole (siBED) model [2]. Including the both the ionic and the relativistic corrections (RQIBED model) [3] we have recently investigated the ionization of He-like[4] and Be-like systems [5] with considerable success. However, the presence of adjustable parameters make it dependent on available experimental results We have applied a new techniques to avoid this and show explicitly how to evaluate cross sections for filled as well as unfilled s-orbital targets. Details will be presented at the conference. [1] M. A. Uddin, A. K. F. Haque, a. K. Basak, K. R. Karim and B. C. Saha, Phys Rev A (2005) in press [2] W. M. Huo, Phys. Rev. A 64, 042719 (2001). [3]M. A. Uddin, M. A. K. F. Haque, A. K. Basak and B. C. Saha, Phys. Rev. A 70, 032706 (2004). [4] M. A. Uddin, A. K. F. Haque, M. S. Mahbub, K. R. Karim, A. K. Basak, B. C. Saha, Int. J. Mass Spect. 244, 76 (2005).

  4. Iraq: Politics, Governance, and Human Rights

    DTIC Science & Technology

    2014-04-23

    December 15, 2005, Elections Establish the First Full-Term Goverment ........................... 4 2006-2011: Sectarian Conflict and U.S.-Assisted...the First Full-Term Goverment The December 15, 2005, elections were for a full-term (four-year) national government (also in line with the schedule...of Planning, and Tourism and Antiquities, as well as one of two deputy COR speakerships. An INA technocrat, Abd al Karim Luaibi, was appointed oil

  5. STS-129 Tweetup

    NASA Image and Video Library

    2009-11-15

    Twitter user Karim Jazouani from Casablanca, Morocco, who goes by the twitter name @karimjazouani, uses his laptop during a two-day NASA Tweetup event held at NASA's Kennedy Space Center in Cape Canaveral, Fla, Sunday, Nov. 15, 2009. NASA Twitter followers in attendance will have the opportunity to take a tour of NASA's Kennedy Space Center, view the space shuttle launch and speak with shuttle technicians, engineers, astronauts and managers. Photo Credit: (NASA/Carla Cioffi)

  6. Active Control of Flexible Space Structures Using the Nitinol Shape Memory Actuators

    DTIC Science & Technology

    1987-10-01

    number) FIELD !GROUP SUBGROUP I Active Control, Nitinol Actuators, Space Structures 9. ABSTRACT (Continue on reverse if necessary and identify by block...number) Summarizes research progress in the feasibility demonstration of active vibration control using Nitinol shape memory actuators. Tests on...FLEXIBLE SPACE STRUCTURES USING NITINOL SHAPE MEMORY ACTUATORS FINAL REPORT FOR PHASE I SDIO CONTRACT #F49620-87-C-0035 0 BY DR. AMR M. BAZ KARIM R

  7. Computer-Assisted Communication Device for Botulinum-Intoxicated Patients

    DTIC Science & Technology

    2008-01-01

    development of small molecule therapeutics for botulinum neurotoxin and on the development of nerve agent pretreatments and therapies . He has published...Souayah, N., Karim, H., Kamin, S.S., McArdle, J. and Marcus, S. (2006) ‘Severe botulism after focal injection of botulinum toxin’, Neurology , Vol...67, pp.1855–1856. Tacket, C.O., Shandera, W.X., Mann, J.M., Hargrett, N.T. and Blake, P.A. (1984) ‘ Equine antitoxin use and other factors that

  8. Measurements of Dielectronic Recombination Rate Coefficients for He-like and H-like Metal Ions from Tokamak Plasmas

    NASA Astrophysics Data System (ADS)

    Bitter, M.; Hsuan, H.; von Goeler, S.; Hill, K. W.; Grek, B.; Johnson, D. W.; Decaux, V.

    1991-01-01

    The dielectronic recombination rate coefficients associated with the Δn = 1 radiative core transitions have been determined for Ti XXI, Fe XXV, Ni XXVII, and Ti XXII as a function of the electron temperature from the analysis of x-ray satellite spectra emitted from tokamak plasmas. The results obtained are in good agreement with the recent theoretical predictions of Bely-Dubau et al., and Karim and Bhalla.

  9. Malaysia: where big is still better. For Malays, large families are part of the plan.

    PubMed

    1993-11-03

    The benefits of various-sized families in Malaysia were discussed by several women and supplemented with official statements on family planning (FP). The Director of the National Population and Family Development, Dr. Raj Karim, advised that maternal health is jeopardized when women have more than five children. About 30% of reproductive age women in Malaysia have five or more children. A Federation of FP Associations spokesperson agreed that women should be advised of the dangers of bearing over five children, of the importance of spacing births two to four years apart, and of the ideal age of childbearing (21-39 years). The government lacks an official policy on family size. The government position is, however, compatible with Islamic teachings on spacing in order to protect the health of the mother and child. Islamic law does not permit sterilization or abortion. The "fatwas" of Islamic teaching may have been misconstrued by those not using any form of contraception. Dr. Karim, who has five children, reported that having a large family can be difficult for a woman with a job, a career, and a husband or when both parents work. Most Malays desire large families. The average Malay family size was 4.1 children in 1990; Malaysian Chinese have fertility of 2.3 children and Malaysian Indians have 2.6 children. People say that the benefits outweigh the hardships of a large family.

  10. A New Arab Alliance System: Causes of the Iraq-Iran War and the Reaction of Various Arab States.

    DTIC Science & Technology

    1981-06-01

    the downfall of the Iraqi monarchy in July, 1958 and the proclamation of a Republic by Abd al-Karim Kassem , the relationship between monarchical Iran...and republican Iraq was significantly damaged. This was due to the fact that Kassem , under severe Arab pres- sure, departed from the "Baghdad Pact...34 between Iraq, Turkey, 13 Iran, Pakistan and Great Britain. Kassem departed from the pro-Western orientation of the "Baghdad Pact" states and adopted an

  11. Le Viséen supérieur d'Azarhare (Maroc central) : environnements de dépôt, datation et évolution diagánótique

    NASA Astrophysics Data System (ADS)

    Karim, Atika; Berkhli, Mostafa; Vachard, Daniel; Tribovillard, Nicolas; Orberger, Beate

    2005-04-01

    The unexplored area of Azarhare in central Morocco is studied thanks to three sections composed of five lithological facies Main biostratigraphical and sedimentological results concern (1) the identification of Late Visean biozones, with important presence of problematic algae Ungdarella, (2) the regional extension of deposit sequences SD5, SD6 and SD7 previously defined, (3) and an analysis of the diagenetic kaolinite. To cite this article: A. Karim et al., C. R. Geoscience 337 (2005).

  12. Polymer Based Molecular Composites. Volume 171. Materials Research Society Symposium Proceedings Held in Boston, Massachusetts on 27-30 November 1989

    DTIC Science & Technology

    1990-09-01

    231 Harry L. Frisch PART V: IONOMERS/STRUCTURE SMALL ANGLE X - RAY SCATTERING ON POLY(ETHYLENE-METHACRYLIC ACID) LEAD AND LEAD SULFIDE IONOMERS 237...E.J. Kramer, R.J. Composto, R.S. Stein, T.P. Russell, G.P. Felcher, A. Mansour, and A. Karim * td:tt Papet Vil X - RAY REFLECTIVITY AND FLUORESCENCE...Sammann DETERMINATION OF PARTICLE SIZE OF A DISPERSED PHASE BY SMALL-ANGLE X - RAY SCATTERING 413 Frank C. Wilson *Invited Paper ix SYNTHESIS AND

  13. Water stable isotope shifts of surface waters as proxies to quantify evaporation, transpiration and carbon uptake on catchment scales

    NASA Astrophysics Data System (ADS)

    Barth, Johannes; van Geldern, Robert; Veizer, Jan; Karim, Ajaz; Freitag, Heiko; Fowlwer, Hayley

    2017-04-01

    Comparison of water stable isotopes of rivers to those of precipitation enables separation of evaporation from transpiration on the catchment scale. The method exploits isotope ratio changes that are caused exclusively by evaporation over longer time periods of at least one hydrological year. When interception is quantified by mapping plant types in catchments, the amount of water lost by transpiration can be determined. When in turn pairing transpiration with the water use efficiency (WUE i.e. water loss by transpiration per uptake of CO2) and subtracting heterotrophic soil respiration fluxes (Rh), catchment-wide carbon balances can be established. This method was applied to several regions including the Great Lakes and the Clyde River Catchments ...(Barth, et al., 2007, Karim, et al., 2008). In these studies evaporation loss was 24 % and 1.3 % and transpiration loss was 47 % and 22 % when compared to incoming precipitation for the Great Lakes and the Clyde Catchment, respectively. Applying WUE values for typical plant covers and using area-typical Rh values led to estimates of CO2 uptake of 251 g C m-2 a-1 for the Great Lakes Catchment and CO2 loss of 21 g C m2 a-1 for the Clyde Catchment. These discrepancies are most likely due to different vegetation covers. The method applies to scales of several thousand km2 and has good potential for improvement via calibration on smaller scales. This can for instance be achieved by separate treatment of sub-catchments with more detailed mapping of interception as a major unknown. These previous studies have shown that better uncertainty analyses are necessary in order to estimate errors in water and carbon balances. The stable isotope method is also a good basis for comparison to other landscape carbon balances for instance by eddy covariance techniques. This independent method and its up-scaling combined with the stable isotope and area-integrating methods can provide cross validation of large-scale carbon budgets. Together they can help to constrain relationships between carbon and water balances on the continental scale. References .Barth JAC, Freitag H, Fowler HJ, Smith A, Ingle C, Karim A (2007) Water fluxes and their control on the terrestrial carbon balance: Results from a stable isotope study on the Clyde Watershed (Scotland). Appl Geochem 22: 2684-2694 DOI 10.1016/j.apgeochem.2007.06.002 Karim A, Veizer J, Barth J.A.C. (2008) Net ecosystem production in the great lakes basin and its implications for the North American missing carbon sink: A hydrologic and stable isotope approach. Global and Planetary Change 61: 15-27 DOI 10.1016/j.gloplacha.2007.08.004

  14. No evidence for interstellar proteins

    NASA Astrophysics Data System (ADS)

    Koch, R. H.; Davies, R. E.

    1984-03-01

    The claim by Karim et al. (1983) that the broad interstellar feature near 280 nm suggests the existence of proteinaceous matter in the interstellar medium is addressed. From astronomical and biochemical arguments it is shown that no quantitative measures of optical depth can be derived from the published data and that there is a great wealth of organic molecules which have absorptions at or near this wavelength interval. The amino acid tryptophan is one such molecule but the deduced spectrum does not satisfy two other properties of its spectrum. In particular, the 280 nm absorption for tryptophan refers to an aqueous solution of the molecule, and no liquid water is expected to exist in the ISM.

  15. Resonant transfer excitation in collisions of F6+ and Mg9+ with H2

    NASA Astrophysics Data System (ADS)

    Bernstein, E. M.; Kamal, A.; Zaharakis, K. E.; Clark, M. W.; Tanis, J. A.; Ferguson, S. M.; Badnell, N. R.

    1991-10-01

    Experimental and theoretical investigations of resonant transfer excitation (RTE) for F6++H2 and Mg9++H2 collisions have been made. For both collision systems good agreement is obtained between the measured cross sections for K-shell x-ray emission coincident with electron-capture and theoretical RTE calculations. For F6+ the present calculations are about 10% lower than previous results of Bhalla and Karim [Phys. Rev. A 39, 6060 (1989); 41, 4097(E) (1990]; the measured cross sections are a factor of 2.3 larger than earlier measurements of Schulz et al. [Phys. Rev. A 38, 5454 (1988)]. The previous disagreement between experiment and theory for F6+ is removed.

  16. Relativistic effects in electron impact ionization from the p-orbital

    NASA Astrophysics Data System (ADS)

    Haque, A. K. F.; Uddin, M. A.; Basak, A. K.; Karim, K. R.; Saha, B. C.; Malik, F. B.

    2006-06-01

    The parameters of our recent modification of BELI formula (MBELL) [A.K.F. Haque, M.A. Uddin, A.K. Basak, K.R. Karim, B.C. Saha, Phys. Rev. A 73 (2006) 012708] are generalized in terms of the orbital quantum numbers nl to evaluate the electron impact ionization (EII) cross sections of a wide range of isoelectronic targets (H to Ne series) and incident energies. For both the open and closed p-shell targets, the present MBELL results with a single parameter set, agree nicely with the experimental cross sections. The relativistic effect of ionization in the 2p subshell of U82+ for incident energies up to 250 MeV is well accounted for by the prescribed parameters of the model.

  17. Electron impact ionization from p-orbital targets

    NASA Astrophysics Data System (ADS)

    Saha, Bidhan; Basak, Arun K.; Alfaz Uddin, M.

    2006-05-01

    Electron impact ionization cross sections are evaluated using a modified version [1] of the BELL formula [2] for a wide range of isoelectronic targets, ranging from Li to Ne targets with both the open and closed shell configurations. In this report the MBELL parameters are generalized for treating the orbital quantum numbers nl dependency; its accuracy has been tested by evaluating cross sections for a wider range of species and energies. Details will be presented at the meeting. [1] A. K. F. Haque, M. A. Uddin, A. K. Basak, K. R. Karim and B. C. Saha, Phys. Rev. A73, 012708 (2005). [2] K. L. Bell, H. B. Gilbody, J. G. Hughes, A. E. Kingston, and F. J. Smith, J. Phys. Chem. Ref. Data 12, 891 (1983).

  18. The ultraviolet absorbance spectrum of coliform bacteria and its relationship to astronomy

    NASA Astrophysics Data System (ADS)

    Hoyle, F.; Wickramasinghe, N. C.; Jansz, E. R.; Jayatissa, P. M.

    1983-09-01

    The ultraviolet absorbance spectrum of a mixed culture of coliform bacteria is obtained and compared to recent measurements of the extinction curve of starlight. The absorbance of the bacterial suspensions over the wavebands 3500-2000 A and 7000-3400 A are presented along with a comparison of the extinction values for the star HD 14250 with the alpha function of the coliform suspension, which is a measure of the total amount of the material in the line of sight of the star. The agreement is excellent and is just as good as the agreement obtained by Karim et al. (1983) for typtophan in isolation, supporting the contention that the tryptophan responsible for the astronomical extinction is present in the interstellar grains in protein form.

  19. Electron Impact K-shell Ionization Cross Sections at high energies

    NASA Astrophysics Data System (ADS)

    Haque, A. K. F.; Sarker, M. S. I.; Patoary, M. A. R.; Shahjahan, M.; Ismail Hossain, M.; Alfaz Uddin, M.; Basak, A. K.; Saha, Bidhan

    2008-10-01

    A simple modification of the empirical model of Deutsh et. al. [1] by incorporating both the ionic [2] and relativistic corrections [3] is proposed for evaluating the electron impact K -shell ionization cross sections of neutral atomic targets. Present results for 30 atomic targets with atomic number Z=1 -- 92 for incident energies up to E=2 GeV, agree well with available experimental cross sections. Comparisons with other theoretical findings will also be presented at the conference. [1] H. Deutsh, K. Becker, T. D. Mark, Int. J. Mass Spect. 177, 47 (1998). [2] M. A. Uddin, A. K. F. Haque, M. M. Billah, A. K. Basak, K. R. Karim, B. C. Saha, Phys. Rev. A 71, 032715 (2005).; Phys. Rev. A 73, 012708 (2006). [3] M. Gryzinski, Phys. Rev 138, 336 (1965).

  20. Corrigendum to "A study of steam methanol reforming in a microreactor" [J. Power Sources 173 (2007) 458-466

    NASA Astrophysics Data System (ADS)

    Suh, Jeong-Se; Lee, Ming-tsang; Greif, Ralph; Grigoropoulos, Costas P.

    A corrigendum has been requested by the authors of this paper due to the following errors: Thermal conductivity of the catalyst is changed from 20 W mK -1 to 0.3 W mK -1. In Table 1, the value of the thermal conductivity of the catalyst is changed from 20 W mK -1 (Touloukian [22]) to 0.3 W mK -1 (Karim [10]). As noted on p. 464 of the paper there was little variation of the gas temperature. Calculations have also been made at the value of the thermal conductivity of 0.3 W mK -1 and again yielded little variation of the gas temperature and thus a negligible change in the results.

  1. Electron Impact Inner-shell Ionization including relativistic corrections.

    NASA Astrophysics Data System (ADS)

    Saha, Bidhan C.; Alfaz Uddin, M.; Basak, Arun K.

    2007-04-01

    We report a simple method to evaluate the electron impact inner-shell ionization cross sections at ultra high energy regime; there still remains a sparse cross sections due to lack of reliable method. To extend the validity domains of the siBED model [1] in terms of targets and incident energies in this work we modified the RQIBED model [2], and denoted it as MUIBED. It is examined for the description of the experimental EIICS data of various target atoms up to E=250MeV. Details will be presented at the meeting. [1] W. M. Huo, Phys. Rev A 64, 042719 (2001). [2] M. A. Uddin, A. K. F. Haque, M. S. Mahbub, K. R. Karim, A. K. Basak and B. C. Saha, Phys. Rev. A 71, 032715 (2005).

  2. Soil Biogeochemical Properties and Erosion Source Prediction Model Summary for the Buffalo Bayou Watershed, Houston, Texas

    NASA Astrophysics Data System (ADS)

    Ahmed, I.

    2015-12-01

    We draw conclusions on the research output and findings from a 4-year multidisciplinary USDA-CBG collaborative program in sustainable integrated monitoring of soil organic carbon (SOC) loss prediction via erosion. The underlying method uses the state-of-the-art stable isotope science of sediment tracing under uncertain hydrologic influences. The research finds are rooted in the (i) application of Bayesian Markov Chain Monte Carlo statistical models to assess the relationship between rainfall-runoff and soil erosion in space and time, (ii) capture of the episodic nature of rainfall events and its role in the spatial distribution of SOC loss from water erosion, (iii) stable isotope composition guided fingerprinting (source and quantity) of eroded soil, and (iv) the creation of an integrated watershed scale statistical soil loss monitoring model driven by spatial and temporal correlation of flow and stable isotope composition. The research theme was successfully applied on the urbanized Buffalo Bayou Watershed in Houston, Texas. The application brought to light novel future research conceptual outlines which will also be discussed in this deliverable to the AGU meeting. These include but not limited to: regional rainfall cluster research, physics of muddy river-bank soil and suspended sediment interaction, and friction & mobility that together make up the plasticity of soil aggregates that control erosion processes and landscape changes in a riparian corridor. References: Ahmed, I., Karim, A., Boutton, T.W., and Strom, K.B. (2013a). "Monitoring Soil Organic Carbon Loss from Erosion Using Stable Isotopes." Proc., Soil Carbon Sequestration, International Conference, May 26-29, Reykjavik, Iceland. Ahmed, I, Bouttom, T.W., Strom, K. B., Karim, A., and Irvin-Smith, N. (2013b). "Soil carbon distribution and loss monitoring in the urbanized Buffalo Bayou watershed, Houston, Texas." Proc., 4th Annual All Investigators Meeting of the North American Carbon Program, February 4-7, Albuquerque, NM. Fox, J.F. and Papanicolaou, A.N. (2008). An un-mixing model to study watershed erosion processes. Advances in Water Resources, 31, 96-108.

  3. VizieR Online Data Catalog: An ALMA survey of ECDFS submillimeter galaxies (Simpson+, 2014)

    NASA Astrophysics Data System (ADS)

    Simpson, J. M.; Swinbank, A. M.; Smail, I.; Alexander, D. M.; Brandt, W. N.; Bertoldi, F.; De Breuck, C.; Chapman, S. C.; Coppin, K. E. K.; da Cunha, E.; Danielson, A. L. R.; Dannerbauer, H.; Greve, T. R.; Hodge, J. A.; Ivison, R. J.; Karim, A.; Knudsen, K. K.; Poggianti, B. M.; Schinnerer, E.; Thomson, A. P.; Walter, F.; Wardlow, J. L.; Weiss, A.; van der Werf, P. P.

    2017-07-01

    In this study we undertake a multi-wavelength analysis of the ALMA-detected submm galaxies from the catalog presented by Hodge et al. (2013, J/ApJ/768/91) (see also Karim et al. 2013MNRAS.432....2K). To briefly summarize the observations, we obtained 120 s integrations of 122 of the original 126 LESS submm sources, initially identified using the LABOCA camera on the APEX telescope (Weiss et al. 2009, J/ApJ/707/1201). These Cycle 0 observations used the compact configuration, yielding a median synthesized beam of ~1.6"x1.2". The observing frequency was matched to the original LESS survey, 344 GHz (Band 7), and we reach a typical rms across our velocity-integrated maps of 0.4 mJy/beam. (3 data files).

  4. Inner-shell Ionization With Relativistic Corrections By Electron Impact

    NASA Astrophysics Data System (ADS)

    Saha, Bidhan; Patoary, M. A. R.; Alfaz Uddin, M.; Haque, A. K. F.; Basak, Arun K.

    2007-06-01

    A simple method is proposed and tested by evaluating the electron impact inner-shell ionization cross sections of various targets up to ultra high energy region. In this energy region there are not many calculations due to lack of reliable method. In this work we extend the validity of the siBED model [1] in terms of targets and incident energies. The extension of our earlier RQIBED model [2] is also reported here and we examined its findings for the description of the experimental EIICS data of various targets up to E=1000 MeV. Details will be presented at the meeting. [1] W. M. Huo, Phys. Rev A 64, 042719 (2001). [2] M. A. Uddin, A. K. F. Haque, M. S. Mahbub, K. R. Karim, A. K. Basak and B. C. Saha, Phys. Rev. A 71, 032715 (2005).

  5. Electron impact ionization of atomic targets at relativistic energies

    NASA Astrophysics Data System (ADS)

    Uddin, M. A.; Basak, A. K.; Saha, B. C.

    2009-05-01

    The huge demand and scarcity of electron impact ionization cross sections (EIICS) that are essential not only in modeling but also in basic researches can be best filled in by simple to use analytical models [1] that are sufficiently accurate and provide fast generation of EIICS data over wide domain. We report few such models and compare their productive powers in terms of few adjustable parameters. Details of our results will be presented in the conference. [1] A. K. F. Haque, M. A. Uddin, A. K. Basak, K. R. Karim, B. C. Saha, and F. B. Malik, Phys. Scr. 74, 377 (2006); Phys. Rev A 73, 052703; M. A. R. Patoary, M. A. Uddin, A. K. F. Haque, M. Shahjahan, A. K. Basak, M. R. Talukdar and B. C. Saha, Int. J. Quan. Chem (in press). Supported by NSF CREST.

  6. Resonant transfer excitation in collisions of F sup 6+ and Mg sup 9+ with H sub 2

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bernstein, E.M.; Kamal, A.; Zaharakis, K.E.

    1991-10-01

    Experimental and theoretical investigations of resonant transfer excitation (RTE) for F{sup 6+}+H{sub 2} and Mg{sup 9+}+H{sub 2} collisions have been made. For both collision systems good agreement is obtained between the measured cross sections for {ital K}-shell x-ray emission coincident with electron-capture and theoretical RTE calculations. For F{sup 6+} the present calculations are about 10% lower than previous results of Bhalla and Karim (Phys. Rev. A 39, 6060 (1989); 41, 4097(E) (1990)); the measured cross sections are a factor of 2.3 larger than earlier measurements of Schulz {ital et} {ital al}. (Phys. Rev. A 38, 5454 (1988)). The previous disagreementmore » between experiment and theory for F{sup 6+} is removed.« less

  7. Workshop on Algorithms for Time-Series Analysis

    NASA Astrophysics Data System (ADS)

    Protopapas, Pavlos

    2012-04-01

    abstract-type="normal">SummaryThis Workshop covered the four major subjects listed below in two 90-minute sessions. Each talk or tutorial allowed questions, and concluded with a discussion. Classification: Automatic classification using machine-learning methods is becoming a standard in surveys that generate large datasets. Ashish Mahabal (Caltech) reviewed various methods, and presented examples of several applications. Time-Series Modelling: Suzanne Aigrain (Oxford University) discussed autoregressive models and multivariate approaches such as Gaussian Processes. Meta-classification/mixture of expert models: Karim Pichara (Pontificia Universidad Católica, Chile) described the substantial promise which machine-learning classification methods are now showing in automatic classification, and discussed how the various methods can be combined together. Event Detection: Pavlos Protopapas (Harvard) addressed methods of fast identification of events with low signal-to-noise ratios, enlarging on the characterization and statistical issues of low signal-to-noise ratios and rare events.

  8. Electron Impact Ionization of Heavier Ions including relativistic effects

    NASA Astrophysics Data System (ADS)

    Saha, B. C.; Haque, A. K. F.; Uddin, M. A.; Basak, A. K.

    2006-11-01

    The demands of the electron impact ionization cross sections in diverse fields are enormous. And this is hard to fulfill either by experimental or ab initio calculations. So various analytical and semi-classical models are applied for a rapid generation of ionization cross sections accurately. We have applied a modified version [1] of the Bell et. al. equations [2] including both the ionic and relativistic corrections. In this report we show how to generalize the MBELL parameters for treating the orbital quantum numbers nl dependency; the accuracy of the procedure is tested by evaluating cross sections for various species and energies. Detail results will be presented at the meeting. [1] A. K. F. Haque, M. A. Uddin, A. K. Basak, K. R. Karim and B. C. Saha, Phys. Rev. A73, 052703 (2006). [2] K. L. Bell, H. B. Gilbody, J. G. Hughes, A. E. Kingston, and F. J. Smith, J. Phys. Chem. Ref. Data 12, 891 (1983).

  9. Electrical properties of lanthanum chromite based ceramics in hydrogen and oxidizing atmospheres at high temperatures

    NASA Astrophysics Data System (ADS)

    Schmidt, V. H.

    1981-06-01

    Several results regarding the effect of hydrogen on lanthanum chromite were determined. Thermally-activated diffusion of hydrogen through La(Mg)CrO3 was found with a high activation energy. It was found that its electrical conductivity drops drastically, especially at low temperature, after exposure to hydrogen at high temperature. Also, the curvature of most of the conductivity plots, as well as the inability to observe the Hall effect, lends support to the proposal by Karim and Aldred that the small-polaron model which predicts thermally activated mobility is applicable to doped lanthanum chromite. From differential thermal analysis, an apparent absorption of hydrogen near 3000 C was noticed. Upon cooling the lanthanum chromite in hydrogen and subsequently reheating it in air, desorption occurred near 1700 C. The immediate purpose of this study was to determine whether hydrogen has a deleterious effect on lanthanum chromite in solid oxide fuel cells.

  10. On rotational dynamics of an NH4+ ion in water

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chang, Tsun-Mei; Dang, Liem X.

    2003-05-15

    We used molecular dynamics simulations to characterize the rotational dynamics of the NH4+ ion in liquid water. The polarizable potential models were to describe the ion-water and water-water interactions. This study complements the work of Karim and Haymet (J. Chem. Phys., 93, 5961, 1990), who employed effective pir potential models. The computed rotational diffusion coefficients of the NH4+ ion in water, which were determined from the angular momentum autocorrelation function and the angular mean-square displacement, are 0.093 x 1012 rad2/s and 0.067 x 1012 rad2/s, repectively. These results are in good agreement with the 0.075 x 1012 rad2/s value determinedmore » from the nuclear magnetic resonance (NMR) spectroscopy studies of Perrin and Gipe (J. Am. Chem. Soc., 108, 1088, 1986; Science, 238, 1393, 1987).« less

  11. Watershed Scale Stable Isotope Distribution and Implications on Soil Organic Carbon Loss Monitoring under Hydrologic Uncertainty

    NASA Astrophysics Data System (ADS)

    Ahmed, I.; Karim, A.; Boutton, T. W.; Strom, K.; Fox, J.

    2013-12-01

    The thematic focus of this 3-year period multidisciplinary USDA-CBG collaborative applied research is integrated monitoring of soil organic carbon (SOC) loss from multi-use lands using state-of-the-art stable isotope science under uncertain hydrologic influences. In this study, SOC loss and water runoff are being monitored on a 150 square kilometer watershed in Houston, Texas, using natural rainfall events, and total organic carbon/nitrogen concentration (TOC/TN) and stable isotope ratio (δ13C, δ15N) measurements with different land-use types. The work presents the interdisciplinary research results to uncover statistically valid and scientifically sound ways to monitor SOC loss by (i) application of Bayesian Markov Chain Monte Carlo statistical models to assess the relationship between rainfall-runoff and SOC release during soil erosion in space and time, (ii) capturing the episodic nature of rainfall events and its role in the spatial distribution of SOC loss from water erosion, (iii) stable isotope composition guided fingerprinting (source and quantity) of SOC by considering various types of erosion processes common in a heterogeneous watershed, to be able to tell what percentage of SOC is lost from various land-use types (Fox and Papanicolaou, 2008), (iv) creating an integrated watershed scale statistical soil loss monitoring model driven by spatial and temporal correlation of flow and stable isotope composition (Ahmed et. al., 2013a,b), and (v) creation of an integrated decision support system (DSS) for sustainable management of SOC under hydrologic uncertainty to assist the end users. References: Ahmed, I., Karim, A., Boutton, T.W., and Strom, K.B. (2013a). 'Monitoring Soil Organic Carbon Loss from Erosion Using Stable Isotopes.' Proc., Soil Carbon Sequestration, International Conference, May 26-29, Reykjavik, Iceland. Ahmed, I, Bouttom, T.W., Strom, K. B., Karim, A., and Irvin-Smith, N. (2013b). 'Soil carbon distribution and loss monitoring in the urbanized Buffalo Bayou watershed, Houston, Texas.' Proc., 4th Annual All Investigators Meeting of the North American Carbon Program, February 4-7, Albuquerque, NM. Fox, J.F. and Papanicolaou, A.N. (2008). An un-mixing model to study watershed erosion processes. Advances in Water Resources, 31, 96-108. ______________________________ * Corresponding author';s e-mail: ifahmed@pvamu.edu

  12. Reconstruction of Pressure Profile Evolution during Levitated Dipole Experiments

    NASA Astrophysics Data System (ADS)

    Mauel, M.; Garnier, D.; Boxer, A.; Ellsworth, J.; Kesner, J.

    2008-11-01

    Magnetic levitation of the LDX superconducting dipole causes significant changes in the measured diamagnetic flux and what appears to be an isotropic plasma pressure profile (p˜p||). This poster describes the reconstruction of plasma current and plasma pressure profiles from external measurements of the equilibrium magnetic field, which vary substantially as a function of time depending upon variations in neutral pressure and multifrequency ECRH power levels. Previous free-boundary reconstructions of plasma equilibrium showed the plasma to be anisotropic and highly peaked at the location of the cyclotron resonance of the microwave heating sources. Reconstructions of the peaked plasma pressures confined by a levitated dipole incorporate the small axial motion of the dipole (±5 mm), time varying levitation coil currents, eddy currents flowing in the vacuum vessel, constant magnetic flux linking the superconductor, and new flux loops located near the hot plasma in order to closely couple to plasma current and dipole current variations. I. Karim, et al., J. Fusion Energy, 26 (2007) 99.

  13. Electrical properties of lanthanum chromite based ceramics in hydrogen and oxidizing atmospheres at high temperatures. Final report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schmidt, V.H.

    1981-06-01

    Several results regarding the effect of hydrogen on lanthanum chromite were determined. Thermally-activated diffusion of hydrogen through La(Mg)CrO/sub 3/ was found with a high activation energy. It was found that its electrical conductivity drops drastically, especially at low temperature, after exposure to hydrogen at high temperature. Also, the curvature of most of the conductivity plots, as well as the inability to observe the Hall effect, lends support to the proposal by Karim and Aldred that the small-polaron model which predicts thermally activated mobility is applicable to doped lanthanum chromite. From differential thermal analysis an apparent absorption of hydrogen near 300/supmore » 0/C was noticed. Upon cooling the lanthanum chromite in hydrogen and subsequently reheating it in air, desorption occurred near 170/sup 0/C. The immediate purpose of this study was to determine whether hydrogen has a deleterious effect on lanthanum chromite in solid oxide fuel cells.« less

  14. Assessment of total bed material equations on selected Malaysia rivers

    NASA Astrophysics Data System (ADS)

    Saleh, A.; Abustan, I.; Mohd Remy Rozainy, M. A. Z.; Sabtu, N.

    2017-10-01

    Assessment of total sediment load equations on selected Malaysia rivers was done based on 35 sediment loads and hydraulic data. Four rivers were selected to make this assessment which are Sungai Perak, Sungai Kemaman, Sungai Pergau and Sungai Kurau. These rivers can be divided into three categories based on the river width, with Sungai Perak (300-350m) and Sungai Kemaman (150-200m) can categorised as big rivers, meanwhile, Sungai Pergau (30-45m) and Sungai Kurau (10-11m) can categorised as medium and small river respectively. The total sediment load equations used in this assessment are Ackers-White, Brownlie, Engelund-Hansen, Graf, Molinas-Wu, Karim-Kennedy and Yang. This paper also tested the local total sediment load equations by Ariffin and Sinnakaudan et al. to evaluate capabilities of the equations on different rivers in Malaysia. The graphs of the calculated equations versus measured sediment transport rates were plotted to shows the accuracy of the tested equations.

  15. INVITED SPEAKERS Invited Speakers

    NASA Astrophysics Data System (ADS)

    2011-01-01

    Alain AspectPalaiseau Markus AspelmeyerVienna Vanderlei BagnatoSão Paulo Victor BalykinMoscow Kristian BaumannZürich Jim BergquistNIST, Boulder Frédéric ChevyENS, Paris John CloseCanberra Claude Cohen-TannoudjiENS, Paris Jean DalibardENS, Paris Eugene DemlerHarvard Michael DoserCERN Markus DrescherHamburg Francesca FerlainoInnsbruck Victor FlambaumSydney Chiara FortFlorence Elisabeth GiacobinoENS, Paris Philippe GrangierPalaiseau Chris GreeneJILA, Boulder Markus GreinerHarvard Eric HesselsToronto Hidetoshi KatoriTokyo Wolfgang KetterleMIT Michael KohlCambridge Wu-Ming LiuBeijing Francesco MinardiFlorence Holger MüllerBerkeley Karim MurrGarching Hanns-Christoph NägerlInnsbruck Jeremy O'BrienBristol Silke OspelkausJILA, Boulder Krzysztof PachuckiWarsaw Bill PhillipsGaithersburg Randolf PohlGarching Eugene PolzikCopenhagen Cindy RegalJILA, Boulder Jakob ReichelENS, Paris Helmut RitschInnsbruck Christian RoosInnsbruck Mark SaffmanWisconsin Christophe SalomonENS, Paris Gora ShlyapnikovOrsay Richard TaiebParis Masahito UedaTokyo Chris ValeMelbourne Andreas WallraffZürich Matthias WeidemüllerHeidelberg Martin WeitzBonn Artur WideraBonn David WinelandNIST, Boulder

  16. Numerical Studies of Disordered Tight-Binding Hamiltonians

    NASA Astrophysics Data System (ADS)

    Scalettar, R. T.

    2007-06-01

    These are notes used for a set of lectures delivered at the Vietri summer school on Condensed Matter Physics in Fall 2006. They concern the general problem of the interplay of interactions and disorder in two dimensional electronic systems, as realized in the specific context of Quantum Monte Carlo simulations of the Anderson-Hubbard Hamiltonian. I wish to thank the organizers of this school for their hospitality during my visit, and their work in general in providing this educational opportunity for students over the years. It is a pleasure also to acknowledge the collaborators together with whom I have learned much of the physics and numerics presented in these notes: Zhaojun Bai, Andrew Baldwin, George Batrouni, Karim Bouadim, Wenbin Chen, Peter Denteneer, Fred Hébert, Norman Paris, Matt Schram, Nandini Trivedi, Martin Ulmke, Ichitaro Yamazaki and Gergely Zimanyi. This work was supported by the National Science Foundation (NSF-DMR-0312261 and NSF-ITR-0313390), and China Special Funds for Major State Basic Research Projects under contract 2005CB321700.

  17. Continuous prostaglandin-F 2 infusion for middle-trimester abortion.

    PubMed

    Lauersen, N H; Wilson, K H

    1973-05-26

    Induction of midtrimester abortion with a continuous intravenous infusion of prostaglandin (PG) was described by Karim and Filshie and Roth-Brandel et al. in 1970, but the effective dose of PGF2alpha was associated with side effects severely limiting clinical usefulness. Karim and Sharma induced abortion by intravaginal PG, but again this route also seemed complicated by severe side effects. Independent reports followed of successful induction of midtrimester abortion by intraamniotic PGF2alpha and PGE2 with few side effects. Although we also successfully induced abortion in 20 patients with a single intraamniotic instillation of 40 mg PGF2alpha, there is a potential hazard in this method; i.e., PG may leak from the amniotic cavity around the catheter and pass in large quantity into the systemic circulation, resulting in undesirable, severe side effects. A more reasonable and effective method would be to inject the PGF2alpha directly at the target organ, the myometrium, by extraovular administration. Side effects could thus be minimized and effective doses of PG reduced. Such intrauterine extraovular administration of PG has been reported. The incidence of side effects was greatly reduced, although the instillation of PG was required every 1-3 hours and there were some incomplete abortions. The investigation of extraovular PGF2alpha administration for induction of abortion in gestations between 12 and 16 weeks has been especially interesting. The procedure outlined by Wiqvist and Bygdeman and Embrey and Hillier was the 1 that the authors followed initially. 250 mcg PGF2alpha was instilled initially and was followed by 750 mcg in 5 minutes and 1 mg in 30 minutes. 1 mg was then instilled at 6 hour intervals. However, the failure rate with this dosage schedule was quite high. There was a good initial uterine response, but during the administrationsat 12, 18, and 24 hours, the response diminished considerably . The frequency of administration was then increased to every 2-3 hours and the amount instilled was increased to 2-3 mg. Although somewhat more successful than the original dose schedule, this method was also unsatisfactory. It appeared from our results that the closer the injections, the higher the success rate. Thus, a brief case report is presented using continuous extraovular administration of PGF2alpha with a Harvard pump, and the results indicate it is quite satisfactory. The patients complained of very little pain and side effects have been slight. The mean abortion time for 15 patients was 14 hours. The mean time for multiparas, 11.7 hours, was faster than the 15.8 hours for primiparas.

  18. Heat and mass transfer within partially wetted packed fractured granular beds

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Khalil, E.B.; Karim, G.A.

    1996-10-01

    Fractured granular beds heated by hot gaseous streams have been the subject of numerous investigations in recent years due to their importance in many applications such as in in-situ and enhanced oil recovery. In a previous paper (Khalil and Karim, 1995) the results of an investigation of some aspects of the transport processes that occur within dry granular beds were reported. The present contribution examines similar beds when partially wetted. The granular beds were cylindrical in shape containing an axial central small diameter circular channel representing a fracture which can have different permeability from that of the main bed. Itmore » is shown that the mass flow rate of the hot gases, the relative permeability of the bed and the central channel as well as the initial liquid content of the bed control the drying rate. The results of an analytical model formulated to simulate the drying process in unobstructed channel beds showed good agreement with experimental results at low temperatures, however deviations occurred as the drying proceeds at higher temperatures.« less

  19. Editorial: Focus on Extra Space Dimensions

    NASA Astrophysics Data System (ADS)

    Agashe, Kaustubh; Pomarol, Alex

    2010-07-01

    Experiments at the Large Hadron Collider (LHC) have just started. In addition to verifying the Standard Model (SM) of particle physics, these experiments will probe a new energy frontier and test extensions of the SM. The existence of extra dimensions is one of the most attractive possibilities for physics beyond the SM. This focus issue contains a collection of articles addressing both theoretical and phenomenological aspects of extra-dimensional models. Focus on Extra Space Dimensions Contents Minimal universal extra dimensions in CalcHEP/CompHEP AseshKrishna Datta, Kyoungchul Kong and Konstantin T Matchev Disordered extra dimensions Karim Benakli Codimension-2 brane-bulk matching: examples from six and ten dimensions Allan Bayntun, C P Burgess and Leo van Nierop Gauge threshold corrections in warped geometry Kiwoon Choi, Ian-Woo Kim and Chang Sub Shin Holographic methods and gauge-Higgs unification in flat extra dimensions Marco Serone Soft-wall stabilization Joan A Cabrer, Gero von Gersdorff and Mariano Quirós Warped five-dimensional models: phenomenological status and experimental prospects Hooman Davoudiasl, Shrihari Gopalakrishna, Eduardo Pontón and José Santiago

  20. Electron Impact Ionization of Atoms and Ions

    NASA Astrophysics Data System (ADS)

    Saha, B. C.; Basak, A. K.

    2006-10-01

    Electron impact ionization cross sections are at the heart of many active fields ranging from astro- to medical- physics. These applications require cross sections for a wide range of species as a function of projectile energies. This demand, however, is very hard to fulfill neither by experiments nor ab initio calculations. Various analytical and semi-classical models are commonly used to generate such a vast ionization cross sections. We recently applied a modified version [1] of the Bell et. al. equations [2] including both the ionic and relativistic corrections. We will show in this presentation how to generalize the much-needed MBELL parameters for treating the orbital quantum numbers nl dependency; comparing our results with experimental findings tests the accuracy of this procedure; very good agreements are obtained even in relativistic energies. Details will be presented at the meeting. [1] A. K. F. Haque, M. A. Uddin, A. K. Basak, K. R. Karim and B. C. Saha, Phys. Rev. A73, 052703 (2006). [2] K. L. Bell, H. B. Gilbody, J. G. Hughes, A. E. Kingston, and F. J. Smith, J. Phys. Chem. Ref. Data 12, 891 (1983).

  1. Role of Relativistic Effects in the Ionization of Heavy Ions by Electron Impact

    NASA Astrophysics Data System (ADS)

    Saha, Bidhan C.; Basak, Arun K.

    2005-05-01

    Electron impact single ionization cross sections of few heavy ions are evaluated using the recently proposed modifications [1] of the widely used simplified version of the improved binary-encounter (siBED) dipole model [2]. This model consists of two adjustable parameters and it is found that they are related to the nature of the charge distribution in the bonding region of the target. For its effective uses for ionic target the siBED model is further modified [3] in terms of the ionic and relativistic effects. This study focuses on the relativistic energy domain and the findings suggest the fate of those parameters. Details of our findings will be presented at the conference. [1] W. M. Huo, Phys. Rev. A 64, 042719 (2001). [2] M. A. Uddin, M. A. K. F. Haque, A. K. Basak and B. C. Saha, Phys. Rev A70, 0322706(2004). [3] M. a. Uddin, M. A. K. F. Haque, M. S. Mahbub, K. R. Karim, A.K. Basak and B. C. Saha, Phys. Rev. A (in press) 2005.

  2. Electron Impact K-shell Ionization of Atomic Targets

    NASA Astrophysics Data System (ADS)

    Saha, Bidhan; Basak, Arun K.; Alfaz Uddin, M.; Patoary, A. A. R.

    2008-05-01

    In spite of considerable progress -both theoretically and experimentally- recently in evaluating accurate K-shell ionization cross sections that play a decisive role for quantitative analyses using (i) electron probe microanalysis, (ii) Auger electron spectroscopy and (iii) electron energy loss spectra, attempts are still continuing to search for a model that can easily generate reliable cross sections for a wide range of energies and for various targets needed for plasma modeling code We report few modifications of the widely used binary encounter approximation (BEA) [1,2] and have tested by evaluating the electron impact K-shell ionization of few neutral targets at various projectile energies. Details will be presented at the meeting. [1] M. Gryziniski, Phys. Rev. A 138, 336 (1965); [2] L. Vriens, Proc. Phys. Soc. (London) 89, 13, (1966). [3M. A. Uddin , A. K. F. Haque, M. M. Billah, A. K. Basak, K, R, Karim and B. C. Saha, ,Phys. Rev. A 71,032715 (2005); [4] M. A. Uddin, A. K. Basak, and B. C. Saha, Int. J. Quan. Chem 100, 184 (2004).

  3. Surface physics with cold and thermal neutron reflectometry. Progress report, April 1, 1991--September 30, 1993

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Steyerl, A.

    1993-09-01

    Within the past two and one half years of the project ``Surface Physics With Cold and Thermal Neutron Reflectometry`` a new thermal neutron reflectometer was constructed at the Rhode Island Nuclear Science Center (RINSC). It was used to study various liquid and solid surfaces. Furthermore, neutron reflection experiments were be un at different laboratories in collaboration with Dr. G.P. Fetcher (at Argonne National Laboratory), Dr. T. Russell (IBM Almaden) and Drs. S.K. Satija and A. Karim (at the National Institute for Standards and Technology). The available resources allowed partial construction of an imaging system for ultracold neutrons. It is expectedmore » to provide an extremely high resolution in momentum and energy transfer in surface studies using neutron reflectometry. Much of the work reported here was motivated by the possibility of later implementation at the planned Advanced Neutron Source at Oak Ridge. In a separate project the first concrete plans for an intense source of ultracold neutrons for the Advanced Neutron Source were developed.« less

  4. Plasma Prothrombin Time and Esophageal Varices in Patients with Cirrhosis of Liver.

    PubMed

    Islam, Md Nasirul; Khan, Mobin; Ahmad, Nooruddin; Mamun-Al-Mahtab; Karim, Md Fazal

    2016-01-01

    Cirrhosis of the liver is a common complication of chronic liver disease and is associated with portal hypertension and esophageal varices. In this study, we checked the implication of prothrombin time, if any, in the genesis of esophageal varices. Sixty patients with cirrhosis of the liver were randomly assigned into two groups: Group I - 30 cirrhotic patients with esophageal varices, and group II - 30 cirrhotic patients without esophageal varices. The prothrombin time was checked for both groups. A positive correlation was found between the prolonged plasma prothrombin time (> 4 seconds) and esophageal varices with a sensitivity of 56.67% and specificity of 73.33%. The Child-Pugh score showed a correlation; however, the size of varices did not exhibit any such relation. Prothrombin time may be cautiously used to assess portal hypertension in a field level and rural setting where endoscopy is not available or feasible. Islam MN, Khan M, Ahmad N, Al-Mahtab M, Karim MF. Plasma Prothrombin Time and Esophageal Varices in Patients with Cirrhosis of Liver. Euroasian J Hepato-Gastroenterol 2016;6(1):10-12.

  5. Extending methods: using Bourdieu's field analysis to further investigate taste

    NASA Astrophysics Data System (ADS)

    Schindel Dimick, Alexandra

    2015-06-01

    In this commentary on Per Anderhag, Per-Olof Wickman and Karim Hamza's article Signs of taste for science, I consider how their study is situated within the concern for the role of science education in the social and cultural production of inequality. Their article provides a finely detailed methodology for analyzing the constitution of taste within science education classrooms. Nevertheless, because the authors' socially situated methodology draws upon Bourdieu's theories, it seems equally important to extend these methods to consider how and why students make particular distinctions within a relational context—a key aspect of Bourdieu's theory of cultural production. By situating the constitution of taste within Bourdieu's field analysis, researchers can explore the ways in which students' tastes and social positionings are established and transformed through time, space, place, and their ability to navigate the field. I describe the process of field analysis in relation to the authors' paper and suggest that combining the authors' methods with a field analysis can provide a strong methodological and analytical framework in which theory and methods combine to create a detailed understanding of students' interest in relation to their context.

  6. Robustness of non-interdependent and interdependent networks against dependent and adaptive attacks

    NASA Astrophysics Data System (ADS)

    Tyra, Adam; Li, Jingtao; Shang, Yilun; Jiang, Shuo; Zhao, Yanjun; Xu, Shouhuai

    2017-09-01

    Robustness of complex networks has been extensively studied via the notion of site percolation, which typically models independent and non-adaptive attacks (or disruptions). However, real-life attacks are often dependent and/or adaptive. This motivates us to characterize the robustness of complex networks, including non-interdependent and interdependent ones, against dependent and adaptive attacks. For this purpose, dependent attacks are accommodated by L-hop percolation where the nodes within some L-hop (L ≥ 0) distance of a chosen node are all deleted during one attack (with L = 0 degenerating to site percolation). Whereas, adaptive attacks are launched by attackers who can make node-selection decisions based on the network state in the beginning of each attack. The resulting characterization enriches the body of knowledge with new insights, such as: (i) the Achilles' Heel phenomenon is only valid for independent attacks, but not for dependent attacks; (ii) powerful attack strategies (e.g., targeted attacks and dependent attacks, dependent attacks and adaptive attacks) are not compatible and cannot help the attacker when used collectively. Our results shed some light on the design of robust complex networks.

  7. The contribution of collective attack tactics in differentiating handball score efficiency.

    PubMed

    Rogulj, Nenad; Srhoj, Vatromir; Srhoj, Ljerka

    2004-12-01

    The prevalence of 19 elements of collective tactics in score efficient and score inefficient teams was analyzed in 90 First Croatian Handball League--Men games during the 1998-1999 season. Prediction variables were used to describe duration, continuity, system, organization and spatial direction of attacks. Analysis of the basic descriptive and distribution statistical parameters revealed normal distribution of all variables and possibility to use multivariate methods. Canonic discrimination analysis and analysis of variance showed the use of collective tactics elements on attacks to differ statistically significantly between the winning and losing teams. Counter-attacks and uninterrupted attacks predominate in winning teams. Other types of attacks such as long position attack, multiply interrupted attack, attack with one circle runner attack player/pivot, attack based on basic principles, attack based on group cooperation, attack based on independent action, attack based on group maneuvering, rightward directed attack and leftward directed attack predominate in losing teams. Winning teams were found to be clearly characterized by quick attacks against unorganized defense, whereas prolonged, interrupted position attacks against organized defense along with frequent and diverse tactical actions were characteristic of losing teams. The choice and frequency of using a particular tactical activity in position attack do not warrant score efficiency but usually are consequential to the limited anthropologic potential and low level of individual technical-tactical skills of the players in low-quality teams.

  8. Predicting Factors of Zone 4 Attack in Volleyball.

    PubMed

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  9. Breakthrough attacks in patients with hereditary angioedema receiving long-term prophylaxis are responsive to icatibant: findings from the Icatibant Outcome Survey.

    PubMed

    Aberer, Werner; Maurer, Marcus; Bouillet, Laurence; Zanichelli, Andrea; Caballero, Teresa; Longhurst, Hilary J; Perrin, Amandine; Andresen, Irmgard

    2017-01-01

    Patients with hereditary angioedema (HAE) due to C1-inhibitor deficiency (C1-INH-HAE) experience recurrent attacks of cutaneous or submucosal edema that may be frequent and severe; prophylactic treatments can be prescribed to prevent attacks. However, despite the use of long-term prophylaxis (LTP), breakthrough attacks are known to occur. We used data from the Icatibant Outcome Survey (IOS) to evaluate the characteristics of breakthrough attacks and the effectiveness of icatibant as a treatment option. Data on LTP use, attacks, and treatments were recorded. Attack characteristics, treatment characteristics, and outcomes (time to treatment, time to resolution, and duration of attack) were compared for attacks that occurred with versus without LTP. Data on 3228 icatibant-treated attacks from 448 patients with C1-INH-HAE were analyzed; 30.1% of attacks occurred while patients were using LTP. Attack rate, attack severity, and the distribution of attack sites were similar across all types of LTP used, and were comparable to the results found in patients who did not receive LTP. Attacks were successfully treated with icatibant; 82.5% of all breakthrough attacks were treated with a single icatibant injection without C1-INH rescue medication. Treatment outcomes were comparable for breakthrough attacks across all LTP types, and for attacks without LTP. Patients who use LTP should be aware that breakthrough attacks can occur, and such attacks can be severe. Thus, patients with C1-INH-HAE using LTP should have emergency treatment readily available. Data from IOS show that icatibant is effective for the treatment of breakthrough attacks. Trial Registration NCT01034969.

  10. Electron Impact Ionization of Heavier Ions

    NASA Astrophysics Data System (ADS)

    Saha, B. C.

    2006-10-01

    The electron impact ionization (EII) is a dominant ion creation process in various kinds of plasmas. Hydrogenic atoms occurs not only in plasmas but may also be formed due to radiation effects in many organic and inorganic materials. Apart from its fundamental importance in collisional physics the knowledge of the EII cross sections finds its wide applications in modeling astrophysical and fusion plasmas. So the demand of the EIICS is enormous. It is hard to fulfill such a demand either by experimental or ab initio calculations. Thus various analytical and semi-classical models are employed to generate accurate EII cross sections. We report here a modified version [1] of the Bell et. al. equations [2] including both the ionic and relativistic corrections (MBELL). We generalize the MBELL parameters for treating the dependency of the orbital quantum numbers nl; evaluating cross sections for various species at different energies tests the accuracy of the procedure. Detail will be presented at the meeting. [1] A. K. F. Haque, M. A. Uddin, A. K. Basak, K. R. Karim and B. C. Saha, Phys. Rev. A73, 052703 (2006). [2] K. L. Bell, H. B. Gilbody, J. G. Hughes, A. E. Kingston, and F. J. Smith, J. Phys. Chem. Ref. Data 12, 891 (1983).

  11. Self-Learning Off-Lattice Kinetic Monte Carlo method as applied to growth on metal surfaces

    NASA Astrophysics Data System (ADS)

    Trushin, Oleg; Kara, Abdelkader; Rahman, Talat

    2007-03-01

    We propose a new development in the Self-Learning Kinetic Monte Carlo (SLKMC) method with the goal of improving the accuracy with which atomic mechanisms controlling diffusive processes on metal surfaces may be identified. This is important for diffusion of small clusters (2 - 20 atoms) in which atoms may occupy Off-Lattice positions. Such a procedure is also necessary for consideration of heteroepitaxial growth. The new technique combines an earlier version of SLKMC [1] with the inclusion of off-lattice occupancy. This allows us to include arbitrary positions of adatoms in the modeling and makes the simulations more realistic and reliable. We have tested this new approach for the case of the diffusion of small 2D Cu clusters diffusion on Cu(111) and found good performance and satisfactory agreement with results obtained from previous version of SLKMC. The new method also helped reveal a novel atomic mechanism contributing to cluster migration. We have also applied this method to study the diffusion of Cu clusters on Ag(111), and find that Cu atoms generally prefer to occupy off-lattice sites. [1] O. Trushin, A. Kara, A. Karim, T.S. Rahman Phys. Rev B 2005

  12. Transient swelling behavior and drug delivery from a dissolving film deploying anti-HIV microbicide

    NASA Astrophysics Data System (ADS)

    Tasoglu, Savas; Katz, David F.; Szeri, Andrew J.

    2010-11-01

    Despite more than two decades of HIV vaccine research, there is still no efficacious HIV vaccine. Very recently, a research group has shown that a microbicide gel formulation of antiretroviral drug Tenofovir, significantly inhibits HIV transmission to women [1]. However, there is a widespread agreement that more effective and diverse drug delivery vehicles must be developed. In this setting, there is now great interest in developing different delivery vehicles such as vaginal rings, gels, and films. Here, we develop a model for transient fluid uptake and swelling behavior, and subsequent dissolution and drug deployment from a film containing anti-HIV microbicide. In the model, the polymer structural relaxation via water uptake is assumed to follow first order kinetics. In the case of a film loaded with an osmotically active solute, the kinetic equation is modified to account for the osmotic effect. The transport rate of solvent and solute within the matrix is characterized by a diffusion equation. After the matrix is relaxed to a specified concentration of solvent, lubrication theory and convective-diffusive transport are employed for flow of the liquefied matrix and drug dispersion respectively. [1] Karim, et al., Science, 2010.

  13. A graph-based network-vulnerability analysis system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Swiler, L.P.; Phillips, C.; Gaylor, T.

    1998-05-03

    This paper presents a graph based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example themore » class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level of effort for the attacker, various graph algorithms such as shortest path algorithms can identify the attack paths with the highest probability of success.« less

  14. A graph-based network-vulnerability analysis system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Swiler, L.P.; Phillips, C.; Gaylor, T.

    1998-01-01

    This report presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the classmore » of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.« less

  15. Method and tool for network vulnerability analysis

    DOEpatents

    Swiler, Laura Painton [Albuquerque, NM; Phillips, Cynthia A [Albuquerque, NM

    2006-03-14

    A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

  16. About Heart Attacks

    MedlinePlus

    ... Artery Disease Venous Thromboembolism Aortic Aneurysm More About Heart Attacks Updated:Jan 11,2018 A heart attack is ... coronary artery damage leads to a heart attack . Heart Attack Questions and Answers What is a heart attack? ...

  17. A graph-based system for network-vulnerability analysis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Swiler, L.P.; Phillips, C.

    1998-06-01

    This paper presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The graph-based tool can identify the set of attack paths that have a high probability of success (or a low effort cost) for the attacker. The system could be used to test the effectiveness of making configuration changes, implementing an intrusion detection system, etc. The analysis system requires as input a database of common attacks,more » broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.« less

  18. Application of Cellular Automata to Detection of Malicious Network Packets

    ERIC Educational Resources Information Center

    Brown, Robert L.

    2014-01-01

    A problem in computer security is identification of attack signatures in network packets. An attack signature is a pattern of bits that characterizes a particular attack. Because there are many kinds of attacks, there are potentially many attack signatures. Furthermore, attackers may seek to avoid detection by altering the attack mechanism so that…

  19. Cooperating attackers in neural cryptography.

    PubMed

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  20. Terrorist Attacks Escalate in Frequency and Fatalities Preceding Highly Lethal Attacks

    PubMed Central

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G.; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates–both in the number of people killed per attack and in the frequency of attacks–leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack. PMID:24755753

  1. Causal Attribution, Perceived Benefits, and Morbidity After a Heart Attack: An 8-Year Study.

    ERIC Educational Resources Information Center

    Affleck, Glenn; And Others

    1987-01-01

    Interviewed heart attack victims (N=287) seven weeks and eight years after their attack. Explored interrelations among causal attributions for the attack, survivor morbidity, and heart attack recurrence. Found that patients who cited benefits from their misfortune seven weeks after the first attack were less likely to have another attack and had…

  2. On Patarin's Attack against the lIC Scheme

    NASA Astrophysics Data System (ADS)

    Ogura, Naoki; Uchiyama, Shigenori

    In 2007, Ding et al. proposed an attractive scheme, which is called the l-Invertible Cycles (lIC) scheme. lIC is one of the most efficient multivariate public-key cryptosystems (MPKC); these schemes would be suitable for using under limited computational resources. In 2008, an efficient attack against lIC using Gröbner basis algorithms was proposed by Fouque et al. However, they only estimated the complexity of their attack based on their experimental results. On the other hand, Patarin had proposed an efficient attack against some multivariate public-key cryptosystems. We call this attack Patarin's attack. The complexity of Patarin's attack can be estimated by finding relations corresponding to each scheme. In this paper, we propose an another practical attack against the lIC encryption/signature scheme. We estimate the complexity of our attack (not experimentally) by adapting Patarin's attack. The attack can be also applied to the lIC- scheme. Moreover, we show some experimental results of a practical attack against the lIC/lIC- schemes. This is the first implementation of both our proposed attack and an attack based on Gröbner basis algorithm for the even case, that is, a parameter l is even.

  3. Machine Learning Methods for Attack Detection in the Smart Grid.

    PubMed

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  4. Split-second escape decisions in blue tits (Parus caeruleus)

    NASA Astrophysics Data System (ADS)

    Lind, Johan; Kaby, Ulrika; Jakobsson, Sven

    2002-07-01

    Bird mortality is heavily affected by birds of prey. Under attack, take-off is crucial for survival and even minor mistakes in initial escape response can have devastating consequences. Birds may respond differently depending on the character of the predator's attack and these split-second decisions were studied using a model merlin (Falco columbarius) that attacked feeding blue tits (Parus caeruleus) from two different attack angles in two different speeds. When attacked from a low attack angle they took off more steeply than when attacked from a high angle. This is the first study to show that escape behaviour also depends on predator attack speed. The blue tits responded to a high-speed attack by dodging sideways more often than when attacked at a low speed. Escape speed was not significantly affected by the different treatments. Although they have only a split-second before escaping an attack, blue tits do adjust their escape strategy to the prevailing attack conditions.

  5. Hybrid attacks on model-based social recommender systems

    NASA Astrophysics Data System (ADS)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  6. Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals

    NASA Astrophysics Data System (ADS)

    Luo, Xiapu; Chan, Edmond W. W.; Chang, Rocky K. C.

    2009-12-01

    This paper addresses the important problem of detecting pulsing denial of service (PDoS) attacks which send a sequence of attack pulses to reduce TCP throughput. Unlike previous works which focused on a restricted form of attacks, we consider a very broad class of attacks. In particular, our attack model admits any attack interval between two adjacent pulses, whether deterministic or not. It also includes the traditional flooding-based attacks as a limiting case (i.e., zero attack interval). Our main contribution is Vanguard, a new anomaly-based detection scheme for this class of PDoS attacks. The Vanguard detection is based on three traffic anomalies induced by the attacks, and it detects them using a CUSUM algorithm. We have prototyped Vanguard and evaluated it on a testbed. The experiment results show that Vanguard is more effective than the previous methods that are based on other traffic anomalies (after a transformation using wavelet transform, Fourier transform, and autocorrelation) and detection algorithms (e.g., dynamic time warping).

  7. Cyber-Physical Attacks With Control Objectives

    DOE PAGES

    Chen, Yuan; Kar, Soummya; Moura, Jose M. F.

    2017-08-18

    This study studies attackers with control objectives against cyber-physical systems (CPSs). The goal of the attacker is to counteract the CPS's controller and move the system to a target state while evading detection. We formulate a cost function that reflects the attacker's goals, and, using dynamic programming, we show that the optimal attack strategy reduces to a linear feedback of the attacker's state estimate. By changing the parameters of the cost function, we show how an attacker can design optimal attacks to balance the control objective and the detection avoidance objective. In conclusion, we provide a numerical illustration based onmore » a remotely controlled helicopter under attack.« less

  8. Cyber-Physical Attacks With Control Objectives

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chen, Yuan; Kar, Soummya; Moura, Jose M. F.

    This study studies attackers with control objectives against cyber-physical systems (CPSs). The goal of the attacker is to counteract the CPS's controller and move the system to a target state while evading detection. We formulate a cost function that reflects the attacker's goals, and, using dynamic programming, we show that the optimal attack strategy reduces to a linear feedback of the attacker's state estimate. By changing the parameters of the cost function, we show how an attacker can design optimal attacks to balance the control objective and the detection avoidance objective. In conclusion, we provide a numerical illustration based onmore » a remotely controlled helicopter under attack.« less

  9. Performance Improvement of Power Analysis Attacks on AES with Encryption-Related Signals

    NASA Astrophysics Data System (ADS)

    Lee, You-Seok; Lee, Young-Jun; Han, Dong-Guk; Kim, Ho-Won; Kim, Hyoung-Nam

    A power analysis attack is a well-known side-channel attack but the efficiency of the attack is frequently degraded by the existence of power components, irrelative to the encryption included in signals used for the attack. To enhance the performance of the power analysis attack, we propose a preprocessing method based on extracting encryption-related parts from the measured power signals. Experimental results show that the attacks with the preprocessed signals detect correct keys with much fewer signals, compared to the conventional power analysis attacks.

  10. Attacks on public telephone networks: technologies and challenges

    NASA Astrophysics Data System (ADS)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  11. Novel mechanism of network protection against the new generation of cyber attacks

    NASA Astrophysics Data System (ADS)

    Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit

    2012-06-01

    A new intelligent mechanism is presented to protect networks against the new generation of cyber attacks. This mechanism integrates TCP/UDP/IP protocol stack protection and attacker/intruder deception to eliminate existing TCP/UDP/IP protocol stack vulnerabilities. It allows to detect currently undetectable, highly distributed, low-frequency attacks such as distributed denial-of-service (DDoS) attacks, coordinated attacks, botnet, and stealth network reconnaissance. The mechanism also allows insulating attacker/intruder from the network and redirecting the attack to a simulated network acting as a decoy. As a result, network security personnel gain sufficient time to defend the network and collect the attack information. The presented approach can be incorporated into wireless or wired networks that require protection against known and the new generation of cyber attacks.

  12. Fast WEP-Key Recovery Attack Using Only Encrypted IP Packets

    NASA Astrophysics Data System (ADS)

    Teramura, Ryoichi; Asakura, Yasuo; Ohigashi, Toshihiro; Kuwakado, Hidenori; Morii, Masakatu

    Conventional efficient key recovery attacks against Wired Equivalent Privacy (WEP) require specific initialization vectors or specific packets. Since it takes much time to collect the packets sufficiently, any active attack should be performed. An Intrusion Detection System (IDS), however, will be able to prevent the attack. Since the attack logs are stored at the servers, it is possible to prevent such an attack. This paper proposes an algorithm for recovering a 104-bit WEP key from any IP packets in a realistic environment. This attack needs about 36, 500 packets with a success probability 0.5, and the complexity of our attack is equivalent to about 220 computations of the RC4 key setups. Since our attack is passive, it is difficult for both WEP users and administrators to detect our attack.

  13. Robustness of coevolution in resolving prisoner's dilemma games on interdependent networks subject to attack

    NASA Astrophysics Data System (ADS)

    Liu, Penghui; Liu, Jing

    2017-08-01

    Recently, coevolution between strategy and network structure has been established as a rule to resolve social dilemmas and reach optimal situations for cooperation. Many follow-up researches have focused on studying how coevolution helps networks reorganize to deter the defectors and many coevolution methods have been proposed. However, the robustness of the coevolution rules against attacks have not been studied much. Since attacks may directly influence the original evolutionary process of cooperation, the robustness should be an important index while evaluating the quality of a coevolution method. In this paper, we focus on investigating the robustness of an elementary coevolution method in resolving the prisoner's dilemma game upon the interdependent networks. Three different types of time-independent attacks, named as edge attacks, instigation attacks and node attacks have been employed to test its robustness. Through analyzing the simulation results obtained, we find this coevolution method is relatively robust against the edge attack and the node attack as it successfully maintains cooperation in the population over the entire attack range. However, when the instigation probability of the attacked individuals is large or the attack range of instigation attack is wide enough, coevolutionary rule finally fails in maintaining cooperation in the population.

  14. Security under Uncertainty: Adaptive Attackers Are More Challenging to Human Defenders than Random Attackers

    PubMed Central

    Moisan, Frédéric; Gonzalez, Cleotilde

    2017-01-01

    Game Theory is a common approach used to understand attacker and defender motives, strategies, and allocation of limited security resources. For example, many defense algorithms are based on game-theoretic solutions that conclude that randomization of defense actions assures unpredictability, creating difficulties for a human attacker. However, many game-theoretic solutions often rely on idealized assumptions of decision making that underplay the role of human cognition and information uncertainty. The consequence is that we know little about how effective these algorithms are against human players. Using a simplified security game, we study the type of attack strategy and the uncertainty about an attacker's strategy in a laboratory experiment where participants play the role of defenders against a simulated attacker. Our goal is to compare a human defender's behavior in three levels of uncertainty (Information Level: Certain, Risky, Uncertain) and three types of attacker's strategy (Attacker's strategy: Minimax, Random, Adaptive) in a between-subjects experimental design. Best defense performance is achieved when defenders play against a minimax and a random attack strategy compared to an adaptive strategy. Furthermore, when payoffs are certain, defenders are as efficient against random attack strategy as they are against an adaptive strategy, but when payoffs are uncertain, defenders have most difficulties defending against an adaptive attacker compared to a random attacker. We conclude that given conditions of uncertainty in many security problems, defense algorithms would be more efficient if they are adaptive to the attacker actions, taking advantage of the attacker's human inefficiencies. PMID:28690557

  15. Numerical simulation of the optimal two-mode attacks for two-way continuous-variable quantum cryptography in reverse reconciliation

    NASA Astrophysics Data System (ADS)

    Zhang, Yichen; Li, Zhengyu; Zhao, Yijia; Yu, Song; Guo, Hong

    2017-02-01

    We analyze the security of the two-way continuous-variable quantum key distribution protocol in reverse reconciliation against general two-mode attacks, which represent all accessible attacks at fixed channel parameters. Rather than against one specific attack model, the expression of secret key rates of the two-way protocol are derived against all accessible attack models. It is found that there is an optimal two-mode attack to minimize the performance of the protocol in terms of both secret key rates and maximal transmission distances. We identify the optimal two-mode attack, give the specific attack model of the optimal two-mode attack and show the performance of the two-way protocol against the optimal two-mode attack. Even under the optimal two-mode attack, the performances of two-way protocol are still better than the corresponding one-way protocol, which shows the advantage of making double use of the quantum channel and the potential of long-distance secure communication using a two-way protocol.

  16. Blind Data Attack on BGP Routers

    DTIC Science & Technology

    2017-03-01

    implement blind attack protection, leaving long -standing connections, such as Border Gateway Protocol (BGP) sessions, vulnerable to exploitation. This...protection measures should a discovered vulnerability reduce attack complexity. 14. SUBJECT TERMS BGP, TCP, blind attack, blind data attack 15. NUMBER OF...implementations may not properly implement blind attack protection, leaving long -standing connections, such as BorderGateway Protocol (BGP) sessions

  17. Research on high power intra-channel crosstalk attack in optical networks

    NASA Astrophysics Data System (ADS)

    Ren, Shuai; Zhang, Yinfa; Wang, Jingyu; Zhang, Jumei; Rao, Xuejun; Fang, Yuanyuan

    2017-02-01

    The mechanism of high power intra-channel crosstalk attack is analyzed theoretically and the conclusion that power of attack signal and crosstalk coefficient of optical switch are the main factors for which high power intra-channel have destructive effect on quality of legitimate signals is drawn. Effects of high power intra-channel crosstalk attack on quality of legitimate signals and its capability of attack propagation are investigated quantitatively by building the simulation system in VPI software. The results show that legitimate signals through the first and the second stage optical switch are affected by attack and legitimate signal through the third stage optical switch is almost unaffected by attack when power of original attack signal (OAS) is above 20dB more than that of legitimate signals and crosstalk coefficient of optical switch is -20dB at optical cross connect 1 (OXC1). High power intra-channel crosstalk attack has a certain capability of attack propagation. Attack capability of OAS can be propagated to OXC3 when power of OAS is 27dB more than that of legitimate signals and crosstalk coefficient of optical switch is -20dB. We also find that the secondary attack signal (SAS) does not have capability of attack propagation.

  18. Warning Signs of Heart Attack, Stroke and Cardiac Arrest

    MedlinePlus

    ... a Heart Attack WARNING SIGNS OF HEART ATTACK, STROKE & CARDIAC ARREST HEART ATTACK WARNING SIGNS CHEST DISCOMFORT ... nausea or lightheadedness. Learn more about heart attack STROKE WARNING SIGNS Spot a stroke F.A.S.T.: - ...

  19. The role of mental disorder in attacks on European politicians 1990-2004.

    PubMed

    James, D V; Mullen, P E; Meloy, J R; Pathé, M T; Farnham, F R; Preston, L; Darnley, B

    2007-11-01

    The only systematic studies of attacks on public figures come from the USA. These studies de-emphasize the role of mental illness and suggest threats are of no predictive value. This study re-examines these questions through a study of attacks on European politicians. All non-terrorist attacks on elected politicians in Western Europe between 1990 and 2004 were analysed. Twenty-four attacks were identified, including five involving fatalities, and eight serious injuries. Ten attackers were psychotic, four drunk, nine politically motivated and one unclassifiable. Eleven attackers evidenced warning behaviours. The mentally disordered, most of whom gave warnings, were responsible for most of the fatal and seriously injurious attacks. A greater awareness of the link between delusional fixations on public figures and subsequent attacks could aid prevention. Equally importantly, recognition would encourage earlier intervention in people who, irrespective of whether they eventually attack, have delusional preoccupations which ruin their lives.

  20. An Exploration of Hypotheses that Explain Herbivore and Pathogen Attack in Restored Plant Communities

    PubMed Central

    Blaisdell, G. Kai; Roy, Bitty A.; Pfeifer-Meister, Laurel; Bridgham, Scott D.

    2015-01-01

    Many hypotheses address the associations of plant community composition with natural enemies, including: (i) plant species diversity may reduce enemy attack, (ii) attack may increase as host abundance increases, (iii) enemy spillover may lead to increased attack on one host species due to transmission from another host species, or enemy dilution may lead to reduced attack on a host that would otherwise have more attack, (iv) physical characteristics of the plant community may influence attack, and (v) plant vigor may affect attack. Restoration experiments with replicated plant communities provide an exceptional opportunity to explore these hypotheses. To explore the relative predictive strengths of these related hypotheses and to investigate the potential effect of several restoration site preparation techniques, we surveyed arthropod herbivore and fungal pathogen attack on the six most common native plant species in a restoration experiment. Multi-model inference revealed a weak but consistent negative correlation with pathogen attack and host diversity across the plant community, and no correlation between herbivory and host diversity. Our analyses also revealed host species-specific relationships between attack and abundance of the target host species, other native plant species, introduced plant species, and physical community characteristics. We found no relationship between enemy attack and plant vigor. We found minimal differences in plant community composition among several diverse site preparation techniques, and limited effects of site preparation techniques on attack. The strongest associations of community characteristics with attack varied among plant species with no community-wide patterns, suggesting that no single hypothesis successfully predicts the dominant community-wide trends in enemy attack. PMID:25699672

  1. Cyber attack analysis on cyber-physical systems: Detectability, severity, and attenuation strategy

    NASA Astrophysics Data System (ADS)

    Kwon, Cheolhyeon

    Security of Cyber-Physical Systems (CPS) against malicious cyber attacks is an important yet challenging problem. Since most cyber attacks happen in erratic ways, it is usually intractable to describe and diagnose them systematically. Motivated by such difficulties, this thesis presents a set of theories and algorithms for a cyber-secure architecture of the CPS within the control theoretic perspective. Here, instead of identifying a specific cyber attack model, we are focused on analyzing the system's response during cyber attacks. Firstly, we investigate the detectability of the cyber attacks from the system's behavior under cyber attacks. Specifically, we conduct a study on the vulnerabilities in the CPS's monitoring system against the stealthy cyber attack that is carefully designed to avoid being detected by its detection scheme. After classifying three kinds of cyber attacks according to the attacker's ability to compromise the system, we derive the necessary and sufficient conditions under which such stealthy cyber attacks can be designed to cause the unbounded estimation error while not being detected. Then, the analytical design method of the optimal stealthy cyber attack that maximizes the estimation error is developed. The proposed stealthy cyber attack analysis is demonstrated with illustrative examples on Air Traffic Control (ATC) system and Unmanned Aerial Vehicle (UAV) navigation system applications. Secondly, in an attempt to study the CPSs' vulnerabilities in more detail, we further discuss a methodology to identify potential cyber threats inherent in the given CPSs and quantify the attack severity accordingly. We then develop an analytical algorithm to test the behavior of the CPS under various cyber attack combinations. Compared to a numerical approach, the analytical algorithm enables the prediction of the most effective cyber attack combinations without computing the severity of all possible attack combinations, thereby greatly reducing the computational cost. The proposed algorithm is validated through a linearized longitudinal motion of a UAV example. Finally, we propose an attack attenuation strategy via the controller design for CPSs that are robust to various types of cyber attacks. While the previous studies have investigated a secure control by assuming a specific attack strategy, in this research we propose a hybrid robust control scheme that contains multiple sub-controllers, each matched to a specific type of cyber attacks. Then the system can be adapted to various cyber attacks (including those that are not assumed for sub-controller design) by switching its sub-controllers to achieve the best performance. Then, a method for designing a secure switching logic to counter all possible cyber attacks is proposed and it verifies mathematically the system's performance and stability as well. The performance of the proposed control scheme is demonstrated by an example with the hybrid H2 - H-infinity controller applied to a UAV example.

  2. Method for Integrated Simulation (MINTSIM)

    DTIC Science & Technology

    1976-01-01

    sorties allocated to attack SAMs. FAPA = fraction of striking aircraft attacking air bases which attack parked aircraft in the open. TAAB...each striking aircraft. FAS = fraction of striking aircraft attacking air bases which attack sheltered aircraft. (NOTE: FAPA + FAS = 1.0

  3. Finite Energy and Bounded Actuator Attacks on Cyber-Physical Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M

    As control system networks are being connected to enterprise level networks for remote monitoring, operation, and system-wide performance optimization, these same connections are providing vulnerabilities that can be exploited by malicious actors for attack, financial gain, and theft of intellectual property. Much effort in cyber-physical system (CPS) protection has focused on protecting the borders of the system through traditional information security techniques. Less effort has been applied to the protection of cyber-physical systems from intelligent attacks launched after an attacker has defeated the information security protections to gain access to the control system. In this paper, attacks on actuator signalsmore » are analyzed from a system theoretic context. The threat surface is classified into finite energy and bounded attacks. These two broad classes encompass a large range of potential attacks. The effect of theses attacks on a linear quadratic (LQ) control are analyzed, and the optimal actuator attacks for both finite and infinite horizon LQ control are derived, therefore the worst case attack signals are obtained. The closed-loop system under the optimal attack signals is given and a numerical example illustrating the effect of an optimal bounded attack is provided.« less

  4. Web Forms and Untraceable DDoS Attacks

    NASA Astrophysics Data System (ADS)

    Jakobsson, Markus; Menczer, Filippo

    We analyze a Web vulnerability that allows an attacker to perform an email-based attack on selected victims, using standard scripts and agents. What differentiates the attack we describe from other, already known forms of distributed denial of service (DDoS) attacks is that an attacker does not need to infiltrate the network in any manner - as is normally required to launch a DDoS attack. Thus, we see this type of attack as a poor man's DDoS. Not only is the attack easy to mount, but it is also almost impossible to trace back to the perpetrator. Along with descriptions of our attack, we demonstrate its destructive potential with (limited and contained) experimental results. We illustrate the potential impact of our attack by describing how an attacker can disable an email account by flooding its inbox; block competition during on-line auctions; harm competitors with an on-line presence; disrupt phone service to a given victim; disconnect mobile corporate leaders from their networks; and disrupt electronic elections. Finally, we propose a set of countermeasures that are light-weight, do not require modifications to the infrastructure, and can be deployed in a gradual manner.

  5. Replacement Attack: A New Zero Text Watermarking Attack

    NASA Astrophysics Data System (ADS)

    Bashardoost, Morteza; Mohd Rahim, Mohd Shafry; Saba, Tanzila; Rehman, Amjad

    2017-03-01

    The main objective of zero watermarking methods that are suggested for the authentication of textual properties is to increase the fragility of produced watermarks against tampering attacks. On the other hand, zero watermarking attacks intend to alter the contents of document without changing the watermark. In this paper, the Replacement attack is proposed, which focuses on maintaining the location of the words in the document. The proposed text watermarking attack is specifically effective on watermarking approaches that exploit words' transition in the document. The evaluation outcomes prove that tested word-based method are unable to detect the existence of replacement attack in the document. Moreover, the comparison results show that the size of Replacement attack is estimated less accurate than other common types of zero text watermarking attacks.

  6. Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.

    PubMed

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Obaidat, Mohammad S

    2015-11-01

    In order to access remote medical server, generally the patients utilize smart card to login to the server. It has been observed that most of the user (patient) authentication protocols suffer from smart card stolen attack that means the attacker can mount several common attacks after extracting smart card information. Recently, Lu et al.'s proposes a session key agreement protocol between the patient and remote medical server and claims that the same protocol is secure against relevant security attacks. However, this paper presents several security attacks on Lu et al.'s protocol such as identity trace attack, new smart card issue attack, patient impersonation attack and medical server impersonation attack. In order to fix the mentioned security pitfalls including smart card stolen attack, this paper proposes an efficient remote mutual authentication protocol using smart card. We have then simulated the proposed protocol using widely-accepted AVISPA simulation tool whose results make certain that the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. Moreover, the rigorous security analysis proves that the proposed protocol provides strong security protection on the relevant security attacks including smart card stolen attack. We compare the proposed scheme with several related schemes in terms of computation cost and communication cost as well as security functionalities. It has been observed that the proposed scheme is comparatively better than related existing schemes.

  7. Simulation of Attacks for Security in Wireless Sensor Network.

    PubMed

    Diaz, Alvaro; Sanchez, Pablo

    2016-11-18

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  8. Heartburn or Chest Pain: When Is It Heart Attack?

    MedlinePlus

    Heartburn or heart attack: When to worry Severe heartburn and heart attack can be hard to tell apart. Understand how they typically ... flow to your heart (angina) or an actual heart attack. Heartburn, angina and heart attack may feel very ...

  9. Know the Warning Signs of a Heart Attack

    MedlinePlus

    ... No. 22 Know the Warning Signs of a Heart Attack What is a heart attack? Aheart attack happens when the blood vessels that ... hurting your heart muscle. Another name for a heart attack is myocardial infarction, or MI. If you have ...

  10. Percolation of localized attack on isolated and interdependent random networks

    NASA Astrophysics Data System (ADS)

    Shao, Shuai; Huang, Xuqing; Stanley, H. Eugene; Havlin, Shlomo

    2014-03-01

    Percolation properties of isolated and interdependent random networks have been investigated extensively. The focus of these studies has been on random attacks where each node in network is attacked with the same probability or targeted attack where each node is attacked with a probability being a function of its centrality, such as degree. Here we discuss a new type of realistic attacks which we call a localized attack where a group of neighboring nodes in the networks are attacked. We attack a randomly chosen node, its neighbors, and its neighbor of neighbors and so on, until removing a fraction (1 - p) of the network. This type of attack reflects damages due to localized disasters, such as earthquakes, floods and war zones in real-world networks. We study, both analytically and by simulations the impact of localized attack on percolation properties of random networks with arbitrary degree distributions and discuss in detail random regular (RR) networks, Erdős-Rényi (ER) networks and scale-free (SF) networks. We extend and generalize our theoretical and simulation results of single isolated networks to networks formed of interdependent networks.

  11. Stealthy false data injection attacks using matrix recovery and independent component analysis in smart grid

    NASA Astrophysics Data System (ADS)

    JiWei, Tian; BuHong, Wang; FuTe, Shang; Shuaiqi, Liu

    2017-05-01

    Exact state estimation is vital important to maintain common operations of smart grids. Existing researches demonstrate that state estimation output could be compromised by malicious attacks. However, to construct the attack vectors, a usual presumption in most works is that the attacker has perfect information regarding the topology and so on even such information is difficult to acquire in practice. Recent research shows that Independent Component Analysis (ICA) can be used for inferring topology information which can be used to originate undetectable attacks and even to alter the price of electricity for the profits of attackers. However, we found that the above ICA-based blind attack tactics is merely feasible in the environment with Gaussian noises. If there are outliers (device malfunction and communication errors), the Bad Data Detector will easily detect the attack. Hence, we propose a robust ICA based blind attack strategy that one can use matrix recovery to circumvent the outlier problem and construct stealthy attack vectors. The proposed attack strategies are tested with IEEE representative 14-bus system. Simulations verify the feasibility of the proposed method.

  12. Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis

    PubMed Central

    Zhou, Wei; Wen, Junhao; Koh, Yun Sing; Xiong, Qingyu; Gao, Min; Dobbie, Gillian; Alam, Shafiq

    2015-01-01

    Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim’ based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks. PMID:26222882

  13. TANDI: threat assessment of network data and information

    NASA Astrophysics Data System (ADS)

    Holsopple, Jared; Yang, Shanchieh Jay; Sudit, Moises

    2006-04-01

    Current practice for combating cyber attacks typically use Intrusion Detection Sensors (IDSs) to passively detect and block multi-stage attacks. This work leverages Level-2 fusion that correlates IDS alerts belonging to the same attacker, and proposes a threat assessment algorithm to predict potential future attacker actions. The algorithm, TANDI, reduces the problem complexity by separating the models of the attacker's capability and opportunity, and fuse the two to determine the attacker's intent. Unlike traditional Bayesian-based approaches, which require assigning a large number of edge probabilities, the proposed Level-3 fusion procedure uses only 4 parameters. TANDI has been implemented and tested with randomly created attack sequences. The results demonstrate that TANDI predicts future attack actions accurately as long as the attack is not part of a coordinated attack and contains no insider threats. In the presence of abnormal attack events, TANDI will alarm the network analyst for further analysis. The attempt to evaluate a threat assessment algorithm via simulation is the first in the literature, and shall open up a new avenue in the area of high level fusion.

  14. Identifying and tracking attacks on networks: C3I displays and related technologies

    NASA Astrophysics Data System (ADS)

    Manes, Gavin W.; Dawkins, J.; Shenoi, Sujeet; Hale, John C.

    2003-09-01

    Converged network security is extremely challenging for several reasons; expanded system and technology perimeters, unexpected feature interaction, and complex interfaces all conspire to provide hackers with greater opportunities for compromising large networks. Preventive security services and architectures are essential, but in and of themselves do not eliminate all threat of compromise. Attack management systems mitigate this residual risk by facilitating incident detection, analysis and response. There are a wealth of attack detection and response tools for IP networks, but a dearth of such tools for wireless and public telephone networks. Moreover, methodologies and formalisms have yet to be identified that can yield a common model for vulnerabilities and attacks in converged networks. A comprehensive attack management system must coordinate detection tools for converged networks, derive fully-integrated attack and network models, perform vulnerability and multi-stage attack analysis, support large-scale attack visualization, and orchestrate strategic responses to cyber attacks that cross network boundaries. We present an architecture that embodies these principles for attack management. The attack management system described engages a suite of detection tools for various networking domains, feeding real-time attack data to a comprehensive modeling, analysis and visualization subsystem. The resulting early warning system not only provides network administrators with a heads-up cockpit display of their entire network, it also supports guided response and predictive capabilities for multi-stage attacks in converged networks.

  15. Pre-attack signs and symptoms in cluster headache: Characteristics and time profile.

    PubMed

    Snoer, Agneta; Lund, Nunu; Beske, Rasmus; Jensen, Rigmor; Barloese, Mads

    2018-05-01

    Introduction In contrast to the premonitory phase of migraine, little is known about the pre-attack (prodromal) phase of a cluster headache. We aimed to describe the nature, prevalence, and duration of pre-attack symptoms in cluster headache. Methods Eighty patients with episodic cluster headache or chronic cluster headache, according to ICHD-3 beta criteria, were invited to participate. In this observational study, patients underwent a semi-structured interview where they were asked about the presence of 31 symptoms/signs in relation to a typical cluster headache attack. Symptoms included previously reported cluster headache pre-attack symptoms, premonitory migraine symptoms and accompanying symptoms of migraine and cluster headache. Results Pre-attack symptoms were reported by 83.3% of patients, with an average of 4.25 (SD 3.9) per patient. Local and painful symptoms, occurring with a median of 10 minutes before attack, were reported by 70%. Local and painless symptoms and signs, occurring with a median of 10 minutes before attack, were reported by 43.8% and general symptoms, occurring with a median of 20 minutes before attack, were reported by 62.5% of patients. Apart from a dull/aching sensation in the attack area being significantly ( p < 0.05) more frequent among men and episodic patients, compared with women and chronic patients respectively, no other differences in the prevalence of pre-attack symptoms were identified between groups. Conclusion Pre-attack symptoms are frequent in cluster headache. Since the origin of cluster headache attacks is still unresolved, studies of pre-attack symptoms could contribute to the understanding of cluster headache pathophysiology. Furthermore, identification and recognition of pre-attack symptoms could potentially allow earlier abortive treatment.

  16. Shark attack-related injuries: Epidemiology and implications for plastic surgeons.

    PubMed

    Ricci, Joseph A; Vargas, Christina R; Singhal, Dhruv; Lee, Bernard T

    2016-01-01

    The increased media attention to shark attacks has led to a heightened fear and public awareness. Although few sharks are considered dangerous, attacks on humans can result in large soft tissue defects necessitating the intervention of reconstructive surgeons. This study aims to evaluate and describe the characteristics of shark-related injuries in order to improve treatment. The Global Shark Accident File, maintained by the Shark Research Institute (Princeton, NJ, USA), is a compilation of all known worldwide shark attacks. Database records since the 1900s were reviewed to identify differences between fatal and nonfatal attacks, including: geography, injury pattern, shark species, and victim activity. Since the 1900s, there have been 5034 reported shark attacks, of which 1205 (22.7%) were fatal. Although the incidence of attacks per decade has increased, the percentage of fatalities has decreased. Characteristics of fatal attacks included swimming (p = 0.001), boating (p = 0.001), three or more bite sites (p = 0.03), limb loss (p = 0.001), or tiger shark attack (p = 0.002). The most common attacks were bites to the legs (41.8%) or arms (18.4%), with limb loss occurring in 7% of attacks. Geographically, the majority of attacks occurred in North America (36.7%) and Australia (26.5%). Most attacks in the USA occurred in Florida (49.1%) and California (13.6%). Although rare, shark attacks result in devastating injuries to patients. As these injuries often involve multiple sites and limb loss, this creates a significant challenge for reconstructive surgeons. Proper identification of the characteristics of the attack can aid in providing optimal care for those affected. Copyright © 2015 British Association of Plastic, Reconstructive and Aesthetic Surgeons. Published by Elsevier Ltd. All rights reserved.

  17. Hereditary Angioedema Attacks Resolve Faster and Are Shorter after Early Icatibant Treatment

    PubMed Central

    Maurer, Marcus; Kaplan, Allen; Investigators, on behalf of I. O. S.

    2013-01-01

    Background Attacks of hereditary angioedema (HAE) are unpredictable and, if affecting the upper airway, can be lethal. Icatibant is used for physician- or patient self-administered symptomatic treatment of HAE attacks in adults. Its mode of action includes disruption of the bradykinin pathway via blockade of the bradykinin B2 receptor. Early treatment is believed to shorten attack duration and prevent severe outcomes; however, evidence to support these benefits is lacking. Objective To examine the impact of timing of icatibant administration on the duration and resolution of HAE type I and II attacks. Methods The Icatibant Outcome Survey is an international, prospective, observational study for patients treated with icatibant. Data on timings and outcomes of icatibant treatment for HAE attacks were collected between July 2009–February 2012. A mixed-model of repeated measures was performed for 426 attacks in 136 HAE type I and II patients. Results Attack duration was significantly shorter in patients treated <1 hour of attack onset compared with those treated ≥1 hour (6.1 hours versus 16.8 hours [p<0.001]). Similar significant effects were observed for <2 hours versus ≥2 hours (7.2 hours versus 20.2 hours [p<0.001]) and <5 hours versus ≥5 hours (8.0 hours versus 23.5 hours [p<0.001]). Treatment within 1 hour of attack onset also significantly reduced time to attack resolution (5.8 hours versus 8.8 hours [p<0.05]). Self-administrators were more likely to treat early and experience shorter attacks than those treated by a healthcare professional. Conclusion Early blockade of the bradykinin B2 receptor with icatibant, particularly within the first hour of attack onset, significantly reduced attack duration and time to attack resolution. PMID:23390491

  18. Adaptive optimisation-offline cyber attack on remote state estimator

    NASA Astrophysics Data System (ADS)

    Huang, Xin; Dong, Jiuxiang

    2017-10-01

    Security issues of cyber-physical systems have received increasing attentions in recent years. In this paper, deception attacks on the remote state estimator equipped with the chi-squared failure detector are considered, and it is assumed that the attacker can monitor and modify all the sensor data. A novel adaptive optimisation-offline cyber attack strategy is proposed, where using the current and previous sensor data, the attack can yield the largest estimation error covariance while ensuring to be undetected by the chi-squared monitor. From the attacker's perspective, the attack is better than the existing linear deception attacks to degrade the system performance. Finally, some numerical examples are provided to demonstrate theoretical results.

  19. Public knowledge of heart attack symptoms in Beijing residents.

    PubMed

    Zhang, Qing-Tan; Hu, Da-Yi; Yang, Jin-Gang; Zhang, Shou-Yan; Zhang, Xin-Quan; Liu, Shu-Shan

    2007-09-20

    Definitive treatment for heart attack is early reperfusion with either angioplasty or thrombolytic therapy, and the benefit is strictly time-dependent. Patient outcomes are improved with either therapy when initiated as soon as possible. Recognition of heart attack symptoms is logically tied to taking action to receive prompt emergency care. Inadequate knowledge of heart attack symptoms may prolong delay. The purpose of this study was to document knowledge about heart attack symptoms in Beijing residents and to identify the characteristics associated with increased knowledge of heart attack. A structured survey was conducted in 18 communities in Beijing from March 1 through June 10 in 2006. Addresses and participants were selected randomly following a stratification. The survey was designed to collect knowledge of heart attack symptoms from sampled adults in each community. A total of 4627 respondents completed the questionnaires correctly, and 50.29% of them were female. Totally 64.15% of the respondents reported chest pain or discomfort (common symptoms) as a symptom of heart attack; 75.38% reported at least one of the following eight symptoms as a symptom of heart attack: back pain, shortness of breath, arm pain or numbness, nausea or vomiting, neck, jaw or shoulder pain, epigastric pain, sweating, weakness (less common symptoms); 20.36% correctly reported four or more heart attack symptoms, only 7.4% knew all the correct heart attack symptoms, and 28.94% knew about reperfusion therapy for heart attack; 31.7% reported to call 120 or 999 while having a heart attack themselves; however 89.6% reported to call 120 or 999 when someone else is suffering from a heart attack. Very old persons and those with health insurance coverage, high education level, high household income, longer living in Beijing and previous experience with heart disease had greater knowledge of heart attack symptoms. Public knowledge of common heart attack symptoms as well as less common heart attack symptoms is deficient in Beijing residents. But their knowledge of calling emergency medical services when someone is having a heart attack is relatively adequate. Public health efforts are needed to increase the recognition of the major heart attack symptoms in both the general public and groups at high risk for an acute cardiac event, especially in socioeconomically disadvantaged subgroups, including persons with low education level, low household income, and no health insurance coverage.

  20. Application distribution model and related security attacks in VANET

    NASA Astrophysics Data System (ADS)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  1. An Approach for Assessing Consequences of Potential Supply Chain and Insider Contributed Cyber Attacks on Nuclear Power Plants

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chu, Tsong L.

    The Stuxnet attack at the Natanz facility is an example of a targeted and successful cyber attack on a nuclear facility. Snowden's release of National Security Agency documents demonstrated the consequences of the insider threat. More recently, the United States tried to attack North Korea but failed, South Korea was attempting to attack North Korea, and both applied Stuxnet-like approaches. These sophisticated targeted attacks differ from web-site hacking events that are reported almost daily in the news mainly because targeted attacks require detailed design and operation information of the systems attacked and/or are often carried out by insiders. For instance,more » in order to minimize disruption of facilities around the world, Stuxnet remained idle until it recognized the specific configuration of the Natanz facility, demonstrating that the attackers possessed extremely detailed information about the facility. Such targeted cyber attacks could become a national-level military weapon and be used in coercion of hostile countries.« less

  2. Improving the Rainbow Attack by Reusing Colours

    NASA Astrophysics Data System (ADS)

    Ågren, Martin; Johansson, Thomas; Hell, Martin

    Hashing or encrypting a key or a password is a vital part in most network security protocols. The most practical generic attack on such schemes is a time memory trade-off attack. Such an attack inverts any one-way function using a trade-off between memory and execution time. Existing techniques include the Hellman attack and the rainbow attack, where the latter uses different reduction functions ("colours") within a table.

  3. Simulation of Attacks for Security in Wireless Sensor Network

    PubMed Central

    Diaz, Alvaro; Sanchez, Pablo

    2016-01-01

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node’s software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work. PMID:27869710

  4. Analytical Characterization of Internet Security Attacks

    ERIC Educational Resources Information Center

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  5. The anatomy of a shark attack: a case report and review of the literature.

    PubMed

    Caldicott, D G; Mahajani, R; Kuhn, M

    2001-07-01

    Shark attacks are rare but are associated with a high morbidity and significant mortality. We report the case of a patient's survival from a shark attack and their subsequent emergency medical and surgical management. Using data from the International Shark Attack File, we review the worldwide distribution and incidence of shark attack. A review of the world literature examines the features which make shark attacks unique pathological processes. We offer suggestions for strategies of management of shark attack, and techniques for avoiding adverse outcomes in human encounters with these endangered creatures.

  6. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    NASA Astrophysics Data System (ADS)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  7. Novel Method For Low-Rate Ddos Attack Detection

    NASA Astrophysics Data System (ADS)

    Chistokhodova, A. A.; Sidorov, I. D.

    2018-05-01

    The relevance of the work is associated with an increasing number of advanced types of DDoS attacks, in particular, low-rate HTTP-flood. Last year, the power and complexity of such attacks increased significantly. The article is devoted to the analysis of DDoS attacks detecting methods and their modifications with the purpose of increasing the accuracy of DDoS attack detection. The article details low-rate attacks features in comparison with conventional DDoS attacks. During the analysis, significant shortcomings of the available method for detecting low-rate DDoS attacks were found. Thus, the result of the study is an informal description of a new method for detecting low-rate denial-of-service attacks. The architecture of the stand for approbation of the method is developed. At the current stage of the study, it is possible to improve the efficiency of an already existing method by using a classifier with memory, as well as additional information.

  8. Heavy-tailed distribution of the SSH Brute-force attack duration in a multi-user environment

    NASA Astrophysics Data System (ADS)

    Lee, Jae-Kook; Kim, Sung-Jun; Park, Chan Yeol; Hong, Taeyoung; Chae, Huiseung

    2016-07-01

    Quite a number of cyber-attacks to be place against supercomputers that provide highperformance computing (HPC) services to public researcher. Particularly, although the secure shell protocol (SSH) brute-force attack is one of the traditional attack methods, it is still being used. Because stealth attacks that feign regular access may occur, they are even harder to detect. In this paper, we introduce methods to detect SSH brute-force attacks by analyzing the server's unsuccessful access logs and the firewall's drop events in a multi-user environment. Then, we analyze the durations of the SSH brute-force attacks that are detected by applying these methods. The results of an analysis of about 10 thousands attack source IP addresses show that the behaviors of abnormal users using SSH brute-force attacks are based on human dynamic characteristics of a typical heavy-tailed distribution.

  9. An entangling-probe attack on Shor's algorithm for factorization

    NASA Astrophysics Data System (ADS)

    Azuma, Hiroo

    2018-02-01

    We investigate how to attack Shor's quantum algorithm for factorization with an entangling probe. We show that an attacker can steal an exact solution of Shor's algorithm outside an institute where the quantum computer is installed if he replaces its initialized quantum register with entangled qubits, namely the entangling probe. He can apply arbitrary local operations to his own probe. Moreover, we assume that there is an unauthorized person who helps the attacker to commit a crime inside the institute. He tells garbage data obtained from measurements of the quantum register to the attacker secretly behind a legitimate user's back. If the attacker succeeds in cracking Shor's algorithm, the legitimate user obtains a random answer and does not notice the attacker's illegal acts. We discuss how to detect the attacker. Finally, we estimate a probability that the quantum algorithm inevitably makes an error, of which the attacker can take advantage.

  10. Use of the Panic Attack Questionnaire-IV to assess non-clinical panic attacks and limited symptom panic attacks in student and community samples.

    PubMed

    Norton, Peter J; Zvolensky, Michael J; Bonn-Miller, Marcel O; Cox, Brian J; Norton, G Ron

    2008-10-01

    Since its development in the mid-1980s, the Panic Attack Questionnaire (PAQ) has been one of the more, if not the most, commonly used self-report tools for assessing panic attacks. The usage of the instrument, however, has come amid potential concerns that instructions and descriptions may lead to an over-estimate of the prevalence of panic attacks. Furthermore, the instrument has not been revised since 1992, despite changes in DSM-IV criteria and more recent developments in the understanding of panic attacks. As a result, this paper describes a revision of the PAQ to improve the instruction and descriptive set, and to fully assess features of panic derived from recent conceptualizations. Students meeting DSM-IV panic attack criteria and those endorsing panic attacks, but not meeting criteria, showed few differences with the exception that those not meeting DSM-IV criteria typically reported a longer onset-to-peak intensity time than did Panickers. Results were cross-validated and extended using an independent Community Sample. A full descriptive phenomenology of panic attacks is described, and future directions for studying panic attacks using the PAQ are presented.

  11. Command Disaggregation Attack and Mitigation in Industrial Internet of Things

    PubMed Central

    Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-01-01

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework. PMID:29065461

  12. Command Disaggregation Attack and Mitigation in Industrial Internet of Things.

    PubMed

    Xun, Peng; Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-10-21

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  13. Lethality of sea lamprey attacks on lake trout in relation to location on the body surface

    USGS Publications Warehouse

    Bergstedt, Roger A.; Schneider, Clifford P.; O'Gorman, Robert

    2001-01-01

    We compared the locations of healed attack marks of the sea lamprey Petromyzon marinus on live lake trout Salvelinus namaycush with those of unhealed attack marks on dead lake trout to determine if the lethality of a sea lamprey attack was related to attack location. Lake trout were collected from Lake Ontario, live fish with gill nets in September 1985 and dead fish with trawls in October 1983−1986. Attack location was characterized by the percent distances from snout to tail and from the ventral to the dorsal midline. Kolmogorov−Smirnov two-sample tests did not detect significant differences in the distribution of attack location along either the anteroposterior axis or the dorsoventral axis. When attack locations were grouped into six anatomical regions historically used to record sea lamprey attacks, dead fish did not exhibit a significantly higher proportion of attacks in the more anterior regions. Even if the differences in attack location on live and dead fish were significant, they were too small to imply substantial spatial differences in attack lethality that should be accounted for when modeling the effects of sea lampreys feeding on lake trout. We suggest that the tendency for sea lamprey attacks to occur on the anterior half of the fish is related to the lower amplitude of lateral body movement there during swimming and thus the lower likelihood of being dislodged.

  14. Serial agonistic attacks by greylag goose families, Anser anser, against the same opponent

    PubMed Central

    Scheiber, Isabella B.R.; Kotrschal, Kurt; Weiß, Brigitte M.

    2011-01-01

    It is known from primates that alliance partners may support each other’s interests in competition with others, for example, through repeated agonistic attacks against a particular individual. We examined serial aggressive interactions between greylag goose families and other flock members. We found that repeated attacks towards the same individual were common and that up to five serial attacks by family members followed an initial attack. Family size did not affect the frequency of such serial attacks. Juvenile geese evidently benefited most from active social support through serial attacks. About 60% of the juveniles’ lost primary interactions were subsequently reversed by another family member. This may be one of the reasons why juveniles rank higher in the social hierarchy than would be expected from their age and size alone. Losses in serial attacks predominantly occurred against other, presumably higher-ranking, family geese and ganders. We propose three major functions/consequences of serial attacks. Analogous to primates, serial attacks in greylag geese may serve to reinforce a losing experience of an opponent defeated in a preceding attack. On the side of the winning family, serial attacks may reinforce the experience of winning. Both winning and losing experiences are linked with physiological consequences in higher vertebrates, affecting the future social performance of winners or losers. Finally, serial attacks may signal the agonistic potential of a family to other flock members. This is supported by heart rate data, which indicate that greylags are competent to interpret third-party relationships. PMID:21984838

  15. Khyâl attacks: a key idiom of distress among traumatized cambodia refugees.

    PubMed

    Hinton, Devon E; Pich, Vuth; Marques, Luana; Nickerson, Angela; Pollack, Mark H

    2010-06-01

    Traumatized Cambodian refugees with PTSD often complain of khyâl attacks. The current study investigates khyâl attacks from multiple perspectives and examines the validity of a model of how khyâl attacks are generated. The study found that khyâl attacks had commonly been experienced in the previous 4 weeks and that their severity was strongly correlated with the severity of PTSD (PTSD Checklist). It was found that khyâl attacks were triggered by various processes--such as worry, trauma recall, standing up, going to a mall--and that khyâl attacks almost always met panic attack criteria. It was also found that during a khyâl attack there was great fear that death might occur from bodily dysfunction. It was likewise found that a complex nosology of khyâl attacks exists that rates the attacks on a scale of severity, that the severity determines how the khyâl attacks should be treated and that those treatments are often complex. As illustrated by the article, khyâl attacks constitute a key aspect of trauma ontology in this group, a culturally specific experiencing of anxiety and trauma-related disorder. The article also contributes to the study of trauma somatics, that is, to the study of how trauma results in specific symptoms in a specific cultural context, showing that a key part of the trauma-somatic reticulum is often a cultural syndrome.

  16. Cyber attacks against state estimation in power systems: Vulnerability analysis and protection strategies

    NASA Astrophysics Data System (ADS)

    Liu, Xuan

    Power grid is one of the most critical infrastructures in a nation and could suffer a variety of cyber attacks. With the development of Smart Grid, false data injection attack has recently attracted wide research interest. This thesis proposes a false data attack model with incomplete network information and develops optimal attack strategies for attacking load measurements and the real-time topology of a power grid. The impacts of false data on the economic and reliable operations of power systems are quantitatively analyzed in this thesis. To mitigate the risk of cyber attacks, a distributed protection strategies are also developed. It has been shown that an attacker can design false data to avoid being detected by the control center if the network information of a power grid is known to the attacker. In practice, however, it is very hard or even impossible for an attacker to obtain all network information of a power grid. In this thesis, we propose a local load redistribution attacking model based on incomplete network information and show that an attacker only needs to obtain the network information of the local attacking region to inject false data into smart meters in the local region without being detected by the state estimator. A heuristic algorithm is developed to determine a feasible attacking region by obtaining reduced network information. This thesis investigates the impacts of false data on the operations of power systems. It has been shown that false data can be designed by an attacker to: 1) mask the real-time topology of a power grid; 2) overload a transmission line; 3) disturb the line outage detection based on PMU data. To mitigate the risk of cyber attacks, this thesis proposes a new protection strategy, which intends to mitigate the damage effects of false data injection attacks by protecting a small set of critical measurements. To further reduce the computation complexity, a mixed integer linear programming approach is also proposed to separate the power grid into several subnetworks, then distributed protection strategy is applied to each subnetwork.

  17. Public knowledge of heart attack in a Nepalese population survey.

    PubMed

    Limbu, Yuba R; Malla, Rabi; Regmi, Shyam R; Dahal, Ramesh; Nakarmi, Hari L; Yonzan, Ganesh; Gartaula, Ritu P

    2006-01-01

    Limited knowledge of heart attack symptoms may prevent patients from seeking time-dependent thrombolytic therapy, an intervention that offers impressive survival benefit. Previous studies carried out in developed countries demonstrated a deficit of knowledge about a wide range of heart attack symptoms. The aim of this study was to describe knowledge of heart attack, knowledge of heart attack symptoms, and anticipated first response to symptoms among the lay public in Nepal. A total of 1192 participants (657 men and 535 women age 16 to 88 years old) were interviewed in a cross-sectional manner. Those <16 years of age, all health professionals, and individuals with a history of heart attack were excluded. A total of 862 (72.3%) participants had heard of heart attack. Significantly more male than female participants had heard of heart attack (P <.001). Of the respondents, 91.7% with >or=10 years of education (ED-2) had heard of heart of attack, whereas only 54% respondents with <10 years of education or who were illiterate (unable to read and write) (ED-1) had heard of heart attack, and in both the male and female populations, a higher percentage of the ED-2 group had heard of heart attack than the ED-1 group (92.6% vs. 60% and 85.6% vs. 49.6%, respectively). A significantly higher number of respondents from 31 to 50 years of age (AGE-2) had heard of heart attack than those 16 to 30 years of age (AGE-1) and those >50 years of age (AGE-3) (P <.001). Among 862 respondents who had heard of heart attack, 21.3% could not name any heart attack symptoms. A total of 16 different heart attack symptoms were named. Fainting or collapsing (48%), chest pain (22.4%), shortness of breath (9%), dizziness (8.4%), palpitations (7.4%), and sweating (7.4%) were the leading symptoms named by respondents. Fainting or collapsing and chest pain and shortness of breath were named more frequently among the ED-2 group respondents and the AGE-3 group men. Only 3.7% could name >or=2 typical heart attack symptoms. A significantly larger number of the ED-2 group named >or=2 typical symptoms than their counterparts (P <0.001). A large number (77.6%) of respondents preferred immediate hospital referral and/or doctor consultation after a heart attack. In Nepal, better-educated men are more aware of heart attack. Fainting or collapsing and chest pain and shortness of breath were leading heart attack symptoms named by the general population. Public heart attack awareness is not adequate and knowledge of wide range of heart attack symptoms is deficient in the Nepalese general population.

  18. Coating flow of an anti-HIV microbicide gel: boundary dilution and yield stress

    NASA Astrophysics Data System (ADS)

    Szeri, Andrew J.; Tasoglu, Savas; Park, Su Chan; Katz, David F.

    2010-11-01

    A recent study has confirmed, for the first time, that a vaginal gel formulation of the antiretroviral drug Tenofovir, when topically applied, significantly inhibits sexual HIV transmission to women [1]. However, the gel for this drug, and anti-HIV microbicide gels in general, have not been designed using an understanding of how gel spreading govern successful drug delivery. Elastohydrodynamic lubrication theory can be applied to model spreading of microbicide gels [2]. Here, we extend our initial analysis: we incorporate a yield stress, and we model the effects of gel dilution due to contact with vaginal fluid produced at the gel-tissue interface. Our model developed in [2] is supplemented with a convective-diffusive transport equation to characterize dilution, and solved using a multi-step scheme in a moving domain. The association between local dilution of gel and rheological properties is obtained experimentally. To model the common yield stress property of gels, we proceed by scaling analysis first. This establishes the conditions for validity of lubrication theory of a shear thinning yield stress fluid. This involves further development of the model in [2], incorporating a biviscosity model.[4pt] [1] Karim, et al., Science, 2010.[0pt] [2] Szeri, et al., Phy. of Fluids, 2008.

  19. Optimization of a Fully-Pulsed Jet in a Fluid of Similar Density

    NASA Astrophysics Data System (ADS)

    Krueger, Paul S.; Gharib, Morteza

    1998-11-01

    In a previous work, Gharib et al.(Morteza Gharib, Edmond Rambod, Karim Shariff, "A Universal Time Scale for Vortex Ring Formation," JFM, vol. 360, pp. 121-140, 1998) have studied vortex rings generated through impulsively started jets using a piston/cylinder arrangement. This work showed that the vortex ring that formed at the leading edge of the jet reached a maximum strength for a piston stroke to diameter ratio (L/D) of approximately 4 for a wide range of piston motions and jet exit boundaries. This result suggests interesting consequences for a fully-pulsed jet, which is simply a series of impulsively started jets strung together. Specifically, the thrust of the present investigation is to study how the physical behavior of a fully-pulsed jet varies as both L/D and the pulsing frequency of the jet (rate at which pulses are ejected) are varied. To this end, a piston/cylinder arrangement with a stepper motor is used to generate a fully-pulsed jet with different L/D and pulsing frequency (f) combinations. The thrust produced by these various jets is measured directly and used as a gauge of the effectiveness of the pulsed jet. Combinations of L/D and f leading to optimization of the pulsed jet will be presented.

  20. Anisotropy of the Fermi surface, Fermi velocity, many-body enhancement, and superconducting energy gap in Nb

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Crabtree, G.W.; Dye, D.H.; Karim, D.P.

    1987-02-01

    The detailed angular dependence of the Fermi radius k/sub F/, the Fermi velocity v/sub F/(k), the many-body enhancement factor lambda(k), and the superconducting energy gap ..delta..(k), for electrons on the Fermi surface of Nb are derived with use of the de Haas--van Alphen (dHvA) data of Karim, Ketterson, and Crabtree (J. Low Temp. Phys. 30, 389 (1978)), a Korringa-Kohn-Rostoker parametrization scheme, and an empirically adjusted band-structure calculation of Koelling. The parametrization is a nonrelativistic five-parameter fit allowing for cubic rather than spherical symmetry inside the muffin-tin spheres. The parametrized Fermi surface gives a detailed interpretation of the previously unexplained kappa,more » ..cap alpha..', and ..cap alpha..'' orbits in the dHvA data. Comparison of the parametrized Fermi velocities with those of the empirically adjusted band calculation allow the anisotropic many-body enhancement factor lambda(k) to be determined. Theoretical calculations of the electron-phonon interaction based on the tight-binding model agree with our derived values of lambda(k) much better than those based on the rigid-muffin-tin approximation. The anisotropy in the superconducting energy gap ..delta..(k) is estimated from our results for lambda(k), assuming weak anisotropy.« less

  1. Anisotropy of the Fermi surface, Fermi velocity, many-body enhancement, and superconducting energy gap in Nb

    NASA Astrophysics Data System (ADS)

    Crabtree, G. W.; Dye, D. H.; Karim, D. P.; Campbell, S. A.; Ketterson, J. B.

    1987-02-01

    The detailed angular dependence of the Fermi radius kF, the Fermi velocity vF(k), the many-body enhancement factor λ(k), and the superconducting energy gap Δ(k), for electrons on the Fermi surface of Nb are derived with use of the de Haas-van Alphen (dHvA) data of Karim, Ketterson, and Crabtree [J. Low Temp. Phys. 30, 389 (1978)], a Korringa-Kohn-Rostoker parametrization scheme, and an empirically adjusted band-structure calculation of Koelling. The parametrization is a nonrelativistic five-parameter fit allowing for cubic rather than spherical symmetry inside the muffin-tin spheres. The parametrized Fermi surface gives a detailed interpretation of the previously unexplained κ, α', and α'' orbits in the dHvA data. Comparison of the parametrized Fermi velocities with those of the empirically adjusted band calculation allow the anisotropic many-body enhancement factor λ(k) to be determined. Theoretical calculations of the electron-phonon interaction based on the tight-binding model agree with our derived values of λ(k) much better than those based on the rigid-muffin-tin approximation. The anisotropy in the superconducting energy gap Δ(k) is estimated from our results for λ(k), assuming weak anisotropy.

  2. Self-Diffusion of small Ag and Ni islands on Ag(111) and Ni(111) using the self-learning kinetic Monte Carlo method

    NASA Astrophysics Data System (ADS)

    Islamuddin Shah, Syed; Nandipati, Giridhar; Kara, Abdelkader; Rahman, Talat S.

    2012-02-01

    We have applied a modified Self-Learning Kinetic Monte Carlo (SLKMC) method [1] to examine the self-diffusion of small Ag and Ni islands, containing up to 10 atom, on the (111) surface of the respective metal. The pattern recognition scheme in this new SLKMC method allows occupancy of the fcc, hcp and top sites on the fcc(111) surface and employs them to identify the local neighborhood around a central atom. Molecular static calculations with semi empirical interatomic potential and reliable techniques for saddle point search revealed several new diffusion mechanisms that contribute to the diffusion of small islands. For comparison we have also evaluated the diffusion characteristics of Cu clusters on Cu(111) and compared results with previous findings [2]. Our results show a linear increase in effective energy barriers scaling almost as 0.043, 0.051 and 0.064 eV/atom for the Cu/Cu(111), Ag/Ag(111), and Ni/Ni(111) systems, respectively. For all three systems, diffusion of small islands proceeds mainly through concerted motion, although several multiple and single atom processes also contribute. [1] Oleg Trushin et al. Phys. Rev. B 72, 115401 (2005) [2] Altaf Karim et al. Phys. Rev. B 73, 165411 (2006)

  3. Heart attack

    MedlinePlus

    ... infarction; Non-ST - elevation myocardial infarction; NSTEMI; CAD - heart attack; Coronary artery disease - heart attack ... made up of cholesterol and other cells. A heart attack may occur when: A tear in the ...

  4. The effect of climate variability on urinary stone attacks: increased incidence associated with temperature over 18 °C: a population-based study.

    PubMed

    Park, Hyoung Keun; Bae, Sang Rak; Kim, Satbyul E; Choi, Woo Suk; Paick, Sung Hyun; Ho, Kim; Kim, Hyeong Gon; Lho, Yong Soo

    2015-02-01

    The aim of this study was to evaluate the effect of seasonal variation and climate parameters on urinary tract stone attack and investigate whether stone attack is increased sharply at a specific point. Nationwide data of total urinary tract stone attack numbers per month between January 2006 and December 2010 were obtained from the Korean Health Insurance Review and Assessment Service. The effects of climatic factors on monthly urinary stone attack were assessed using auto-regressive integrated moving average (ARIMA) regression method. A total of 1,702,913 stone attack cases were identified. Mean monthly and monthly average daily urinary stone attack cases were 28,382 ± 2,760 and 933 ± 85, respectively. The stone attack showed seasonal trends of sharp incline in June, a peak plateau from July to September, and a sharp decline after September. The correlation analysis showed that ambient temperature (r = 0.557, p < 0.001) and relative humidity (r = 0.513, p < 0.001) were significantly associated with urinary stone attack cases. However, after adjustment for trends and seasonality, ambient temperature was the only climate factor associated with the stone attack cases in ARIMA regression test (p = 0.04). Threshold temperature was estimated as 18.4 °C. Risk of urinary stone attack significantly increases 1.71% (1.02-2.41 %, 95% confidence intervals) with a 1 °C increase of ambient temperature above the threshold point. In conclusion, monthly urinary stone attack cases were changed according to seasonal variation. Among the climates variables, only temperature had consistent association with stone attack and when the temperature is over 18.4 °C, urinary stone attack would be increased sharply.

  5. Reexperiencing symptoms, dissociation, and avoidance behaviors in daily life of patients with PTSD and patients with panic disorder with agoraphobia.

    PubMed

    Pfaltz, Monique C; Michael, Tanja; Meyer, Andrea H; Wilhelm, Frank H

    2013-08-01

    Panic attacks are frequently perceived as life threatening. Panic disorder (PD) patients may therefore experience symptoms of posttraumatic stress disorder (PTSD). The authors explored this in 28 healthy controls, 17 PTSD patients, and 24 PD patients with agoraphobia who completed electronic diaries 36 times during 1 week. Patient groups frequently reported dissociation as well as thoughts, memories, and reliving of their trauma or panic attacks. PTSD patients reported more trauma/panic attack thoughts (incidence rate ratio [IRR] = 2.9) and memories (IRR = 2.8) than PD patients. Patient groups relived their trauma or panic attacks equally frequently, and reported comparable bodily reactions and distress associated with trauma or panic attack memories. Clinical groups avoided trauma or panic attack reminders more often than healthy controls (avoidance of trauma- or panic attack-related thoughts (IRR = 8.0); avoidance of things associated with the trauma or panic attack (IRR = 40.7). PD patients avoided trauma or panic attack reminders less often than PTSD patients (avoidance of trauma- or panic attack-related thoughts [IRR = 2.5]; avoidance of things associated with the trauma or panic attack [IRR = 4.1]), yet these differences were nonsignificant when controlling for functional impairment. In conclusion, trauma-like symptoms are common in PD with agoraphobia and panic attacks may be processed similarly as trauma in PTSD. Copyright © 2013 International Society for Traumatic Stress Studies.

  6. False Positive and False Negative Effects on Network Attacks

    NASA Astrophysics Data System (ADS)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  7. The non-trusty clown attack on model-based speaker recognition systems

    NASA Astrophysics Data System (ADS)

    Farrokh Baroughi, Alireza; Craver, Scott

    2015-03-01

    Biometric detectors for speaker identification commonly employ a statistical model for a subject's voice, such as a Gaussian Mixture Model, that combines multiple means to improve detector performance. This allows a malicious insider to amend or append a component of a subject's statistical model so that a detector behaves normally except under a carefully engineered circumstance. This allows an attacker to force a misclassification of his or her voice only when desired, by smuggling data into a database far in advance of an attack. Note that the attack is possible if attacker has access to database even for a limited time to modify victim's model. We exhibit such an attack on a speaker identification, in which an attacker can force a misclassification by speaking in an unusual voice, and replacing the least weighted component of victim's model by the most weighted competent of the unusual voice of the attacker's model. The reason attacker make his or her voice unusual during the attack is because his or her normal voice model can be in database, and by attacking with unusual voice, the attacker has the option to be recognized as himself or herself when talking normally or as the victim when talking in the unusual manner. By attaching an appropriately weighted vector to a victim's model, we can impersonate all users in our simulations, while avoiding unwanted false rejections.

  8. 44 CFR 312.2 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... meaning of the listed terms are as follows: (a) The term attack means any attack or series of attacks by... population caused, or which would be caused, by an attack upon the United States, or by natural disaster, (2) to deal with the immediate emergency conditions which would be created by any such attack, or natural...

  9. 44 CFR 312.2 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... meaning of the listed terms are as follows: (a) The term attack means any attack or series of attacks by... population caused, or which would be caused, by an attack upon the United States, or by natural disaster, (2) to deal with the immediate emergency conditions which would be created by any such attack, or natural...

  10. 44 CFR 312.2 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... meaning of the listed terms are as follows: (a) The term attack means any attack or series of attacks by... population caused, or which would be caused, by an attack upon the United States, or by natural disaster, (2) to deal with the immediate emergency conditions which would be created by any such attack, or natural...

  11. [Comparative analysis of phenomenology of paroxysms of atrial fibrillation and panic attacks].

    PubMed

    San'kova, T A; Solov'eva, A D; Nedostup, A V

    2004-01-01

    To study phenomenology of attacks of atrial fibrillation (AF) and to compare it with phenomenology of panic attacks for elucidation of pathogenesis of atrial fibrillation and for elaboration of rational therapeutic intervention including those aimed at correction of psychovegetative abnormalities. Patients with nonrheumatic paroxysmal AF (n=105) and 100 patients with panic attacks (n=100). Clinical, cardiological and neurological examination, analysis of patients complaints during attacks of AF, and comparison them with diagnostic criteria for panic attack. It was found that clinical picture of attacks of AF comprised vegetative, emotional and functional neurological phenomena similar to those characteristic for panic attacks. This similarity as well as positive therapeutic effect of clonazepam allowed to propose a novel pathogenic mechanism of AF attacks. Severity of psychovegetative disorders during paroxysm of AF could be evaluated by calculation of psychovegetative iudex: Psychovegetative index should be used for detection of panic attack-like component in clinical picture of AF paroxysm and thus for determination of indications for inclusion of vegetotropic drugs, e. g. clonazepam, in complex preventive therapy.

  12. Security Assessment of Cyberphysical Digital Microfluidic Biochips.

    PubMed

    Ali, Sk Subidh; Ibrahim, Mohamed; Sinanoglu, Ozgur; Chakrabarty, Krishnendu; Karri, Ramesh

    2016-01-01

    A digital microfluidic biochip (DMFB) is an emerging technology that enables miniaturized analysis systems for point-of-care clinical diagnostics, DNA sequencing, and environmental monitoring. A DMFB reduces the rate of sample and reagent consumption, and automates the analysis of assays. In this paper, we provide the first assessment of the security vulnerabilities of DMFBs. We identify result-manipulation attacks on a DMFB that maliciously alter the assay outcomes. Two practical result-manipulation attacks are shown on a DMFB platform performing enzymatic glucose assay on serum. In the first attack, the attacker adjusts the concentration of the glucose sample and thereby modifies the final result. In the second attack, the attacker tampers with the calibration curve of the assay operation. We then identify denial-of-service attacks, where the attacker can disrupt the assay operation by tampering either with the droplet-routing algorithm or with the actuation sequence. We demonstrate these attacks using a digital microfluidic synthesis simulator. The results show that the attacks are easy to implement and hard to detect. Therefore, this work highlights the need for effective protections against malicious modifications in DMFBs.

  13. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia.

    PubMed

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources.

  14. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia

    PubMed Central

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Introduction Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. Methods The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Results Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. Conclusion The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources. PMID:17274813

  15. Robustness analysis of interdependent networks under multiple-attacking strategies

    NASA Astrophysics Data System (ADS)

    Gao, Yan-Li; Chen, Shi-Ming; Nie, Sen; Ma, Fei; Guan, Jun-Jie

    2018-04-01

    The robustness of complex networks under attacks largely depends on the structure of a network and the nature of the attacks. Previous research on interdependent networks has focused on two types of initial attack: random attack and degree-based targeted attack. In this paper, a deliberate attack function is proposed, where six kinds of deliberate attacking strategies can be derived by adjusting the tunable parameters. Moreover, the robustness of four types of interdependent networks (BA-BA, ER-ER, BA-ER and ER-BA) with different coupling modes (random, positive and negative correlation) is evaluated under different attacking strategies. Interesting conclusions could be obtained. It can be found that the positive coupling mode can make the vulnerability of the interdependent network to be absolutely dependent on the most vulnerable sub-network under deliberate attacks, whereas random and negative coupling modes make the vulnerability of interdependent network to be mainly dependent on the being attacked sub-network. The robustness of interdependent network will be enhanced with the degree-degree correlation coefficient varying from positive to negative. Therefore, The negative coupling mode is relatively more optimal than others, which can substantially improve the robustness of the ER-ER network and ER-BA network. In terms of the attacking strategies on interdependent networks, the degree information of node is more valuable than the betweenness. In addition, we found a more efficient attacking strategy for each coupled interdependent network and proposed the corresponding protection strategy for suppressing cascading failure. Our results can be very useful for safety design and protection of interdependent networks.

  16. Continuous-variable quantum cryptography is secure against non-Gaussian attacks.

    PubMed

    Grosshans, Frédéric; Cerf, Nicolas J

    2004-01-30

    A general study of arbitrary finite-size coherent attacks against continuous-variable quantum cryptographic schemes is presented. It is shown that, if the size of the blocks that can be coherently attacked by an eavesdropper is fixed and much smaller than the key size, then the optimal attack for a given signal-to-noise ratio in the transmission line is an individual Gaussian attack. Consequently, non-Gaussian coherent attacks do not need to be considered in the security analysis of such quantum cryptosystems.

  17. A comparison of the nature and correlates of panic attacks in the context of Panic Disorder and Social Anxiety Disorder.

    PubMed

    Brown, Lily A; LeBeau, Richard; Liao, Betty; Niles, Andrea N; Glenn, Daniel; Craske, Michelle G

    2016-01-30

    Panic attacks occurring outside of Panic Disorder are not well-understood despite their inclusion as a diagnostic specifier in the Diagnostic and Statistical Manual for Mental Disorders (DSM-5). This study compares panic attacks in the context of Panic Disorder compared to social anxiety in terms of their symptom frequency, severity, and clinical correlates. Participants (n=404) were interviewed using the Anxiety Disorders Interview Schedule (ADIS-IV-L; Brown et al., 1994), from which we analyzed interviewer ratings of panic attacks and panic attack symptoms, as well as other demographic and clinical characteristics. Panic attacks in the context of Panic Disorder were characterized by a greater number and severity of symptoms compared to panic attacks in the context of Social Anxiety Disorder, and were associated with a history of traumatization, inpatient psychiatric treatment, and benzodiazepine use. Social anxiety panic attacks were associated with reduced physical health concerns. Cognitive panic attack symptoms were more prevalent in Panic Disorder and were associated with a variety of poor clinical correlates. Panic attacks in the context of Panic Disorder are more severe than those in social anxiety, and this may be driven by cognitive disturbances during those attacks. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  18. Heart Attack Recovery FAQs

    MedlinePlus

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  19. Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment

    NASA Technical Reports Server (NTRS)

    Kebert, Alan; Barnejee, Bikramjit; Solano, Juan; Solano, Wanda

    2013-01-01

    The cloud computing environment offers malicious users the ability to spawn multiple instances of cloud nodes that are similar to virtual machines, except that they can have separate external IP addresses. In this paper we demonstrate how this ability can be exploited by an attacker to distribute his/her attack, in particular SQL injection attacks, in such a way that an intrusion detection system (IDS) could fail to identify this attack. To demonstrate this, we set up a small private cloud, established a vulnerable website in one instance, and placed an IDS within the cloud to monitor the network traffic. We found that an attacker could quite easily defeat the IDS by periodically altering its IP address. To detect such an attacker, we propose to use multi-agent plan recognition, where the multiple source IPs are considered as different agents who are mounting a collaborative attack. We show that such a formulation of this problem yields a more sophisticated approach to detecting SQL injection attacks within a cloud computing environment.

  20. Sensitivity to carbon dioxide in subjects with a single lifetime panic attack: possible clinical "bedside" predictive test for panic disorder after a first attack.

    PubMed

    Berzak, Elina; Reznik, Mila; Narsia, Oxana; Benjamin, Jonathan

    2004-01-01

    There is currently no way of knowing whether a patient who has recently had a single panic attack has incipient panic disorder. Sensitivity to carbon dioxide (CO2) is lower in healthy volunteers than in panic disorder patients. If this is also true of people who experience a single lifetime panic attack, it could be used as a prognostic test. Subjects with a single lifetime panic attack and subjects with panic disorder received an inhalation of 35% CO2. Subjects completed the panic symptoms scale (PSS), and also stated whether they considered that they had experienced an attack. None of 14 subjects with a single lifetime panic attack, compared to 7 of 17 subjects with panic disorder (P=.009), had an attack. The PSS also distinguished between the groups. The 35% CO2 challenge warrants further investigation as a predictive test after a first panic attack.

  1. Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets.

    PubMed

    DeTrano, Alexander; Karimi, Naghmeh; Karri, Ramesh; Guo, Xiaofei; Carlet, Claude; Guilley, Sylvain

    2015-01-01

    Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvolatile memory. Our attack targets AES implemented in software protected by a low entropy masking scheme and recovers the masks with 91% success rate. Recovering the secret key requires fewer power traces (in fact, by at least two orders of magnitude) compared to a classical second-order attack. Moreover, we show that this attack remains viable in a noisy environment or with a reduced number of leakage points. Eventually, we specify a method to enhance the countermeasure by selecting a suitable coset of the masks set.

  2. The effect of nursing professional pay structures and pay levels on hospitals' heart attack outcomes.

    PubMed

    Brown, Mark P

    2006-01-01

    The effect of nursing professionals (i.e., nurse aid/orderly, licensed practical nurse, registered nurse) pay structures and pay levels on hospitals risk-adjusted heart attack outcomes was determined. Operationalizing hospitals' heart attack outcomes as their thirty-day risk-adjusted mortality rates, a positive curvilinear relation is hypothesized between pay dispersion and hospitals' heart attack outcomes, whereas a direct relation is hypothesized between pay level and hospitals' heart attack outcomes. Pay level is also hypothesized as a moderator of the relation between pay dispersion and hospitals' heart attack outcomes. Using a sample of 138 California hospitals, support is not found for either the curvilinear relation between hospitals' nursing professionals pay dispersion and hospitals' heart attack outcomes, or the direct relation between nursing professionals' pay level and hospitals' heart attack outcomes. Support is found for the moderation hypothesis in which nursing professionals' pay level moderates the relation between hospitals' nursing professionals pay dispersion and hospitals' heart attack outcomes. Implications for practice are discussed in light of the study's results.

  3. Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets

    PubMed Central

    DeTrano, Alexander; Karimi, Naghmeh; Karri, Ramesh; Guo, Xiaofei; Carlet, Claude; Guilley, Sylvain

    2015-01-01

    Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvolatile memory. Our attack targets AES implemented in software protected by a low entropy masking scheme and recovers the masks with 91% success rate. Recovering the secret key requires fewer power traces (in fact, by at least two orders of magnitude) compared to a classical second-order attack. Moreover, we show that this attack remains viable in a noisy environment or with a reduced number of leakage points. Eventually, we specify a method to enhance the countermeasure by selecting a suitable coset of the masks set. PMID:26491717

  4. The Icatibant Outcome Survey: treatment of laryngeal angioedema attacks

    PubMed Central

    Aberer, Werner; Bouillet, Laurence; Caballero, Teresa; Maurer, Marcus; Fabien, Vincent; Zanichelli, Andrea

    2016-01-01

    Objective To characterize the management and outcomes of life-threatening laryngeal attacks of hereditary angioedema (HAE) treated with icatibant in the observational Icatibant Outcome Survey (NCT01034969) registry. Methods This retrospective analysis was based on data from patients with HAE type I/II who received healthcare professional-administered or self-administered icatibant to treat laryngeal attacks between September 2008 and May 2013. Results Twenty centers in seven countries contributed data. Overall, 42 patients with HAE experienced 67 icatibant-treated laryngeal attacks. Icatibant was self-administered for 62.3% of attacks (healthcare professional-administered, 37.7%). One icatibant injection was used for 87.9% of attacks, with rescue or concomitant medication used for 9.0%. The median time to treatment was 2.0 h (n=31 attacks) and the median time to resolution was 6.0 h (n=35 attacks). Conclusions This analysis describes successful use of icatibant for the treatment of laryngeal HAE attacks in a real-world setting. PMID:27116379

  5. Heart Attack

    MedlinePlus

    Each year almost 800,000 Americans have a heart attack. A heart attack happens when blood flow to the heart suddenly ... it's important to know the symptoms of a heart attack and call 9-1-1 if you or ...

  6. Microvascular Angina

    MedlinePlus

    ... to the Terms and Conditions and Privacy Policy Heart Attack Tools & Resources My Cardiac Coach What Is a ... Heart Attack Warning Signs: Patient sheet | Infographic | Quiz Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) ...

  7. Using the Domain Name System to Thwart Automated Client-Based Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Taylor, Curtis R; Shue, Craig A

    2011-09-01

    On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so.more » Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.« less

  8. Incidence and impact of dog attacks on guide dogs in the UK.

    PubMed

    Brooks, A; Moxon, R; England, G C W

    2010-06-19

    In a retrospective survey, researchers identified 100 incidents of attacks on guide dogs by other dogs. These were reviewed in order to determine the number, severity and impact on the handler and dog, and the characteristics of the aggressors and victims. During the study period there were more than three attacks reported each month, with 61 per cent of the attacks being upon dogs that were in harness and working with an owner or trainer. The majority of the dogs that were attacked were male (62 per cent), and the breeds that were over-represented (relative to their prevalence in the general guide dog population) were the labrador and the golden retriever x flat-coated retriever crossbreed. Most of the attacks occurred in public places between 09.00 and 15.00 and the majority (61 per cent) of the attacking dogs were off the lead at the time of the attack. Thirty-eight per cent of the attacking dogs were of bull breeds, which were over-represented among attackers compared with the proportion of this breed type in the general dog population. Veterinary attention was sought after 41 per cent of the attacks, and in 19 per cent of instances there was injury to the handler or to a member of the public. The attacks were reported to have affected the working performance and behaviour of the victim dog in 45 per cent of the instances, and two dogs had to be subsequently withdrawn from working as guide dogs.

  9. Robustness and structure of complex networks

    NASA Astrophysics Data System (ADS)

    Shao, Shuai

    This dissertation covers the two major parts of my PhD research on statistical physics and complex networks: i) modeling a new type of attack -- localized attack, and investigating robustness of complex networks under this type of attack; ii) discovering the clustering structure in complex networks and its influence on the robustness of coupled networks. Complex networks appear in every aspect of our daily life and are widely studied in Physics, Mathematics, Biology, and Computer Science. One important property of complex networks is their robustness under attacks, which depends crucially on the nature of attacks and the structure of the networks themselves. Previous studies have focused on two types of attack: random attack and targeted attack, which, however, are insufficient to describe many real-world damages. Here we propose a new type of attack -- localized attack, and study the robustness of complex networks under this type of attack, both analytically and via simulation. On the other hand, we also study the clustering structure in the network, and its influence on the robustness of a complex network system. In the first part, we propose a theoretical framework to study the robustness of complex networks under localized attack based on percolation theory and generating function method. We investigate the percolation properties, including the critical threshold of the phase transition pc and the size of the giant component Pinfinity. We compare localized attack with random attack and find that while random regular (RR) networks are more robust against localized attack, Erdoḧs-Renyi (ER) networks are equally robust under both types of attacks. As for scale-free (SF) networks, their robustness depends crucially on the degree exponent lambda. The simulation results show perfect agreement with theoretical predictions. We also test our model on two real-world networks: a peer-to-peer computer network and an airline network, and find that the real-world networks are much more vulnerable to localized attack compared with random attack. In the second part, we extend the tree-like generating function method to incorporating clustering structure in complex networks. We study the robustness of a complex network system, especially a network of networks (NON) with clustering structure in each network. We find that the system becomes less robust as we increase the clustering coefficient of each network. For a partially dependent network system, we also find that the influence of the clustering coefficient on network robustness decreases as we decrease the coupling strength, and the critical coupling strength qc, at which the first-order phase transition changes to second-order, increases as we increase the clustering coefficient.

  10. Phenomenology of panic attacks: a descriptive study of panic disorder patients' self-reports.

    PubMed

    Aronson, T A; Logue, C M

    1988-01-01

    The phenomenology of panic disorder and panic attacks was systematically assessed in 46 consecutive patients. The results suggest that DSM-III criteria include several symptoms that are not frequently present during a panic attack and that DSM-III's characterization of a panic attack is imprecise and misleading. Panic attacks were found to vary in intensity, frequency, spontaneity, and associated symptoms. A panic attack typically presents as a unified symptom complex of psychic anxiety and multiple somatic symptoms in multiple body systems. It occurs in a crescendolike pattern, is self-limited, and often leaves the subject weak or shaken. The temporal course as much as the symptomatic presentation defines a panic attack.

  11. Finite Energy and Bounded Attacks on Control System Sensor Signals

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M

    Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signalmore » attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.« less

  12. Multi-Layer Approach for the Detection of Selective Forwarding Attacks

    PubMed Central

    Alajmi, Naser; Elleithy, Khaled

    2015-01-01

    Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable. PMID:26610499

  13. Cougar attacks on children: injury patterns and treatment.

    PubMed

    Kadesky, K M; Manarey, C; Blair, G K; Murphy, J J; Verchere, C; Atkinson, K

    1998-06-01

    Cougar attacks on humans appear to be on the rise. A review of all attacks on children was performed to determine the method of attack and injury patterns so that a treatment regimen as well as possible preventative measures could be determined. A review of all attacks, including attacks on children, was performed, including three recent attacks treated at our institution. Situation, adult supervision, patient age, injuries recorded, survival, and mode of attack, if known, were reviewed. There were 50 documented attacks on children with a 25% fatality rate. Most children were not alone at the time of the attack (92%), and in many instances adult supervision was present or nearby. Severe head and neck lacerations along with puncture wounds were the most common injury. Examples of typical cervical injuries include a nonfatal vertebral artery injury, phrenic nerve injury, a fatal internal carotid artery injury, and a fatal cervical spine injury. The cougar was rabid in two cases. Pasteurella resulted in late infections in two patients. Based on the pattern of injuries, the authors recommend aggressive evaluation for occult cervical injuries as well as surgical debridement. Antibiotics should cover oropharyngeal flora including Pasteurella multocida. Rabies prophylaxis is indicated. Adult supervision in wilderness areas is not necessarily protective.

  14. Multi-Layer Approach for the Detection of Selective Forwarding Attacks.

    PubMed

    Alajmi, Naser; Elleithy, Khaled

    2015-11-19

    Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable.

  15. Incidence and impact of dog attacks on guide dogs in the UK: an update.

    PubMed

    Moxon, R; Whiteside, H; England, G C W

    2016-04-09

    Data on dog attacks on Guide Dogs' stock were reviewed to investigate the characteristics of the attacks. An average of 11.2 attacks occurred each month. Nearly all of the attacks occurred in public areas, 68.4 per cent of victim dogs were qualified guide dogs and 55.5 per cent of victim dogs were working in harness when they were attacked. Guide Dogs' stock were injured in 43.2 per cent of attacks and veterinary costs for attacks were estimated at £34,514.30. Over 40 per cent of qualified guide dogs' working ability was affected and >20 per cent of qualified guide dogs required some time off from working after a dog attack. Twenty dogs were permanently withdrawn from the Guide Dogs' programme as a result of dog attacks, 13 of which were qualified and working with guide dog owners at the time of the withdrawal; this resulted in a financial cost of >£600,000 to the charity. More importantly perhaps, temporary and permanent withdrawals have a significant impact upon the mobility and independence of guide dog owners and in many cases significantly impacted their emotional well-being. British Veterinary Association.

  16. Childhood internalizing and externalizing problems predict the onset of clinical panic attacks over adolescence: the TRAILS study.

    PubMed

    Mathyssek, Christina M; Olino, Thomas M; Verhulst, Frank C; van Oort, Floor V A

    2012-01-01

    Panic attacks are a source of individual suffering and are an independent risk factor for later psychopathology. However, much less is known about risk factors for the development of panic attacks, particularly during adolescence when the incidence of panic attacks increases dramatically. We examined whether internalizing and externalizing problems in childhood predict the onset of panic attacks in adolescence. This study is part of the TRacking Adolescents' Individual Lives Survey (TRAILS), a Dutch longitudinal population cohort study (N = 1,584). Internalizing and Externalizing Problems were collected using the Youth Self-Report (YSR) and the parent-report Child Behavior Checklist (CBCL) at baseline (age 10-12). At age 18-20, DSM-IV defined panic attacks since baseline were assessed with the Composite International Diagnostic Interview (CIDI). We investigated whether early adolescent Internalizing and Externalizing Problems predicted panic attacks between ages 10-20 years, using survival analysis in univariate and multivariate models. There were N = 314 (19.8%) cases who experienced at least one DSM-IV defined panic attack during adolescence and N = 18 (1.2%) who developed panic disorder during adolescence. In univariate analyses, CBCL Total Problems, Internalizing Problems and three of the eight syndrome scales predicted panic attack onset, while on the YSR all broad-band problem scales and each narrow-band syndrome scale predicted panic attack onset. In multivariate analyses, CBCL Social Problems (HR 1.19, p<.05), and YSR Thought Problems (HR 1.15, p<.05) and Social Problems (HR 1.26, p<.01) predicted panic attack onset. Risk indicators of panic attack include the wide range of internalizing and externalizing problems. Yet, when adjusted for co-occurring problem behaviors, Social Problems were the most consistent risk factor for panic attack onsets in adolescence.

  17. Countermeasures for unintentional and intentional video watermarking attacks

    NASA Astrophysics Data System (ADS)

    Deguillaume, Frederic; Csurka, Gabriela; Pun, Thierry

    2000-05-01

    These last years, the rapidly growing digital multimedia market has revealed an urgent need for effective copyright protection mechanisms. Therefore, digital audio, image and video watermarking has recently become a very active area of research, as a solution to this problem. Many important issues have been pointed out, one of them being the robustness to non-intentional and intentional attacks. This paper studies some attacks and proposes countermeasures applied to videos. General attacks are lossy copying/transcoding such as MPEG compression and digital/analog (D/A) conversion, changes of frame-rate, changes of display format, and geometrical distortions. More specific attacks are sequence edition, and statistical attacks such as averaging or collusion. Averaging attack consists of averaging locally consecutive frames to cancel the watermark. This attack works well for schemes which embed random independent marks into frames. In the collusion attack the watermark is estimated from single frames (based on image denoising), and averaged over different scenes for better accuracy. The estimated watermark is then subtracted from each frame. Collusion requires that the same mark is embedded into all frames. The proposed countermeasures first ensures robustness to general attacks by spread spectrum encoding in the frequency domain and by the use of an additional template. Secondly, a Bayesian criterion, evaluating the probability of a correctly decoded watermark, is used for rejection of outliers, and to implement an algorithm against statistical attacks. The idea is to embed randomly chosen marks among a finite set of marks, into subsequences of videos which are long enough to resist averaging attacks, but short enough to avoid collusion attacks. The Bayesian criterion is needed to select the correct mark at the decoding step. Finally, the paper presents experimental results showing the robustness of the proposed method.

  18. Unstable Angina

    MedlinePlus

    ... Women This content was last reviewed July 2015. Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) ... Recovery FAQs • Heart Attack Tools & Resources • Support Network Heart Attack Tools & Resources My Cardiac Coach What Is a ...

  19. Acute Coronary Syndrome

    MedlinePlus

    ... angina? This content was last reviewed July 2015. Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) ... Recovery FAQs • Heart Attack Tools & Resources • Support Network Heart Attack Tools & Resources My Cardiac Coach What Is a ...

  20. Analysis of characteristics associated with reinjection of icatibant: Results from the icatibant outcome survey.

    PubMed

    Longhurst, Hilary J; Aberer, Werner; Bouillet, Laurence; Caballero, Teresa; Fabien, Vincent; Zanichelli, Andrea; Maurer, Marcus

    2015-01-01

    Phase 3 icatibant trials showed that most hereditary angioedema (HAE) (C1 inhibitor deficiency) acute attacks were treated successfully with one injection of icatibant, a selective bradykinin B2 receptor antagonist. We conducted a post hoc analysis of icatibant reinjection for HAE type I and II attacks in a real-world setting by using data from the Icatibant Outcome Survey, an ongoing observational study that monitors the safety and effectiveness of icatibant treatment. Descriptive retrospective analyses of icatibant reinjection were performed on Icatibant Outcome Survey data (February 2008 to December 2012). New attacks were defined as the onset of new symptoms after full resolution of the previous attack. Potential associations between the patient and attack characteristics and reinjection were explored by using logistic regression analysis. Icatibant was administered for 652 attacks in 170 patients with HAE type I or II. Most attacks (89.1%) were treated with a single icatibant injection. For attacks that required two or three injections, the second injection was given a median of 11.0 hours after the first injection, with 90.4% of second injections administered ≥6 hours after the first injection. Time to resolution and attack duration were significantly longer for two or three injections versus one icatibant injection (p < 0.0001 and p < 0.05, respectively). Multivariate logistic regression analysis identified sex, attack severity, and laryngeal attacks as significantly correlated with reinjection (all p ≤ 0.05). These factors did not remain predictors for reinjection when two outlier patients with distinct patterns of icatibant use were excluded. In this real-world setting, most HAE attacks resolved with one icatibant injection. There was no distinct profile for patients or attacks that required reinjection when outliers with substantially different patterns of use were excluded. Because new attacks were not distinguished from the recurrence of symptoms, reinjection rates may be slightly higher than shown here. Clinical trial identifier: NCT01034969.

  1. Enhanced diffie-hellman algorithm for reliable key exchange

    NASA Astrophysics Data System (ADS)

    Aryan; Kumar, Chaithanya; Vincent, P. M. Durai Raj

    2017-11-01

    The Diffie -Hellman is one of the first public-key procedure and is a certain way of exchanging the cryptographic keys securely. This concept was introduced by Ralph Markel and it is named after Whitfield Diffie and Martin Hellman. Sender and Receiver make a common secret key in Diffie-Hellman algorithm and then they start communicating with each other over the public channel which is known to everyone. A number of internet services are secured by Diffie -Hellman. In Public key cryptosystem, the sender has to trust while receiving the public key of the receiver and vice-versa and this is the challenge of public key cryptosystem. Man-in-the-Middle attack is very much possible on the existing Diffie-Hellman algorithm. In man-in-the-middle attack, the attacker exists in the public channel, the attacker receives the public key of both sender and receiver and sends public keys to sender and receiver which is generated by his own. This is how man-in-the-middle attack is possible on Diffie-Hellman algorithm. Denial of service attack is another attack which is found common on Diffie-Hellman. In this attack, the attacker tries to stop the communication happening between sender and receiver and attacker can do this by deleting messages or by confusing the parties with miscommunication. Some more attacks like Insider attack, Outsider attack, etc are possible on Diffie-Hellman. To reduce the possibility of attacks on Diffie-Hellman algorithm, we have enhanced the Diffie-Hellman algorithm to a next level. In this paper, we are extending the Diffie -Hellman algorithm by using the concept of the Diffie -Hellman algorithm to get a stronger secret key and that secret key is further exchanged between the sender and the receiver so that for each message, a new secret shared key would be generated. The second secret key will be generated by taking primitive root of the first secret key.

  2. The panic attack-posttraumatic stress disorder model: applicability to orthostatic panic among Cambodian refugees.

    PubMed

    Hinton, Devon E; Hofmann, Stefan G; Pitman, Roger K; Pollack, Mark H; Barlow, David H

    2008-01-01

    This article examines the ability of the panic attack-posttraumatic stress disorder (PTSD) model to predict how panic attacks are generated and how panic attacks worsen PTSD. The article does so by determining the validity of the panic attack-PTSD model in respect to one type of panic attack among traumatized Cambodian refugees: orthostatic panic (OP) attacks (i.e. panic attacks generated by moving from lying or sitting to standing). Among Cambodian refugees attending a psychiatric clinic, the authors conducted two studies to explore the validity of the panic attack-PTSD model as applied to OP patients (i.e. patients with at least one episode of OP in the previous month). In Study 1, the panic attack-PTSD model accurately indicated how OP is seemingly generated: among OP patients (N = 58), orthostasis-associated flashbacks and catastrophic cognitions predicted OP severity beyond a measure of anxious-depressive distress (Symptom Checklist-90-R subscales), and OP severity significantly mediated the effect of anxious-depressive distress on Clinician-Administered PTSD Scale severity. In Study 2, as predicted by the panic attack-PTSD model, OP had a mediational role in respect to the effect of treatment on PTSD severity: among Cambodian refugees with PTSD and comorbid OP who participated in a cognitive behavioural therapy study (N = 56), improvement in PTSD severity was partially mediated by improvement in OP severity.

  3. Epileptic negative drop attacks in atypical benign partial epilepsy: a neurophysiological study.

    PubMed

    Hirano, Yoshiko; Oguni, Hirokazu; Osawa, Makiko

    2009-03-01

    We conducted a computer-assisted polygraphic analysis of drop attacks in a child with atypical benign partial epilepsy (ABPE) to investigate neurophysiological characteristics. The patient was a six-year two-month-old girl, who had started to have focal motor seizures, later combined with daily epileptic negative myoclonus (ENM) and drop attacks, causing multiple injuries. We studied episodes of ENM and drop attacks using video-polygraphic and computer-assisted back-averaging analysis. A total of 12 ENM episodes, seven involving the left arm (ENMlt) and five involving both arms (ENMbil), and five drop attacks were captured for analysis. All episodes were time-locked to spike-and-wave complexes (SWC) arising from both centro-temporo-parietal (CTP) areas. The latency between the onset of SWC and ENMlt, ENMbil, and drop attacks reached 68 ms, 42 ms, and 8 ms, respectively. The height of the spike as well as the slow-wave component of SWC for drop attacks were significantly larger than that for both ENMlt and ENMbil (p < 0.05). Drop attacks were considered to be epileptic negative myoclonus involving not only upper proximal but also axial muscles, causing the body to fall. Thus, drop attacks in ABPE are considered to be epileptic negative drop attacks arising from bilateral CTP foci and differ from drop attacks of a generalized origin seen in Lennox-Gastaut syndrome and myoclonic-astatic epilepsy.

  4. Seven Deadliest Network Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Prowell, Stacy J; Borkin, Michael; Kraus, Robert

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, findmore » out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.« less

  5. Dynamic defense and network randomization for computer systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chavez, Adrian R.; Stout, William M. S.; Hamlet, Jason R.

    The various technologies presented herein relate to determining a network attack is taking place, and further to adjust one or more network parameters such that the network becomes dynamically configured. A plurality of machine learning algorithms are configured to recognize an active attack pattern. Notification of the attack can be generated, and knowledge gained from the detected attack pattern can be utilized to improve the knowledge of the algorithms to detect a subsequent attack vector(s). Further, network settings and application communications can be dynamically randomized, wherein artificial diversity converts control systems into moving targets that help mitigate the early reconnaissancemore » stages of an attack. An attack(s) based upon a known static address(es) of a critical infrastructure network device(s) can be mitigated by the dynamic randomization. Network parameters that can be randomized include IP addresses, application port numbers, paths data packets navigate through the network, application randomization, etc.« less

  6. Automatic Inference of Cryptographic Key Length Based on Analysis of Proof Tightness

    DTIC Science & Technology

    2016-06-01

    within an attack tree structure, then expand attack tree methodology to include cryptographic reductions. We then provide the algorithms for...maintaining and automatically reasoning about these expanded attack trees . We provide a software tool that utilizes machine-readable proof and attack metadata...and the attack tree methodology to provide rapid and precise answers regarding security parameters and effective security. This eliminates the need

  7. Cyber Signal/Noise Characteristics and Sensor Models for Early Cyber Indications and Warning

    DTIC Science & Technology

    2005-09-01

    investigating and simulating attack scenarios. The sensors are, in effect , mathematical functions. These functions range from simple functions of...172 8.1.2 Examine each attack scenario or case to derive the cause- effect network for the attack scenario...threat profiles............................ 174 8.1.4 Develop attack profiles by enlarging the cause- effect network of each attack scenario with

  8. Attack Coverage in High-Level Men’s Volleyball: Organization on the Edge of Chaos?

    PubMed Central

    Laporta, Lorenzo; Nikolaidis, Pantelis; Thomas, Luke; Afonso, José

    2015-01-01

    Change is pervasive, but emerging patterns are occasionally detectable through analysis of systemic behaviors. Match analysis uses these patterns in order to reduce the degree of improvisation and to optimize the training process. However, it is possible that certain game phases elude systematic patterning. In this vein, our aim was to analyze the case of attack coverage in men’s volleyball, as we suspected it would elude systematic patterning and has received negligible attention in scientific research. We analyzed the occurrence of attack coverage in 4544 plays of the 2011 Volleyball World League. A Chi-square test with residual adjusted values was applied to explore significant associations between variables. A Monte Carlo correction was applied, as some cells had n<5. Effect sizes were determined using Cramer’s V. Overall, attack coverage occurred in 3.89% of ball possessions, and 23 distinct structures emerged. These structures lacked significant associations with the game complex, setting zone, and effect of attack coverage. Conversely, attack coverage structures showed significant associations with the attack zone and tempo, with very strong effect sizes (V=0.472 and V=0.521, respectively). As certain attack zones are deeply associated with attack tempo, it is apparent that quicker attack plays affect attack coverage structuring, promoting the formation of less complex structures. Ultimately, attack coverage structures seem to depend on momentary constraints, thereby rendering rigid systematization impracticable. Still, we contended that a principle-based approach might be suitable. This invites researchers to rethink how to interpret game regularities. PMID:26557208

  9. Cued Panic Attacks in Body Dysmorphic Disorder

    PubMed Central

    Phillips, Katharine A.; Menard, William; Bjornsson, Andri S.

    2013-01-01

    Background Body dysmorphic disorder (BDD) is a common and often severe disorder. Clinical observations suggest that panic attacks triggered by BDD symptoms may be common. However, to our knowledge, no study has examined such panic attacks in BDD. We investigated the prevalence, clinical features, and correlates of BDD-triggered panic attacks in individuals with this disorder. Methods Panic attacks and other variables were assessed using reliable and valid measures in 76 individuals with lifetime DSM-IV BDD. Results 28.9% (95% CI, 18.5%–39.4%) of participants reported lifetime panic attacks triggered by BDD symptoms. The most common triggers of such attacks were feeling that others were looking at or scrutinizing the perceived appearance defects (61.9%), looking in the mirror at perceived defects (38.1%), and being in bright light where perceived defects would be more visible (23.8%). The most common panic attack symptoms were palpitations (86.4%), sweating (66.7%), shortness of breath (63.6%), trembling or shaking (63.6%), and fear of losing control or going crazy (63.6%). Compared to participants without such panic attacks, those with BDD-triggered panic attacks had more severe lifetime BDD, social anxiety, and depressive symptoms, as well as poorer functioning and quality of life on a number of measures. They were also less likely to be employed and more likely to have been psychiatrically hospitalized and to have had suicidal ideation due to BDD. Conclusions Panic attacks triggered by BDD-related situations appear common in individuals with this disorder. BDD-triggered panic attacks were associated with greater symptom severity and morbidity. PMID:23653076

  10. Randomness determines practical security of BB84 quantum key distribution.

    PubMed

    Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2015-11-10

    Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.

  11. Attacks by jaguars (Panthera onca) on humans in central Brazil: report of three cases, with observation of a death.

    PubMed

    Neto, Manoel Francisco Campos; Garrone Neto, Domingos; Haddad, Vidal

    2011-06-01

    Conflicts between humans and big cats have been known for centuries throughout the world, but have intensified in recent decades. Recently, attacks by Panthera onca on humans in Brazil have been brought to the forefront through exposure in the press and because of the severity of the attacks. We report 3 cases of patients attacked by jaguars in provoked and predatory situations. Two patients survived the attacks and one died. Attack mechanisms and lesions in victims are discussed. The attacks demonstrate a real risk of accidents from jaguars in certain regions, such as the Pantanal and the Amazon. Copyright © 2011 Wilderness Medical Society. Published by Elsevier Inc. All rights reserved.

  12. Randomness determines practical security of BB84 quantum key distribution

    PubMed Central

    Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2015-01-01

    Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system. PMID:26552359

  13. Randomness determines practical security of BB84 quantum key distribution

    NASA Astrophysics Data System (ADS)

    Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2015-11-01

    Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.

  14. A Novel Network Attack Audit System based on Multi-Agent Technology

    NASA Astrophysics Data System (ADS)

    Jianping, Wang; Min, Chen; Xianwen, Wu

    A network attack audit system which includes network attack audit Agent, host audit Agent and management control center audit Agent is proposed. And the improved multi-agent technology is carried out in the network attack audit Agent which has achieved satisfactory audit results. The audit system in terms of network attack is just in-depth, and with the function improvement of network attack audit Agent, different attack will be better analyzed and audit. In addition, the management control center Agent should manage and analyze audit results from AA (or HA) and audit data on time. And the history files of network packets and host log data should also be audit to find deeper violations that cannot be found in real time.

  15. Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication

    NASA Astrophysics Data System (ADS)

    Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru

    In this paper, we propose password recovery attacks against challenge-response authentication protocols. Our attacks use a message difference for a MD5 collision attack proposed in IEICE 2008. First, we show how to efficiently find a message pair that collides with the above message difference. Second, we show that a password used in authenticated post office protocol (APOP) can be recovered practically. We also show that the password recovery attack can be applied to a session initiation protocol (SIP) and digest authentication. Our attack can recover up to the first 31 password characters in a short time and up to the first 60 characters faster than the naive search method. We have implemented our attack and confirmed that 31 characters can be successfully recovered.

  16. Percolation of localized attack on complex networks

    NASA Astrophysics Data System (ADS)

    Shao, Shuai; Huang, Xuqing; Stanley, H. Eugene; Havlin, Shlomo

    2015-02-01

    The robustness of complex networks against node failure and malicious attack has been of interest for decades, while most of the research has focused on random attack or hub-targeted attack. In many real-world scenarios, however, attacks are neither random nor hub-targeted, but localized, where a group of neighboring nodes in a network are attacked and fail. In this paper we develop a percolation framework to analytically and numerically study the robustness of complex networks against such localized attack. In particular, we investigate this robustness in Erdős-Rényi networks, random-regular networks, and scale-free networks. Our results provide insight into how to better protect networks, enhance cybersecurity, and facilitate the design of more robust infrastructures.

  17. Face liveness detection for face recognition based on cardiac features of skin color image

    NASA Astrophysics Data System (ADS)

    Suh, Kun Ha; Lee, Eui Chul

    2016-07-01

    With the growth of biometric technology, spoofing attacks have been emerged a threat to the security of the system. Main spoofing scenarios in the face recognition system include the printing attack, replay attack, and 3D mask attack. To prevent such attacks, techniques that evaluating liveness of the biometric data can be considered as a solution. In this paper, a novel face liveness detection method based on cardiac signal extracted from face is presented. The key point of proposed method is that the cardiac characteristic is detected in live faces but not detected in non-live faces. Experimental results showed that the proposed method can be effective way for determining printing attack or 3D mask attack.

  18. Hereditary Angioedema Attacks: Local Swelling at Multiple Sites.

    PubMed

    Hofman, Zonne L M; Relan, Anurag; Hack, C Erik

    2016-02-01

    Hereditary angioedema (HAE) patients experience recurrent local swelling in various parts of the body including painful swelling of the intestine and life-threatening laryngeal oedema. Most HAE literature is about attacks located in one anatomical site, though it is mentioned that HAE attacks may also involve multiple anatomical sites simultaneously. A detailed description of such multi-location attacks is currently lacking. This study investigated the occurrence, severity and clinical course of HAE attacks with multiple anatomical locations. HAE patients included in a clinical database of recombinant human C1-inhibitor (rhC1INH) studies were evaluated. Visual analog scale scores filled out by the patients for various symptoms at various locations and investigator symptoms scores during the attack were analysed. Data of 219 eligible attacks in 119 patients was analysed. Thirty-three patients (28%) had symptoms at multiple locations in anatomically unrelated regions at the same time during their first attack. Up to five simultaneously affected locations were reported. The observation that severe HAE attacks often affect multiple sites in the body suggests that HAE symptoms result from a systemic rather than from a local process as is currently believed.

  19. Heart Attack or Sudden Cardiac Arrest: How Are They Different?

    MedlinePlus

    ... Peripheral Artery Disease Venous Thromboembolism Aortic Aneurysm More Heart Attack or Sudden Cardiac Arrest: How Are They Different? ... and procedures related to heart disease and stroke. Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) ...

  20. Risk Management

    DTIC Science & Technology

    2011-06-02

    actively attack the risks, they will actively attack you.” -Tom Gib Why do Risk Management? 8 “The first step in the risk management process is to...opportunities to manage and improve our chances of success. - Roger Vanscoy “If you do not actively attack the risks, they will actively attack ...our risks provides opportunities to manage and improve our chances of success. - Roger Vanscoy “If you do not actively attack the risks, they will

  1. Experimental implementation of non-Gaussian attacks on a continuous-variable quantum-key-distribution system.

    PubMed

    Lodewyck, Jérôme; Debuisschert, Thierry; García-Patrón, Raúl; Tualle-Brouri, Rosa; Cerf, Nicolas J; Grangier, Philippe

    2007-01-19

    An intercept-resend attack on a continuous-variable quantum-key-distribution protocol is investigated experimentally. By varying the interception fraction, one can implement a family of attacks where the eavesdropper totally controls the channel parameters. In general, such attacks add excess noise in the channel, and may also result in non-Gaussian output distributions. We implement and characterize the measurements needed to detect these attacks, and evaluate experimentally the information rates available to the legitimate users and the eavesdropper. The results are consistent with the optimality of Gaussian attacks resulting from the security proofs.

  2. DOE Office of Scientific and Technical Information (OSTI.GOV)

    John Homer; Ashok Varikuti; Xinming Ou

    Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions. This paper presents methodologies that can 1) automatically identify portions of an attack graph that do not help a user to understand the core security problems and so can be trimmed, and 2) automatically group similar attack steps as virtual nodes in a model of the network topology, to immediately increase the understandability ofmore » the data. We believe both methods are important steps toward improving visualization of attack graphs to make them more useful in configuration management for large enterprise networks. We implemented our methods using one of the existing attack-graph toolkits. Initial experimentation shows that the proposed approaches can 1) significantly reduce the complexity of attack graphs by trimming a large portion of the graph that is not needed for a user to understand the security problem, and 2) significantly increase the accessibility and understandability of the data presented in the attack graph by clearly showing, within a generated visualization of the network topology, the number and type of potential attacks to which each host is exposed.« less

  3. On resilience studies of system detection and recovery techniques against stealthy insider attacks

    NASA Astrophysics Data System (ADS)

    Wei, Sixiao; Zhang, Hanlin; Chen, Genshe; Shen, Dan; Yu, Wei; Pham, Khanh D.; Blasch, Erik P.; Cruz, Jose B.

    2016-05-01

    With the explosive growth of network technologies, insider attacks have become a major concern to business operations that largely rely on computer networks. To better detect insider attacks that marginally manipulate network traffic over time, and to recover the system from attacks, in this paper we implement a temporal-based detection scheme using the sequential hypothesis testing technique. Two hypothetical states are considered: the null hypothesis that the collected information is from benign historical traffic and the alternative hypothesis that the network is under attack. The objective of such a detection scheme is to recognize the change within the shortest time by comparing the two defined hypotheses. In addition, once the attack is detected, a server migration-based system recovery scheme can be triggered to recover the system to the state prior to the attack. To understand mitigation of insider attacks, a multi-functional web display of the detection analysis was developed for real-time analytic. Experiments using real-world traffic traces evaluate the effectiveness of Detection System and Recovery (DeSyAR) scheme. The evaluation data validates the detection scheme based on sequential hypothesis testing and the server migration-based system recovery scheme can perform well in effectively detecting insider attacks and recovering the system under attack.

  4. Impact of Tumarkin attacks on complaints and work ability in Ménière's disease.

    PubMed

    Pyykkö, Ilmari; Manchaiah, Vinaya; Zou, Jing; Levo, Hilla; Kentala, Erna

    2018-05-22

    The purpose of the present study was to characterize the occurrence of Tumarkin attacks in patients with Ménière'sdisease (MD), and to study its association with reported complaints, severity of consequences, and also self-reported work ability. The study used a cross-sectional design. Data obtained from the Finnish Ménière Federation using an electronic survey was analyzed. 602 people with MD responded to the survey (62% response rate) with a mean age of 56.7 years and a mean duration of the disease 12.4 years. 49% of the respondents experienced Tumarkin attacks, which lasted for a few seconds to a few minutes. There were significant differences in complaints reported by MD patients with and without Tumarkin attacks. Respondents with Tumarkin attacks experienced various consequences, including tripping, falls, fear, anxiety, problems in dyadic life, and even transient loss of consciousness. Respondents with Tumarkin attacks had more frequently applied for pension than those not having Tumarkin attacks. On an average, respondents with Tumarkin attacks had less self-reported working ability when compared to those without Tumarkin attacks. The current study results suggest various differences in terms of complaints reported, severity of consequences, and the self-reported working ability in MD patients with and without Tumarkin attacks. Hearing healthcare professionals must examine Tumarkin attacks and their consequences in patients with MD during clinical examinations. In addition, the therapy should focus on alleviating the consequences and improving work ability.

  5. Netwar

    NASA Astrophysics Data System (ADS)

    Keen, Arthur A.

    2006-04-01

    This paper describes technology being developed at 21st Century Technologies to automate Computer Network Operations (CNO). CNO refers to DoD activities related to Attacking and Defending Computer Networks (CNA & CND). Next generation cyber threats are emerging in the form of powerful Internet services and tools that automate intelligence gathering, planning, testing, and surveillance. We will focus on "Search-Engine Hacks", queries that can retrieve lists of router/switch/server passwords, control panels, accessible cameras, software keys, VPN connection files, and vulnerable web applications. Examples include "Titan Rain" attacks against DoD facilities and the Santy worm, which identifies vulnerable sites by searching Google for URLs containing application-specific strings. This trend will result in increasingly sophisticated and automated intelligence-driven cyber attacks coordinated across multiple domains that are difficult to defeat or even understand with current technology. One traditional method of CNO relies on surveillance detection as an attack predictor. Unfortunately, surveillance detection is difficult because attackers can perform search engine-driven surveillance such as with Google Hacks, and avoid touching the target site. Therefore, attack observables represent only about 5% of the attacker's total attack time, and are inadequate to provide warning. In order to predict attacks and defend against them, CNO must also employ more sophisticated techniques and work to understand the attacker's Motives, Means and Opportunities (MMO). CNO must use automated reconnaissance tools, such as Google, to identify information vulnerabilities, and then utilize Internet tools to observe the intelligence gathering, planning, testing, and collaboration activities that represent 95% of the attacker's effort.

  6. Securing internet by eliminating DDOS attacks

    NASA Astrophysics Data System (ADS)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  7. Monitoring the Attack Incidences and Damage Caused by the Almond Bark Beetle, Scolytus amygdali, in Almond Orchards

    PubMed Central

    Cuthbertson, Andrew G. S.; Braham, Mohamed

    2018-01-01

    The almond bark beetle, Scolytus amygdali Geurin-Meneville, is responsible for significant loss of fruit production in almond orchards throughout the world. Here, we studied the damage and the incidences of S. amygdali attack on two different scales: (1) at the level of a single tree; and (2) in an entire orchard. Our results revealed no differences in attack level among four orientations (east, west, south and north sides) for the whole tree. However, the bark that was facing west side in the direction of the prevailing wind was found to be the most suitable for females to initiate attack in Stratum S2. Attack distribution remains the same among different strata (strata is vertical divisions of the tree from the ground to the uppermost twigs with ~40 cm intervals). More than 50% of attack was observed in the trunk of the tree and upper strata. However, multiplication rate (number of emerged adults/maternal gallery) varies significantly between strata. In addition, we studied attack intensity (holes produced by beetle per tree) comparing it to tree morphology (flowers, leaves and circumferences) and gum deposit. Our results revealed a positive correlation between attack intensity and gum deposits, and a negative correlation between attack intensity and tree morphology. This revealed that gum on the tree was an indicator for attack intensity. A positive correlation between attack intensity and the circumference of the tree revealed that older trees were more susceptible to S. amygdali attack. These results, while preliminary, aim to help in the monitoring of S. amygdali populations before deciding to apply any control measures. PMID:29301271

  8. On the IDAGAM I Combat Model.

    DTIC Science & Technology

    1977-06-01

    defense missions in locations between the FEBA and the attackers’ targets; b) AAA can attack only aircraft attacking the guns them- selves or the targets...the guns are defending; c) SAM weapon systems can attack not only aircraft attack- ing them and the targets they defend but also, although possibly...Corporation), P.E. Louer (Department of the Army) and B.R. McEnany (Joint Chiefs of Staff/Studies, Analysis and Gaming Agency) for their help- ful

  9. Terror attacks influence driving behavior in Israel

    PubMed Central

    Stecklov, Guy; Goldstein, Joshua R.

    2004-01-01

    Terror attacks in Israel produce a temporary lull in light accidents followed by a 35% spike in fatal accidents on Israeli roads 3 days after the attack. Our results are based on time-series analysis of Israeli traffic flows, accidents, and terror attacks from January 2001 through June 2002. Whereas prior studies have focused on subjective reports of posttraumatic stress, our study shows a population-level behavioral response to violent terror attacks. PMID:15448203

  10. Childhood Internalizing and Externalizing Problems Predict the Onset of Clinical Panic Attacks over Adolescence: The TRAILS Study

    PubMed Central

    Mathyssek, Christina M.; Olino, Thomas M.; Verhulst, Frank C.; van Oort, Floor V. A.

    2012-01-01

    Background Panic attacks are a source of individual suffering and are an independent risk factor for later psychopathology. However, much less is known about risk factors for the development of panic attacks, particularly during adolescence when the incidence of panic attacks increases dramatically. We examined whether internalizing and externalizing problems in childhood predict the onset of panic attacks in adolescence. Method This study is part of the TRacking Adolescents’ Individual Lives Survey (TRAILS), a Dutch longitudinal population cohort study (N = 1,584). Internalizing and Externalizing Problems were collected using the Youth Self-Report (YSR) and the parent-report Child Behavior Checklist (CBCL) at baseline (age 10–12). At age 18–20, DSM-IV defined panic attacks since baseline were assessed with the Composite International Diagnostic Interview (CIDI). We investigated whether early adolescent Internalizing and Externalizing Problems predicted panic attacks between ages 10–20 years, using survival analysis in univariate and multivariate models. Results There were N = 314 (19.8%) cases who experienced at least one DSM-IV defined panic attack during adolescence and N = 18 (1.2%) who developed panic disorder during adolescence. In univariate analyses, CBCL Total Problems, Internalizing Problems and three of the eight syndrome scales predicted panic attack onset, while on the YSR all broad-band problem scales and each narrow-band syndrome scale predicted panic attack onset. In multivariate analyses, CBCL Social Problems (HR 1.19, p<.05), and YSR Thought Problems (HR 1.15, p<.05) and Social Problems (HR 1.26, p<.01) predicted panic attack onset. Conclusion Risk indicators of panic attack include the wide range of internalizing and externalizing problems. Yet, when adjusted for co-occurring problem behaviors, Social Problems were the most consistent risk factor for panic attack onsets in adolescence. PMID:23251576

  11. Effectiveness of icatibant for treatment of hereditary angioedema attacks is not affected by body weight: findings from the Icatibant Outcome Survey, a cohort observational study.

    PubMed

    Caballero, Teresa; Zanichelli, Andrea; Aberer, Werner; Maurer, Marcus; Longhurst, Hilary J; Bouillet, Laurence; Andresen, Irmgard

    2018-01-01

    Icatibant is a bradykinin B2-receptor antagonist used for the treatment of hereditary angioedema attacks resulting from C1-inhibitor deficiency. Treatment is not adjusted by body weight however the impact of body mass index (BMI) on the effectiveness of icatibant is not documented in the literature. We examined disease characteristics and icatibant treatment effectiveness in patients stratified by BMI in the Icatibant Outcome Survey, an ongoing, international, observational study monitoring the real-world safety and effectiveness of icatibant. Attack and treatment characteristics as well as outcomes following treatment with icatibant were compared among patients with underweight, normal, overweight, and obese BMI. Data from 2697 icatibant-treated attacks in 342 patients (3.5, 44.7, 34.8, and 17.0% patients of underweight, normal, overweight, and obese BMI, respectively) were analyzed. There was no significant difference in the frequency and severity of attacks across BMI groups, although obese patients tended to have more attacks of high severity. There was no impact of BMI on the frequency of laryngeal attacks, but patients with normal BMI had fewer cutaneous attacks and more abdominal attacks. Most attacks (71.9-83.8%) were treated with a single icatibant injection without the need for rescue with plasma-derived C1-inhibitor (pdC1-INH), regardless of BMI. Patients with obese BMI used pdC1-INH as rescue treatment more often (P < 0.0001; P = 0.0232 excluding 2 outliers) and treated attacks earlier than patients with normal BMI (P = 0.007). Furthermore, time to resolution and duration of attack were shorter for patients with high BMI (P < 0.001 for overweight and P < 0.05 for obese versus normal). Overall, icatibant was comparatively effective in treating attacks in patients across all BMI groups. Trial registration NCT01034969.

  12. Somatic panic-attack equivalents in a community sample of Rwandan widows who survived the 1994 genocide

    PubMed Central

    Hagengimana, Athanase; Hinton, Devon; Bird, Bruce; Pollack, Mark; Pitman, Roger K.

    2009-01-01

    The present study is the first to attempt to determine rates of panic attacks, especially ‘somatically focused’ panic attacks, panic disorder, symptoms of post-traumatic stress disorder (PTSD), and depression levels in a population of Rwandans traumatized by the 1994 genocide. The following measures were utilized: the Rwandan Panic-Disorder Survey (RPDS); the Beck Depression Inventory (BDI); the Harvard Trauma Questionnaire (HTQ); and the PTSD Checklist (PCL). Forty of 100 Rwandan widows suffered somatically focused panic attacks during the previous 4 weeks. Thirty-five (87%) of those having panic attacks suffered panic disorder, making the rate of panic disorder for the entire sample 35%. Rwandan widows with panic attacks had greater psychopathology on all measures. Somatically focused panic-attack subtypes seem to constitute a key response to trauma in the Rwandan population. Future studies of traumatized non-Western populations should carefully assess not only somatoform disorder but also somatically focused panic attacks. PMID:12581815

  13. Sub-threshold panic attacks and agoraphobic avoidance increase comorbidity of mental disorders: results from an adult general population sample.

    PubMed

    Pané-Farré, Christiane A; Fenske, Kristin; Stender, Jan P; Meyer, Christian; John, Ulrich; Rumpf, Hans-Jürgen; Hapke, Ulfert; Hamm, Alfons O

    2013-06-01

    Full-blown panic attacks are frequently associated with other mental disorders. Most comorbidity analyses did not discriminate between isolated panic attacks vs. panic attacks that occurred in the context of a panic disorder and rarely evaluated the impact of comorbid agoraphobia. Moreover, there are no larger scale epidemiological studies regarding the influence of sub-threshold panic attacks. 4075 German-speaking respondents aged 18-64 were interviewed using the fully structured Munich Composite International Diagnostic Interview. Limited symptom attacks, isolated panic attacks, and panic disorder were associated with other lifetime DSM-IV disorders with monotonically increasing odds and increasing tendency for multiple comorbidities across the three groups. The presence of agoraphobia was associated with more frequent comorbidity in all panic subgroups and also in persons who never experienced panic attacks. The present study suggests that populations with isolated or limited symptom should be carefully attended to in clinical practice, especially if agoraphobia is present. Copyright © 2013 Elsevier Ltd. All rights reserved.

  14. A Game Theoretical Approach to Hacktivism: Is Attack Likelihood a Product of Risks and Payoffs?

    PubMed

    Bodford, Jessica E; Kwan, Virginia S Y

    2018-02-01

    The current study examines hacktivism (i.e., hacking to convey a moral, ethical, or social justice message) through a general game theoretic framework-that is, as a product of costs and benefits. Given the inherent risk of carrying out a hacktivist attack (e.g., legal action, imprisonment), it would be rational for the user to weigh these risks against perceived benefits of carrying out the attack. As such, we examined computer science students' estimations of risks, payoffs, and attack likelihood through a game theoretic design. Furthermore, this study aims at constructing a descriptive profile of potential hacktivists, exploring two predicted covariates of attack decision making, namely, peer prevalence of hacking and sex differences. Contrary to expectations, results suggest that participants' estimations of attack likelihood stemmed solely from expected payoffs, rather than subjective risks. Peer prevalence significantly predicted increased payoffs and attack likelihood, suggesting an underlying descriptive norm in social networks. Notably, we observed no sex differences in the decision to attack, nor in the factors predicting attack likelihood. Implications for policymakers and the understanding and prevention of hacktivism are discussed, as are the possible ramifications of widely communicated payoffs over potential risks in hacking communities.

  15. Sequential defense against random and intentional attacks in complex networks.

    PubMed

    Chen, Pin-Yu; Cheng, Shin-Ming

    2015-02-01

    Network robustness against attacks is one of the most fundamental researches in network science as it is closely associated with the reliability and functionality of various networking paradigms. However, despite the study on intrinsic topological vulnerabilities to node removals, little is known on the network robustness when network defense mechanisms are implemented, especially for networked engineering systems equipped with detection capabilities. In this paper, a sequential defense mechanism is first proposed in complex networks for attack inference and vulnerability assessment, where the data fusion center sequentially infers the presence of an attack based on the binary attack status reported from the nodes in the network. The network robustness is evaluated in terms of the ability to identify the attack prior to network disruption under two major attack schemes, i.e., random and intentional attacks. We provide a parametric plug-in model for performance evaluation on the proposed mechanism and validate its effectiveness and reliability via canonical complex network models and real-world large-scale network topology. The results show that the sequential defense mechanism greatly improves the network robustness and mitigates the possibility of network disruption by acquiring limited attack status information from a small subset of nodes in the network.

  16. Induction of panic attack by stimulation of the ventromedial hypothalamus.

    PubMed

    Wilent, W Bryan; Oh, Michael Y; Buetefisch, Cathrin M; Bailes, Julian E; Cantella, Diane; Angle, Cindy; Whiting, Donald M

    2010-06-01

    Panic attacks are sudden debilitating attacks of intense distress often accompanied by physical symptoms such as shortness of breath and heart palpitations. Numerous brain regions, hormones, and neurotransmitter systems are putatively involved, but the etiology and neurocircuitry of panic attacks is far from established. One particular brain region of interest is the ventromedial hypothalamus (VMH). In cats and rats, electrical stimulation delivered to the VMH has been shown to evoke an emotional "panic attack-like" escape behavior, and in humans, stimulation targeting nuclei just posterior or anterior to the VMH has reportedly induced panic attacks. The authors report findings obtained in an awake patient undergoing bilateral implantation of deep brain stimulation electrodes into the hypothalamus that strongly implicates the VMH as being critically involved in the genesis of panic attacks. First, as the stimulating electrode progressed deeper into the VMH, the intensity of stimulation required to evoke an attack systematically decreased; second, while stimulation of the VMH in either hemisphere evoked panic, stimulation that appeared to be in the center of the VMH was more potent. Thus, this evidence supports the role of the VMH in the induction of panic attacks purported by animal studies.

  17. Random Visitor: Defense against Identity Attacks in P2P Networks

    NASA Astrophysics Data System (ADS)

    Gu, Jabeom; Nah, Jaehoon; Kwon, Hyeokchan; Jang, Jonsoo; Park, Sehyun

    Various advantages of cooperative peer-to-peer networks are strongly counterbalanced by the open nature of a distributed, serverless network. In such networks, it is relatively easy for an attacker to launch various attacks such as misrouting, corrupting, or dropping messages as a result of a successful identifier forgery. The impact of an identifier forgery is particularly severe because the whole network can be compromised by attacks such as Sybil or Eclipse. In this paper, we present an identifier authentication mechanism called random visitor, which uses one or more randomly selected peers as delegates of identity proof. Our scheme uses identity-based cryptography and identity ownership proof mechanisms collectively to create multiple, cryptographically protected indirect bindings between two peers, instantly when needed, through the delegates. Because of these bindings, an attacker cannot achieve an identifier forgery related attack against interacting peers without breaking the bindings. Therefore, our mechanism limits the possibility of identifier forgery attacks efficiently by disabling an attacker's ability to break the binding. The design rationale and framework details are presented. A security analysis shows that our scheme is strong enough against identifier related attacks and that the strength increases if there are many peers (more than several thousand) in the network.

  18. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method.

    PubMed

    Dhamodharan, Udaya Suriya Raj Kumar; Vayanaperumal, Rajamani

    2015-01-01

    Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method) with MAP (message authentication and passing) for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting.

  19. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method

    PubMed Central

    Dhamodharan, Udaya Suriya Raj Kumar; Vayanaperumal, Rajamani

    2015-01-01

    Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method) with MAP (message authentication and passing) for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting. PMID:26236773

  20. Attack Detection in Sensor Network Target Localization Systems With Quantized Data

    NASA Astrophysics Data System (ADS)

    Zhang, Jiangfan; Wang, Xiaodong; Blum, Rick S.; Kaplan, Lance M.

    2018-04-01

    We consider a sensor network focused on target localization, where sensors measure the signal strength emitted from the target. Each measurement is quantized to one bit and sent to the fusion center. A general attack is considered at some sensors that attempts to cause the fusion center to produce an inaccurate estimation of the target location with a large mean-square-error. The attack is a combination of man-in-the-middle, hacking, and spoofing attacks that can effectively change both signals going into and coming out of the sensor nodes in a realistic manner. We show that the essential effect of attacks is to alter the estimated distance between the target and each attacked sensor to a different extent, giving rise to a geometric inconsistency among the attacked and unattacked sensors. Hence, with the help of two secure sensors, a class of detectors are proposed to detect the attacked sensors by scrutinizing the existence of the geometric inconsistency. We show that the false alarm and miss probabilities of the proposed detectors decrease exponentially as the number of measurement samples increases, which implies that for sufficiently large number of samples, the proposed detectors can identify the attacked and unattacked sensors with any required accuracy.

  1. 39 CFR 501.11 - Reporting Postage Evidencing System security weaknesses.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... any repeatable deviation from normal Postage Evidencing System performance. (3) Cyber attacks that... misappropriating assets or sensitive information, corrupting data, or causing operational disruption. Cyber attacks... causing denial-of-service attacks on Web sites. Cyber attacks may be carried out by third parties or...

  2. 39 CFR 501.11 - Reporting Postage Evidencing System security weaknesses.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... any repeatable deviation from normal Postage Evidencing System performance. (3) Cyber attacks that... misappropriating assets or sensitive information, corrupting data, or causing operational disruption. Cyber attacks... causing denial-of-service attacks on Web sites. Cyber attacks may be carried out by third parties or...

  3. 39 CFR 501.11 - Reporting Postage Evidencing System security weaknesses.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... any repeatable deviation from normal Postage Evidencing System performance. (3) Cyber attacks that... misappropriating assets or sensitive information, corrupting data, or causing operational disruption. Cyber attacks... causing denial-of-service attacks on Web sites. Cyber attacks may be carried out by third parties or...

  4. Sustaining U.S. Nuclear Submarine Design Capabilities

    DTIC Science & Technology

    2007-01-01

    lost learning because there is an inherent novelty to each succeeding design effort, but on the other hand, higher 2 Note there is a unique “do...Nautilus 1 1954 Attack Seawolf 1 1957 Attack Skate 4 1958–1959 Attack Skipjack 6 1959–1961 Attack Triton 1 1959 Attack George Washington 5 1960–1962...development, electric motors and controls development, or equipment acoustic analysis (listed to the right of the pyramid). All of these skills have some

  5. National Counterterrorism Center: 2007 Report on Terrorism

    DTIC Science & Technology

    2008-04-30

    Approximately one half of the attacks in the NCTC database involve no loss of life. An attack that damages a pipeline and a car bomb attack that kills 100...rose by about 30 percent and 20 percent, respectively. Overall, suicide bombing attacks rose by about 50 percent and suicide car bombings about 40...January 2007, in Nukhaib, Al Anbar, Iraq, armed assailants in three cars attacked two buses transporting Shiite pilgrims back from the Hajj in Mecca to Al

  6. Combating Paramilitary Terrorism on the Homefront: An Examination of Capabilities and Limitations of U.S. Response Forces

    DTIC Science & Technology

    2015-12-01

    paramilitary methods with devastating results. This thesis examines the paramilitary terrorist attacks that occurred in Beslan in 2004 and in Mumbai in...paramilitary attack to be established. 14. SUBJECT TERMS paramilitary terrorism, North Hollywood shootout, Mumbai attack, Beslan school attack, posse...paramilitary terrorist attacks that occurred in Beslan in 2004 and in Mumbai in 2008 in an attempt to understand the threat and to establish the criteria for

  7. US Army Attack Aviation in a Decisive Action Environment: History, Doctrine, and a Need for Doctrinal Refinement

    DTIC Science & Technology

    2015-05-23

    flight. The design used the engine, transmission, and rotor system of the UH-1 design. In doing so, Bell helicopters publicly declared that the Cobra...Public Release; Distribution is Unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT The attack helicopter airframe and role evolved slowly, over time, to...attack helicopter doctrine, heavily influenced by the Global War on Terror and the 11th Attack Helicopter Regiment’s disastrous deep attack during

  8. Attack rates of Sirex noctilio and patterns of pine tree defenses and mortality in northern Patagonia.

    PubMed

    Martinson, S J; Fernádez Ajó, A A; Martínez, A S; Krivak-Tetley, F E; Villacide, J M; Ayres, M P; Corley, J C

    2018-04-18

    Accidental and intentional global movement of species has increased the frequency of novel plant-insect interactions. In Patagonia, the European woodwasp, Sirex noctilio, has invaded commercial plantations of North American pines. We compared the patterns of resin defenses and S. noctilio-caused mortality at two mixed-species forests near San Carlos de Bariloche, Argentina. We observed lower levels of resin flow and higher levels of mortality in Pinus contorta compared with Pinus ponderosa. In general, S. noctilio attacked trees with lower resin compared with neighboring trees. Resin production in P. ponderosa was not related to growth rates, but for P. contorta, slower growing trees produced less resin than faster growing conspecifics. For all infested trees, attack density and number of drills (ovipositor probes) per attack did not vary with resin production. Most attacks resulted in one or two drills. Attack rates and drills/attack were basically uniform across the bole of the tree except for a decrease in both drills/attack and attack density in the upper portion of the crown, and an increase in the attack density for the bottom 10% of the tree. Planted pines in Patagonia grow faster than their counterparts in North America, and produce less resin, consistent with the growth-differentiation balance hypothesis. Limited resin defenses may help to explain the high susceptibility of P. contorta to woodwasps in Patagonia.

  9. Management of children and young people (CYP) with asthma: a clinical audit report.

    PubMed

    Levy, Mark L; Ward, Angela; Nelson, Sara

    2018-05-21

    An asthma attack or exacerbation signals treatment failure. Most attacks are preventable and failure to recognize risk of asthma attacks are well recognized as risk factors for future attacks and even death. Of the 19 recommendations made by the United Kingdom National Review of Asthma Deaths (NRAD) (1) only one has been partially implemented-a National Asthma Audit; however, this hasn't reported yet. The Harrow Clinical Commissioning Group (CCG) in London implemented a clinical asthma audit on 291 children and young people aged under 19 years (CYP) who had been treated for asthma attacks in 2016. This was funded as a Local Incentive Scheme (LIS) aimed at improving quality health care delivery. Two years after the publication of the NRAD report it is surprising that risks for future attacks were not recognized, that few patients were assessed objectively during attacks and only 10% of attacks were followed up within 2 days. However, it is encouraging that CYP hospital admissions following the audit were reduced by 16%, with clear benefit for patients, their families and the local health economy. This audit has provided an example of how clinicians can focus learning on patients who have had asthma attacks and utilize these events as a catalyst for active reflection in particular on modifiable risk factors. Through identification of these risks and active optimization of management, preventable asthma attacks could become 'never events'.

  10. Alligator attacks in southwest Florida.

    PubMed

    Harding, Brett E; Wolf, Barbara C

    2006-05-01

    The American alligator inhabits bodies of fresh water in Florida and other southeastern states. Although attacks on pets are frequent, alligator attacks on humans are relatively rare because of the animal's natural fear of man. Because of the rarity of attacks on humans, the pathologic findings and pathophysiology of death in such cases have not been well characterized in the literature. We report three cases of fatal alligator attacks that occurred in southwest Florida, each with different pathologic findings and mechanisms of death. Although the cause of death in each case was attributed to the alligator attack, the mechanisms of death differed and included exsanguination because of amputation of an extremity, overwhelming sepsis, and drowning. These cases illustrate the varied pathophysiologies associated with deaths due to alligator attacks on humans and the features that distinguish alligator bites from those of other aquatic predators.

  11. A closer look at the relationships between panic attacks, emergency department visits and non-cardiac chest pain.

    PubMed

    Foldes-Busque, Guillaume; Denis, Isabelle; Poitras, Julien; Fleet, Richard P; Archambault, Patrick; Dionne, Clermont E

    2017-01-01

    This study examined the prevalence of emergency department visits prompted by panic attacks in patients with non-cardiac chest pain. A validated structured telephone interview was used to assess panic attacks and their association with the emergency department consultation in 1327 emergency department patients with non-cardiac chest pain. Patients reported at least one panic attack in the past 6 months in 34.5 per cent (95% confidence interval: 32.0%-37.1%) of cases, and 77.1 per cent (95% confidence interval: 73.0%-80.7%) of patients who reported panic attacks had visited the emergency department with non-cardiac chest pain following a panic attack. These results indicate that panic attacks may explain a significant proportion of emergency department visits for non-cardiac chest pain.

  12. Develop a solution for protecting and securing enterprise networks from malicious attacks

    NASA Astrophysics Data System (ADS)

    Kamuru, Harshitha; Nijim, Mais

    2014-05-01

    In the world of computer and network security, there are myriad ways to launch an attack, which, from the perspective of a network, can usually be defined as "traffic that has huge malicious intent." Firewall acts as one of the measure in order to secure the device from incoming unauthorized data. There are infinite number of computer attacks that no firewall can prevent, such as those executed locally on the machine by a malicious user. From the network's perspective, there are numerous types of attack. All the attacks that degrade the effectiveness of data can be grouped into two types: brute force and precision. The Firewall that belongs to Juniper has the capability to protect against both types of attack. Denial of Service (DoS) attacks are one of the most well-known network security threats under brute force attacks, which is largely due to the high-profile way in which they can affect networks. Over the years, some of the largest, most respected Internet sites have been effectively taken offline by Denial of Service (DOS) attacks. A DoS attack typically has a singular focus, namely, to cause the services running on a particular host or network to become unavailable. Some DoS attacks exploit vulnerabilities in an operating system and cause it to crash, such as the infamous Win nuke attack. Others submerge a network or device with traffic so that there are no more resources to handle legitimate traffic. Precision attacks typically involve multiple phases and often involves a bit more thought than brute force attacks, all the way from reconnaissance to machine ownership. Before a precision attack is launched, information about the victim needs to be gathered. This information gathering typically takes the form of various types of scans to determine available hosts, networks, and ports. The hosts available on a network can be determined by ping sweeps. The available ports on a machine can be located by port scans. Screens cover a wide variety of attack traffic as they are configured on a per-zone basis. Depending on the type of screen being configured, there may be additional settings beyond simply blocking the traffic. Attack prevention is also a native function of any firewall. Juniper Firewall handles traffic on a per-flow basis. We can use flows or sessions as a way to determine whether traffic attempting to traverse the firewall is legitimate. We control the state-checking components resident in Juniper Firewall by configuring "flow" settings. These settings allow you to configure state checking for various conditions on the device. You can use flow settings to protect against TCP hijacking, and to generally ensure that the fire-wall is performing full state processing when desired. We take a case study of attack on a network and perform study of the detection of the malicious packets on a Net screen Firewall. A new solution for securing enterprise networks will be developed here.

  13. Percolation Features on Climate Network under Attacks of El Niño Events

    NASA Astrophysics Data System (ADS)

    Lu, Z.

    2015-12-01

    Percolation theory under different attacks is one of the main research areas in complex networks but never be applied to investigate climate network. In this study, for the first time we construct a climate network of surface air temperature field to analyze its percolation features. Here, we regard El Niño event as a kind of naturally attacks generated from Pacific Ocean to attack its upper climate network. We find that El Niño event leads an abrupt percolation phase transition to the climate network which makes it splitting and unstable suddenly. Comparing the results of the climate network under three different forms of attacks, including most connected attack (MA), localized attack (LA) and random attack (RA) respectively, it is found that both MA and LA lead first-order transition and RA leads second-order transition to the climate network. Furthermore, we find that most real attacks consist of all these three forms of attacks. With El Niño event emerging, the ratios of LA and MA increase and dominate the style of attack while RA decreasing. It means the percolation phase transition due to El Niño events is close to first-order transition mostly affected by LA and MA. Our research may help us further understand two questions from perspective of percolation on network: (1) Why not all warming in Pacific Ocean but El Niño events could affect the climate. (2) Why the climate affected by El Niño events changes abruptly.

  14. Symptom Induction and De-escalation in the Treatment of Panic Attacks.

    ERIC Educational Resources Information Center

    Dattilio, Frank M.

    1990-01-01

    Describes technique known as symptom induction and de-escalation for panic attacks in which goal is to reproduce the type of situation that may precipitate an attack and then to show the client how the attacks can be "turned on" as well as "turned off." (ABL)

  15. Don't Take a Chance with a Heart Attack: Know the Facts and Act Fast

    MedlinePlus

    heart attack Know the symptoms. Take action. call Don’t Take a Chance With a Heart Attack: Know the Facts and Act Fast “ One evening ... didn’t think I could be having a heart attack. I didn’t expect it to happen to ...

  16. Learn What a Heart Attack Feels Like--It Could Save Your Life

    MedlinePlus

    Learn What a Heart Attack Feels Like— It Could Save Your Life. This fact sheet tells you about heart attack signs. It also tells you what to ... heart attack warning signs. Your chest hurts or feels squeezed. One or both arms, your back, shoulders, ...

  17. Case report: Pig attack with successful postexposure prophylaxis management.

    PubMed

    Hall, A Brad; Smith, David; Palmer, Jillian

    2014-05-01

    The domesticated pig or boar is ubiquitous to agriculture around the world and is an important food product in most countries. The males that are able to grow tusks that can approach 5 in are the primary contributor to morbidity and mortality from boar attacks. Literature surrounding domesticated boar attacks is sparse. There are no published cases of domesticated boar attacks that describe successful bacterial postexposure prophylaxis. We present a case report of an attack on an adult female by a domesticated boar.

  18. Cougar attacks on humans: a case report.

    PubMed

    McKee, Denise

    2003-01-01

    Cougar attacks on humans are increasing. Presented is a case report of a nonfatal 2-year-old male cougar attack on an 8-year-old girl in British Columbia. Discussions of wound management, rabies postexposure prophylaxis (RPEP), and the possible psychologic ramifications of such an attack are presented. Also reviewed are recommendations on actions that may be helpful in preventing an attack following a sudden encounter with a cougar. Humans must learn to coexist with cougars, which present a small but real threat to people.

  19. Epidemics of panic during a bioterrorist attack--a mathematical model.

    PubMed

    Radosavljevic, Vladan; Radunovic, Desanka; Belojevic, Goran

    2009-09-01

    A bioterrorist attacks usually cause epidemics of panic in a targeted population. We have presented epidemiologic aspect of this phenomenon as a three-component model--host, information on an attack and social network. We have proposed a mathematical model of panic and counter-measures as the function of time in a population exposed to a bioterrorist attack. The model comprises ordinary differential equations and graphically presented combinations of the equations parameters. Clinically, we have presented a model through a sequence of psychic conditions and disorders initiated by an act of bioterrorism. This model might be helpful for an attacked community to timely and properly apply counter-measures and to minimize human mental suffering during a bioterrorist attack.

  20. Framework and methodology for supply chain lifecycle analytics

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hamlet, Jason; Eames, Brandon K.; Kao, Gio K.

    The various technologies presented herein relate to pertaining to identifying and mitigating risks and attacks on a supply chain. A computer-implemented representation of a supply chain is generated comprising nodes (locations) and edges (objects, information). Risk to attack and different attack vectors can be defined for the various nodes and edges, and further, based upon the risks and attacks, (difficulty, consequence) pairs can be determined. One or more mitigations can be generated to increase a difficulty of attack and/or reduce consequence of an attack. The one or more mitigations can be constrained, e.g., by cost, time, etc., to facilitate determinationmore » of how feasible a respective mitigation is to implement with regard to finances available, duration to implement, etc. A context-free grammar can be utilized to identify one or more attacks in the supply chain. Further, the risks can undergo a ranking to enable mitigation priority to be determined.« less

  1. Wind-tunnel investigation of the flow correction for a model-mounted angle of attack sensor at angles of attack from -10 deg to 110 deg. [Langley 12-foot low speed wind tunnel test

    NASA Technical Reports Server (NTRS)

    Moul, T. M.

    1979-01-01

    A preliminary wind tunnel investigation was undertaken to determine the flow correction for a vane angle of attack sensor over an angle of attack range from -10 deg to 110 deg. The sensor was mounted ahead of the wing on a 1/5 scale model of a general aviation airplane. It was shown that the flow correction was substantial, reaching about 15 deg at an angle of attack of 90 deg. The flow correction was found to increase as the sensor was moved closer to the wing or closer to the fuselage. The experimentally determined slope of the flow correction versus the measured angle of attack below the stall angle of attack agreed closely with the slope of flight data from a similar full scale airplane.

  2. Modeling and Managing Risk in Billing Infrastructures

    NASA Astrophysics Data System (ADS)

    Baiardi, Fabrizio; Telmon, Claudio; Sgandurra, Daniele

    This paper discusses risk modeling and risk management in information and communications technology (ICT) systems for which the attack impact distribution is heavy tailed (e.g., power law distribution) and the average risk is unbounded. Systems with these properties include billing infrastructures used to charge customers for services they access. Attacks against billing infrastructures can be classified as peripheral attacks and backbone attacks. The goal of a peripheral attack is to tamper with user bills; a backbone attack seeks to seize control of the billing infrastructure. The probability distribution of the overall impact of an attack on a billing infrastructure also has a heavy-tailed curve. This implies that the probability of a massive impact cannot be ignored and that the average impact may be unbounded - thus, even the most expensive countermeasures would be cost effective. Consequently, the only strategy for managing risk is to increase the resilience of the infrastructure by employing redundant components.

  3. Attack-tolerant networked control system: an approach for detection the controller stealthy hijacking attack

    NASA Astrophysics Data System (ADS)

    Atta Yaseen, Amer; Bayart, Mireille

    2017-01-01

    In this work, a new approach will be introduced as a development for the attack-tolerant scheme in the Networked Control System (NCS). The objective is to be able to detect an attack such as the Stuxnet case where the controller is reprogrammed and hijacked. Besides the ability to detect the stealthy controller hijacking attack, the advantage of this approach is that there is no need for a priori mathematical model of the controller. In order to implement the proposed scheme, a specific detector for the controller hijacking attack is designed. The performance of this scheme is evaluated be connected the detector to NCS with basic security elements such as Data Encryption Standard (DES), Message Digest (MD5), and timestamp. The detector is tested along with networked PI controller under stealthy hijacking attack. The test results of the proposed method show that the hijacked controller can be significantly detected and recovered.

  4. Mental health service use among American Red Cross disaster workers responding to the September 11, 2001 U.S. terrorist attacks.

    PubMed

    Elhai, Jon D; Jacobs, Gerard A; Kashdan, Todd B; DeJong, Gary L; Meyer, David L; Frueh, B Christopher

    2006-06-30

    In this article, we explored 1) the extent of mental health (MH) service use by American Red Cross disaster relief workers, both before (lifetime) and 1 year after the September 11, 2001 terrorist attacks, and 2) demographic, disaster and MH variables predicting (1-year) post-September 11 MH service use in this population. A sample of 3015 Red Cross disaster workers was surveyed 1 year after the attacks, regarding demographic characteristics, MH service use before and since the attacks, and posttraumatic stress disorder (PTSD) symptoms. Findings revealed that while 13.5% used MH services before the attacks, 10.7% used services after. Variables increasing the likelihood of MH service use after the attacks included the following: no previous MH treatment, younger age, being divorced/widowed, and higher PTSD intrusion or hyperarousal symptoms. Findings support other recent research on MH service use after the September 11 attacks.

  5. Monitoring of continuous-variable quantum key distribution system in real environment.

    PubMed

    Liu, Weiqi; Peng, Jinye; Huang, Peng; Huang, Duan; Zeng, Guihua

    2017-08-07

    How to guarantee the practical security of continuous-variable quantum key distribution (CVQKD) system has been an important issue in the quantum cryptography applications. In contrast to the previous practical security strategies, which focus on the intercept-resend attack or the Gaussian attack, we investigate the practical security strategy based on a general attack, i.e., an arbitrated individual attack or collective attack on the system by Eve in this paper. The low bound of intensity disturbance of the local oscillator signal for eavesdropper successfully concealing herself is obtained, considering all noises can be used by Eve in the practical environment. Furthermore, we obtain an optimal monitoring condition for the practical CVQKD system so that legitimate communicators can monitor the general attack in real-time. As examples, practical security of two special systems, i.e., the Gaussian modulated coherent state CVQKD system and the middle-based CVQKD system, are investigated under the intercept-resend attacks.

  6. An analysis of influenza outbreaks in institutions and enclosed societies.

    PubMed

    Finnie, T J R; Copley, V R; Hall, I M; Leach, S

    2014-01-01

    This paper considers the reported attack ratio arising from outbreaks of influenza in enclosed societies. These societies are isolated from the wider community and have greater opportunities for contact between members which would aid the spread of disease. While the particular kind of society (prison, care home, school, barracks, etc.) was not a significant factor in an adjusted model of attack ratio, a person's occupation within the society was. In particular, children and military personnel suffer a greater attack ratio than other occupational types (staff, prisoners, etc.). There was no temporal trend in final attack ratio nor, with the exception of 1918, do pandemic years show abnormal attack ratios. We also observed that as community size increases, the attack ratio undergoes steep nonlinear decline. This statistical analysis draws attention to how the organization of such societies, their size and the occupations of individuals within them affect the final attack ratio.

  7. Analysis of Network Vulnerability Under Joint Node and Link Attacks

    NASA Astrophysics Data System (ADS)

    Li, Yongcheng; Liu, Shumei; Yu, Yao; Cao, Ting

    2018-03-01

    The security problem of computer network system is becoming more and more serious. The fundamental reason is that there are security vulnerabilities in the network system. Therefore, it’s very important to identify and reduce or eliminate these vulnerabilities before they are attacked. In this paper, we are interested in joint node and link attacks and propose a vulnerability evaluation method based on the overall connectivity of the network to defense this attack. Especially, we analyze the attack cost problem from the attackers’ perspective. The purpose is to find the set of least costs for joint links and nodes, and their deletion will lead to serious network connection damage. The simulation results show that the vulnerable elements obtained from the proposed method are more suitable for the attacking idea of the malicious persons in joint node and link attack. It is easy to find that the proposed method has more realistic protection significance.

  8. On Mitigating Distributed Denial of Service Attacks

    ERIC Educational Resources Information Center

    Gao, Zhiqiang

    2006-01-01

    Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…

  9. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    ERIC Educational Resources Information Center

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  10. 77 FR 61433 - Applications and Amendments to Facility Operating Licenses and Combined Licenses Involving...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-09

    ... attacks up to and including the design basis cyber attack threat, thereby achieving high assurance that... provide assurance that safety-related SSCs are protected from cyber attacks. Implementation of 10 CFR 73... of ``high assurance of adequate protection against cyber attacks.'' The proposed revision would not...

  11. Do attacks by jaguars Panthera onca and pumas Puma concolor (Carnivora: Felidae) on livestock correlate with species richness and relative abundance of wild prey?

    PubMed

    Burgas, Albert; Amit, Ronit; Lopez, Bernat C

    2014-12-01

    Abstract: Attacks by big cats on livestock are one of the major causes of human-felid conflicts and, therefore, an important factor in the conservation of these species. It has been argued that a reduction in natural prey abundance promotes attacks on domestic species, but few studies have tested this statement, and some have delivered contradictory results. We investigated whether the occurrence of attacks to livestock by jaguar and puma relates to the abundance and richness of their natural prey. In the rainy season 2009, we tracked potential prey species counting signs of presence along linear transects in 14 non-attacked cattle farms (control) and in 14 attacked cattle farms in NW Costa Rica. There was a negative relationship between the occurrence of attacks and both species richness (p = 0.0014) and abundance (p = 0.0012) of natural prey. Our results support the establishment of actions to promote support and recovery of natural prey, in order to diminish attacks on livestock, while maintaining jaguar and puma populations.

  12. Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chen, Yuan; Kar, Soummya; Moura, Jose M. F.

    This paper studies an attacker against a cyberphysical system (CPS) whose goal is to move the state of a CPS to a target state while ensuring that his or her probability of being detected does not exceed a given bound. The attacker’s probability of being detected is related to the nonnegative bias induced by his or her attack on the CPS’s detection statistic. We formulate a linear quadratic cost function that captures the attacker’s control goal and establish constraints on the induced bias that reflect the attacker’s detection-avoidance objectives. When the attacker is constrained to be detected at the false-alarmmore » rate of the detector, we show that the optimal attack strategy reduces to a linear feedback of the attacker’s state estimate. In the case that the attacker’s bias is upper bounded by a positive constant, we provide two algorithms – an optimal algorithm and a sub-optimal, less computationally intensive algorithm – to find suitable attack sequences. Lastly, we illustrate our attack strategies in numerical examples based on a remotely-controlled helicopter under attack.« less

  13. Application of the PageRank Algorithm to Alarm Graphs

    NASA Astrophysics Data System (ADS)

    Treinen, James J.; Thurimella, Ramakrishna

    The task of separating genuine attacks from false alarms in large intrusion detection infrastructures is extremely difficult. The number of alarms received in such environments can easily enter into the millions of alerts per day. The overwhelming noise created by these alarms can cause genuine attacks to go unnoticed. As means of highlighting these attacks, we introduce a host ranking technique utilizing Alarm Graphs. Rather than enumerate all potential attack paths as in Attack Graphs, we build and analyze graphs based on the alarms generated by the intrusion detection sensors installed on a network. Given that the alarms are predominantly false positives, the challenge is to identify, separate, and ideally predict future attacks. In this paper, we propose a novel approach to tackle this problem based on the PageRank algorithm. By elevating the rank of known attackers and victims we are able to observe the effect that these hosts have on the other nodes in the Alarm Graph. Using this information we are able to discover previously overlooked attacks, as well as defend against future intrusions.

  14. Localized attacks on spatially embedded networks with dependencies.

    PubMed

    Berezin, Yehiel; Bashan, Amir; Danziger, Michael M; Li, Daqing; Havlin, Shlomo

    2015-03-11

    Many real world complex systems such as critical infrastructure networks are embedded in space and their components may depend on one another to function. They are also susceptible to geographically localized damage caused by malicious attacks or natural disasters. Here, we study a general model of spatially embedded networks with dependencies under localized attacks. We develop a theoretical and numerical approach to describe and predict the effects of localized attacks on spatially embedded systems with dependencies. Surprisingly, we find that a localized attack can cause substantially more damage than an equivalent random attack. Furthermore, we find that for a broad range of parameters, systems which appear stable are in fact metastable. Though robust to random failures-even of finite fraction-if subjected to a localized attack larger than a critical size which is independent of the system size (i.e., a zero fraction), a cascading failure emerges which leads to complete system collapse. Our results demonstrate the potential high risk of localized attacks on spatially embedded network systems with dependencies and may be useful for designing more resilient systems.

  15. Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems

    DOE PAGES

    Chen, Yuan; Kar, Soummya; Moura, Jose M. F.

    2017-03-31

    This paper studies an attacker against a cyberphysical system (CPS) whose goal is to move the state of a CPS to a target state while ensuring that his or her probability of being detected does not exceed a given bound. The attacker’s probability of being detected is related to the nonnegative bias induced by his or her attack on the CPS’s detection statistic. We formulate a linear quadratic cost function that captures the attacker’s control goal and establish constraints on the induced bias that reflect the attacker’s detection-avoidance objectives. When the attacker is constrained to be detected at the false-alarmmore » rate of the detector, we show that the optimal attack strategy reduces to a linear feedback of the attacker’s state estimate. In the case that the attacker’s bias is upper bounded by a positive constant, we provide two algorithms – an optimal algorithm and a sub-optimal, less computationally intensive algorithm – to find suitable attack sequences. Lastly, we illustrate our attack strategies in numerical examples based on a remotely-controlled helicopter under attack.« less

  16. Migraine attack treatment : a tailor-made suit, not one size fits all.

    PubMed

    Belvis, Robert; Mas, Natalia; Aceituno, Azahara

    2014-04-01

    About 15% of people in the world suffer migraine attacks. Migraine can induce a great impact in the quality of life, and the costs of medical care and loss of productivity can be also high. Non-steroidal anti-inflammatory drugs (NSAIDs) are the best treatment in mild-to-moderate migraine attacks and triptans are the first line option in the acute treatment of moderate-to-severe migraine attacks. At present, there are seven marketed triptans: sumatriptan, rizatriptan, zolmitriptan, eletriptan, naratriptan, almotriptan and frovatriptan. Obviously, every drug presents different pharmacokinetic and pharmacodynamics properties and, moreover, some triptans have several formulations. The prescription of one of these seven triptans for a specified patient is based in the drug profile: efficacy, safety, pharmacokinetics and pharmacodynamics. Other data to take account in the final prescription are clinical characteristics of the migraine attack (speed of onset, intensity of pain, lasting of the attack) and patient characteristics as working habits, life style or medical history. It is therefore mandatory to perform an individualization of the treatment of migraine attack. In recent years, several new patents of drugs have been registered in the treatment of migraine attack, although most of these are already known drugs that only provide new routes of administration. We present an update on the treatment of the migraine attack.

  17. Robust ECC-based authenticated key agreement scheme with privacy protection for Telecare medicine information systems.

    PubMed

    Zhang, Liping; Zhu, Shaohui

    2015-05-01

    To protect the transmission of the sensitive medical data, a secure and efficient authenticated key agreement scheme should be deployed when the healthcare delivery session is established via Telecare Medicine Information Systems (TMIS) over the unsecure public network. Recently, Islam and Khan proposed an authenticated key agreement scheme using elliptic curve cryptography for TMIS. They claimed that their proposed scheme is provably secure against various attacks in random oracle model and enjoys some good properties such as user anonymity. In this paper, however, we point out that any legal but malicious patient can reveal other user's identity. Consequently, their scheme suffers from server spoofing attack and off-line password guessing attack. Moreover, if the malicious patient performs the same time of the registration as other users, she can further launch the impersonation attack, man-in-the-middle attack, modification attack, replay attack, and strong replay attack successfully. To eliminate these weaknesses, we propose an improved ECC-based authenticated key agreement scheme. Security analysis demonstrates that the proposed scheme can resist various attacks and enables the patient to enjoy the remote healthcare services with privacy protection. Through the performance evaluation, we show that the proposed scheme achieves a desired balance between security and performance in comparisons with other related schemes.

  18. Public Figure Attacks in the United States, 1995-2015.

    PubMed

    Meloy, J Reid; Amman, Molly

    2016-09-01

    An archival descriptive study of public figure attackers in the United States between 1995 and 2015 was undertaken. Fifty-six incidents were identified, primarily through exhaustive internet searches, composed of 58 attackers and 58 victims. A code book was developed which focused upon victims, offenders, pre-attack behaviors including direct threats, attack characteristics, post-offense and other outcomes, motivations and psychological abstracts. The average interrater agreement for coding of bivariate variables was 0.835 (intraclass correlation coefficient). The three most likely victim categories were politicians, judges, and athletes. Attackers were males, many with a psychiatric disorder, most were grandiose, and most had both a violent and nonviolent criminal history. The known motivations for the attacks were often angry and personal, the most common being dissatisfaction with a judicial or other governmental process (23%). In only one case was the primary motivation to achieve notoriety. Lethality risk during an attack was 55%. Collateral injury or death occurred in 29% of the incidents. Only 5% communicated a direct threat to the target beforehand. The term "publicly intimate figure" is introduced to describe the sociocultural blurring of public and private lives among the targets, and its possible role in some attackers' perceptions and motivations. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.

  19. Differential Fault Analysis on CLEFIA with 128, 192, and 256-Bit Keys

    NASA Astrophysics Data System (ADS)

    Takahashi, Junko; Fukunaga, Toshinori

    This paper describes a differential fault analysis (DFA) attack against CLEFIA. The proposed attack can be applied to CLEFIA with all supported keys: 128, 192, and 256-bit keys. DFA is a type of side-channel attack. This attack enables the recovery of secret keys by injecting faults into a secure device during its computation of the cryptographic algorithm and comparing the correct ciphertext with the faulty one. CLEFIA is a 128-bit blockcipher with 128, 192, and 256-bit keys developed by the Sony Corporation in 2007. CLEFIA employs a generalized Feistel structure with four data lines. We developed a new attack method that uses this characteristic structure of the CLEFIA algorithm. On the basis of the proposed attack, only 2 pairs of correct and faulty ciphertexts are needed to retrieve the 128-bit key, and 10.78 pairs on average are needed to retrieve the 192 and 256-bit keys. The proposed attack is more efficient than any previously reported. In order to verify the proposed attack and estimate the calculation time to recover the secret key, we conducted an attack simulation using a PC. The simulation results show that we can obtain each secret key within three minutes on average. This result shows that we can obtain the entire key within a feasible computational time.

  20. Relevance of terrorism for Italian students not directly exposed to it: The affective impact of the 2015 Paris and the 2016 Brussels attacks.

    PubMed

    Raccanello, Daniela; Burro, Roberto; Brondino, Margherita; Pasini, Margherita

    2018-04-01

    Notwithstanding the dramatically increasing frequency of acts of terrorism in Europe and the extent of their media coverage, there is lack of knowledge on people's affective reactions and associated emotion regulation strategies. We explored the affective impact on two cohorts of Italian students (n = 193) possibly exposed vicariously through the mass media to the 2015 Paris or the 2016 Brussels terrorist attacks, respectively. We accessed data from three online questionnaires: one on emotion regulation administered before each attack; one on daily affect administered just before and after each attack; and one on causes of weekly affect and life satisfaction administered at the end of the week in which each attack occurred. The attacks were perceived as relevant for influencing negative affect for 22% of the students. For them, suppression-less frequently used than reappraisal-was associated with an improvement of affect after each attack but negatively related to life satisfaction concerning the week in which the attacks occurred. Our data showed that the recent terrorist attacks occurring in Europe had an affective impact on people at some distance who were vicariously exposed and point to the protective role of emotion regulation as a key resource for individuals' well-being. Copyright © 2017 John Wiley & Sons, Ltd.

  1. Fear of Terrorism in New York After the September 11 Terrorist Attacks: Implications for Emergency Mental Health and Preparedness

    PubMed Central

    Boscarino, Joseph A.; Figley, Charles R.; Adams, Richard E.

    2009-01-01

    To examine the public’s response to future terrorist attacks, we surveyed 1,001 New Yorkers in the community one year after the September 11 attacks. Overall, New Yorkers were very concerned about future terrorist attacks and also concerned about attacks involving biological or nuclear weapons. In addition, while most New Yorkers reported that if a biological or nuclear attack occurred they would evaluate available information before evacuating, a significant number reported they would immediately evacuate, regardless of police or public health communications to the contrary. The level of public concern was significantly higher on all measures among New York City and Long Island residents (downstate) compared to the rest of the state. A model predicting higher fear of terrorism indicated that downstate residents, women, those 45 to 64 years old, African Americans and Hispanics, those with less education/income, and those more likely to flee, were more fearful of future attacks. In addition, making disaster preparations and carefully evaluating emergency information also predicted a higher level of fear as well. A second model predicting who would flee suggested that those more likely to evaluate available information were less likely to immediately evacuate, while those with a higher fear of future attacks were more likely to flee the area. Given these findings and the possibility of future attacks, mental health professionals need to be more involved in preparedness efforts, especially related to the psychological impact of attacks involving weapons of mass destruction. PMID:14730761

  2. Ethanol injection of ornamental trees facilitates testing insecticide efficacy against ambrosia beetles (Coleoptera: Curculionidae: Scolytinae).

    PubMed

    Reding, Michael E; Oliver, Jason B; Schultz, Peter B; Ranger, Christopher M; Youssef, Nadeer N

    2013-02-01

    Exotic ambrosia beetles are damaging pests in ornamental tree nurseries in North America. The species Xylosandrus crassiusculus (Motshulsky) and Xylosandrus germanus (Blandford) are especially problematic. Management of these pests relies on preventive treatments of insecticides. However, field tests of recommended materials on nursery trees have been limited because of unreliable attacks by ambrosia beetles on experimental trees. Ethanol-injection of trees was used to induce colonization by ambrosia beetles to evaluate insecticides and botanical formulations for preventing attacks by ambrosia beetles. Experiments were conducted in Ohio, Tennessee, and Virginia. Experimental trees injected with ethanol had more attacks by ambrosia beetles than uninjected control trees in all but one experiment. Xylosandrus crassiusculus and X. germanus colonized trees injected with ethanol. In most experiments, attack rates declined 8 d after ethanol-injection. Ethanol-injection induced sufficient pressure from ambrosia beetles to evaluate the efficacy of insecticides for preventing attacks. Trunk sprays of permethrin suppressed cumulative total attacks by ambrosia beetles in most tests. Trunk sprays of the botanical formulations Armorex and Veggie Pharm suppressed cumulative total attacks in Ohio. Armorex, Armorex + Permethrin, and Veggie Pharm + Permethrin suppressed attacks in Tennessee. The bifenthrin product Onyx suppressed establishment of X. germanus in one Ohio experiment, and cumulative total ambrosia beetle attacks in Virginia. Substrate drenches and trunk sprays of neonicotinoids, or trunk sprays of anthranilic diamides or tolfenpyrad were not effective. Ethanol-injection is effective for inducing attacks and ensuring pressure by ambrosia beetles for testing insecticide efficacy on ornamental trees.

  3. Do Unexpected Panic Attacks Occur Spontaneously?

    PubMed Central

    Meuret, Alicia E.; Rosenfield, David; Wilhelm, Frank H.; Zhou, Enlu; Conrad, Ansgar; Ritz, Thomas; Roth, Walton T.

    2012-01-01

    Background Spontaneous or unexpected panic attacks, per definition, occur out-of-the blue, in absence of cues or triggers. Accordingly, physiological arousal or instability should occur at the onset of or during the attack, but not preceding it. To test this hypothesisweexaminedif points of significant autonomic changes preceded the onset of spontaneous panic attacks. Methods Forty-three panic disorder patients underwent repeated 24-hour ambulatory monitoring. Thirteen naturally panic attacks were recorded during 1,960 hours of monitoring. Minute-by-minute epochs beginning 60 minutes before, and continuing to 10 minutes after, the onset of individual attacks were examined for respiration, heart rate, and skin conductance level. Measures were controlled for physical activity and vocalization, and compared to time matched control periods within the same person. Results Significant patterns of instability across a numberof autonomic and respiratory variables were detected as early as 47 minutes before panic onset. The final minutes prior to onset were dominated by respiratory changes, with significant decreases in tidal volume followed by abrupt PCO2 increases. Panic attack onset was characterized by heart rate and tidal volume increases and a drop in PCO2. Symptom report was consistent with these changes. Skin conductance levels were generally elevated in the hour before and duringthe attacks. Changes in the matched control periods were largely absent. Conclusions Significant autonomic irregularities preceded the onset of attacks that were reported as abrupt and unexpected. The findings invite reconsideration of the current diagnostic distinction betweenuncuedand cued panic attacks. PMID:21783179

  4. Insecurity of Wireless Networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sheldon, Frederick T; Weber, John Mark; Yoo, Seong-Moo

    Wireless is a powerful core technology enabling our global digital infrastructure. Wi-Fi networks are susceptible to attacks on Wired Equivalency Privacy, Wi-Fi Protected Access (WPA), and WPA2. These attack signatures can be profiled into a system that defends against such attacks on the basis of their inherent characteristics. Wi-Fi is the standard protocol for wireless networks used extensively in US critical infrastructures. Since the Wired Equivalency Privacy (WEP) security protocol was broken, the Wi-Fi Protected Access (WPA) protocol has been considered the secure alternative compatible with hardware developed for WEP. However, in November 2008, researchers developed an attack on WPA,more » allowing forgery of Address Resolution Protocol (ARP) packets. Subsequent enhancements have enabled ARP poisoning, cryptosystem denial of service, and man-in-the-middle attacks. Open source systems and methods (OSSM) have long been used to secure networks against such attacks. This article reviews OSSMs and the results of experimental attacks on WPA. These experiments re-created current attacks in a laboratory setting, recording both wired and wireless traffic. The article discusses methods of intrusion detection and prevention in the context of cyber physical protection of critical Internet infrastructure. The basis for this research is a specialized (and undoubtedly incomplete) taxonomy of Wi-Fi attacks and their adaptations to existing countermeasures and protocol revisions. Ultimately, this article aims to provide a clearer picture of how and why wireless protection protocols and encryption must achieve a more scientific basis for detecting and preventing such attacks.« less

  5. Fear of terrorism in New York after the September 11 terrorist attacks: implications for emergency mental health and preparedness.

    PubMed

    Boscarino, Joseph A; Figley, Charles R; Adams, Richard E

    2003-01-01

    To examine the public's response to future terrorist attacks, we surveyed 1,001 New Yorkers in the community one year after the September 11 attacks. Overall, New Yorkers were very concerned about future terrorist attacks and also concerned about attacks involving biological or nuclear weapons. In addition, while most New Yorkers reported that if a biological or nuclear attack occurred they would evaluate available information before evacuating, a significant number reported they would immediately evacuate, regardless of police or public health communications to the contrary. The level of public concern was significantly higher on all measures among New York City and Long Island residents (downstate) compared to the rest of the state. A model predicting higher fear of terrorism indicated that downstate residents, women, those 45 to 64 years old, African Americans and Hispanics, those with less education/income, and those more likely to flee, were more fearful of future attacks. In addition, making disaster preparations and carefully evaluating emergency information also predicted a higher level of fear as well. A second model predicting who would flee suggested that those more likely to evaluate available information were less likely to immediately evacuate, while those with a higher fear of future attacks were more likely to flee the area. Given these findings and the possibility of future attacks, mental health professionals need to be more involved in preparedness efforts, especially related to the psychological impact of attacks involving weapons of mass destruction.

  6. Metrics for Assessment of Smart Grid Data Integrity Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Annarita Giani; Miles McQueen; Russell Bent

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised datamore » by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.« less

  7. Prediction of first episode of panic attack among white-collar workers.

    PubMed

    Watanabe, Akira; Nakao, Kazuhisa; Tokuyama, Madoka; Takeda, Masatoshi

    2005-04-01

    The purpose of the present study was to elucidate a longitudinal matrix of the etiology for first-episode panic attack among white-collar workers. A path model was designed for this purpose. A 5-year, open-cohort study was carried out in a Japanese company. To evaluate the risk factors associated with the onset of a first episode of panic attack, the odds ratios of a new episode of panic attack were calculated by logistic regression. The path model contained five predictor variables: gender difference, overprotection, neuroticism, lifetime history of major depression, and recent stressful life events. The logistic regression analysis indicated that a person with a lifetime history of major depression and recent stressful life events had a fivefold and a threefold higher risk of panic attacks at follow up, respectively. The path model for the prediction of a first episode of panic attack fitted the data well. However, this model presented low accountability for the variance in the ultimate dependent variables, the first episode of panic attack. Three predictors (neuroticism, lifetime history of major depression, and recent stressful life events) had a direct effect on the risk for a first episode of panic attack, whereas gender difference and overprotection had no direct effect. The present model could not fully predict first episodes of panic attack in white-collar workers. To make a path model for the prediction of the first episode of panic attack, other strong predictor variables, which were not surveyed in the present study, are needed. It is suggested that genetic variables are among the other strong predictor variables. A new path model containing genetic variables (e.g. family history etc.) will be needed to predict the first episode of panic attack.

  8. Dopaminergic regulation of sleep and cataplexy in a murine model of narcolepsy.

    PubMed

    Burgess, Christian R; Tse, Gavin; Gillis, Lauren; Peever, John H

    2010-10-01

    To determine if the dopaminergic system modulates cataplexy, sleep attacks and sleep-wake behavior in narcoleptic mice. Hypocretin/orexin knockout (i.e., narcoleptic) and wild-type mice were administered amphetamine and specific dopamine receptor modulators to determine their effects on sleep, cataplexy and sleep attacks. Hypocretin knockout (n = 17) and wild-type mice (n = 21). Cataplexy, sleep attacks and sleep-wake behavior were identified using electroencephalogram, electromyogram and videography. These behaviors were monitored for 4 hours after an i.p. injection of saline, amphetamine and specific dopamine receptor modulators (D1- and D2-like receptor modulators). Amphetamine (2 mg/kg), which increases brain dopamine levels, decreased sleep attacks and cataplexy by 61% and 67%, suggesting that dopamine transmission modulates such behaviors. Dopamine receptor modulation also had powerful effects on sleep attacks and cataplexy. Activation (SKF 38393; 20 mg/kg) and blockade (SCH 23390; 1 mg/kg) of D1-like receptors decreased and increased sleep attacks by 77% and 88%, without affecting cataplexy. Pharmacological activation of D2-like receptors (quinpirole; 0.5 mg/kg) increased cataplectic attacks by 172% and blockade of these receptors (eticlopride; 1 mg/kg) potently suppressed them by 97%. Manipulation of D2-like receptors did not affect sleep attacks. We show that the dopaminergic system plays a role in regulating both cataplexy and sleep attacks in narcoleptic mice. We found that cataplexy is modulated by a D2-like receptor mechanism, whereas dopamine modulates sleep attacks by a D1-like receptor mechanism. These results support a role for the dopamine system in regulating sleep attacks and cataplexy in a murine model of narcolepsy.

  9. Economic burden of gouty arthritis attacks for employees with frequent and infrequent attacks.

    PubMed

    Lynch, Wendy; Chan, Wing; Kleinman, Nathan; Andrews, L M; Yadao, Anthony M

    2013-04-01

    The objective of this study was to compare episode-related and annual costs and work absence days for employees with <3 versus ≥ 3 annual gout attacks. Human Capital Management Services data (2009-2010) from adult employees with gout (International Classification of Diseases, Ninth Revision code 274.x) and ≥ 12 months of medical and pharmacy benefits were studied. Outcomes of interest included medical and drug costs, number of emergency department and urgent care visits, number of inpatient days, short- and long-term disability, sick leave, workers' compensation costs, and work absence days. An algorithm based on diagnosis code and antigout medication use identified acute gout treatment episodes. Multivariate analysis compared annual and pre-episode vs. during-episode outcomes for employees with ≥ 3 vs. <3 gout annual attacks. Of 3361 employees with gout, 76 had ≥ 3 attacks; these employees had higher short-term disability costs ($1663 vs. $643, P=0.06) and days (11.68 versus 4.61, P<0.05), more emergency room visits (0.55 vs. 0.23, P<0.0001), and urgent care visits (0.07 vs. 0.04, P<0.01), and lower pharmacy costs ($1677 vs. $1108, P<0.0001) than those with <3 attacks. Medical costs both before ($203 higher) and during attacks ($136 higher) were significantly higher for those with ≥ 3 attacks than for those with <3 attacks. Additionally, a quadratic increasing relationship was found between number of attacks and cost. Frequency of acute gout attacks (≥ 3 episodes per year) among employees with gout was associated with greater short-term disability cost, absence days, and emergency department and urgent care visits, and trends toward higher overall costs.

  10. Correlation of forebody pressures and aircraft yawing moments on the X-29A aircraft at high angles of attack

    NASA Technical Reports Server (NTRS)

    Fisher, David F.; Richwine, David M.; Landers, Stephen

    1992-01-01

    In-flight pressure distributions at four fuselage stations on the forebody of the X-29A aircraft have been reported at angles of attack from 15 to 66 deg and at Mach numbers from 0.22 to 0.60. At angles of attack of 20 deg and higher, vortices shed from the nose strake caused suction peaks in the pressure distributions that generally increased in magnitude with angle of attack. Above 30 deg-angle of attack, the forebody pressure distributions became asymmetrical at the most forward station, while they remained nearly symmetrical until 50 to 55 deg-angle of attack for the aft stations. Between 59 to 66 deg-angle of attack, the asymmetry of the pressure distributions changed direction. Yawing moments for the forebody alone were obtained by integrating the forebody pressure distributions. At 45 deg-angle of attack, the aircraft yaws to the right and at 50 deg and higher, the aircraft yaws to the left. The forebody yawing moments correlated well with the aircraft left yawing moment at an angle of attack of 50 deg or higher. At a 45 deg-angle of attack, the forebody yawing moments did not correlate well with the aircraft yawing moment, but it is suggested that this was due to asymmetric pressures on the cockpit region of the fuselage which was not instrumented. The forebody was also shown to provide a positive component of directional stability of the aircraft at angles of attack of 25 deg or higher. A Mach number effect was noted at angles of attack of 30 deg or higher at the station where the nose strake was present. At this station, the suction peaks in the pressure distributions at the highest Mach number were reduced and much more symmetrical as compared to the lower Mach number pressure distributions.

  11. EVALUATION OF THE CHANGES IN THE NASAL CAVITY DURING THE MIGRAINE ATTACK

    PubMed Central

    Arslan, H. Hüseyin; Tokgöz, Erkan; Yıldızoğlu, Üzeyir; Durmaz, Abdullah; Bek, Semai; Gerek, Mustafa

    2012-01-01

    Objectives There are some subjective symptoms involving the nasal cavity such as nasal congestion during a migraine attack. In this study, we aimed to evaluate the possible changes occuring in the nasal cavity, during headache in migraine patients. Material and Methods Subjects with migraine were studied. The control group was consisted with tension-type headache patients. The severity of the headache and accompanying complaints were assessed by visual analog scale, and nasal mucosa was assessed by anterior rhinoscopy and endoscopy. Resistance of the nasal cavity was evaluated with anterior rhinomanometry. The data obtained during the attack periods and attack free periods were compared. Results 25 migraine patients and 15 tension-type headache patients were enrolled. It was found that 19 subjects (%76) of migraine group and 5 of tension-type headache group were suffering from nasal congestion during the attack, and that the differences between the groups were statistically significant (p<0.05). The average of total nasal resistance in migraine patients was 0,57±0,60 kPa/L/sn during migraine attacks and 0,28±0,14 kPa/L/sn during attack free periods. The average of total nasal resistance in tension-type headache patients was 0,32±0,14 kPa/L/sn during attack periods and 0,31±0,20 kPa/L/sn during attack free periods. In the migraine group, the change of nasal resistance between during the attack and attack free periods was found statistically significant, while there was no statistically significant difference in the tension-type headache group. Conclusion According to the results of this study, complaining of nasal obstruction and nasal airway resistance increases during migraine attacks. Cause and effect relationship between nasal obstruction and pain is not clear and clinical trials are needed to determine the effect of nasal obstruction treatment (mucosal decongestion etc.) on the complaint of pain. PMID:25072974

  12. Dead or Alive? Factors Affecting the Survival of Victims during Attacks by Saltwater Crocodiles (Crocodylus porosus) in Australia.

    PubMed

    Fukuda, Yusuke; Manolis, Charlie; Saalfeld, Keith; Zuur, Alain

    2015-01-01

    Conflicts between humans and crocodilians are a widespread conservation challenge and the number of crocodile attacks is increasing worldwide. We identified the factors that most effectively decide whether a victim is injured or killed in a crocodile attack by fitting generalized linear models to a 42-year dataset of 87 attacks (27 fatal and 60 non-fatal) by saltwater crocodiles (Crocodylus porosus) in Australia. The models showed that the most influential factors were the difference in body mass between crocodile and victim, and the position of victim in relation to the water at the time of an attack. In-water position (for diving, swimming, and wading) had a higher risk than on-water (boating) or on-land (fishing, and hunting near the water's edge) positions. In the in-water position a 75 kg person would have a relatively high probability of survival (0.81) if attacked by a 300 cm crocodile, but the probability becomes much lower (0.17) with a 400 cm crocodile. If attacked by a crocodile larger than 450 cm, the survival probability would be extremely low (<0.05) regardless of the victim's size. These results indicate that the main cause of death during a crocodile attack is drowning and larger crocodiles can drag a victim more easily into deeper water. A higher risk associated with a larger crocodile in relation to victim's size is highlighted by children's vulnerability to fatal attacks. Since the first recently recorded fatal attack involving a child in 2006, six out of nine fatal attacks (66.7%) involved children, and the average body size of crocodiles responsible for these fatal attacks was considerably smaller (384 cm, 223 kg) than that of crocodiles that killed adults (450 cm, 324 kg) during the same period (2006-2014). These results suggest that culling programs targeting larger crocodiles may not be an effective management option to improve safety for children.

  13. Dead or Alive? Factors Affecting the Survival of Victims during Attacks by Saltwater Crocodiles (Crocodylus porosus) in Australia

    PubMed Central

    Fukuda, Yusuke

    2015-01-01

    Conflicts between humans and crocodilians are a widespread conservation challenge and the number of crocodile attacks is increasing worldwide. We identified the factors that most effectively decide whether a victim is injured or killed in a crocodile attack by fitting generalized linear models to a 42-year dataset of 87 attacks (27 fatal and 60 non-fatal) by saltwater crocodiles (Crocodylus porosus) in Australia. The models showed that the most influential factors were the difference in body mass between crocodile and victim, and the position of victim in relation to the water at the time of an attack. In-water position (for diving, swimming, and wading) had a higher risk than on-water (boating) or on-land (fishing, and hunting near the water's edge) positions. In the in-water position a 75 kg person would have a relatively high probability of survival (0.81) if attacked by a 300 cm crocodile, but the probability becomes much lower (0.17) with a 400 cm crocodile. If attacked by a crocodile larger than 450 cm, the survival probability would be extremely low (<0.05) regardless of the victim’s size. These results indicate that the main cause of death during a crocodile attack is drowning and larger crocodiles can drag a victim more easily into deeper water. A higher risk associated with a larger crocodile in relation to victim’s size is highlighted by children’s vulnerability to fatal attacks. Since the first recently recorded fatal attack involving a child in 2006, six out of nine fatal attacks (66.7%) involved children, and the average body size of crocodiles responsible for these fatal attacks was considerably smaller (384 cm, 223 kg) than that of crocodiles that killed adults (450 cm, 324 kg) during the same period (2006–2014). These results suggest that culling programs targeting larger crocodiles may not be an effective management option to improve safety for children. PMID:25961294

  14. Review of attacks on health care facilities in six conflicts of the past three decades.

    PubMed

    Briody, Carolyn; Rubenstein, Leonard; Roberts, Les; Penney, Eamon; Keenan, William; Horbar, Jeffrey

    2018-01-01

    In the ongoing conflicts of Syria and Yemen, there have been widespread reports of attacks on health care facilities and personnel. Tabulated evidence does suggest hospital bombings in Syria and Yemen are far higher than reported in other conflicts but it is unclear if this is a reporting artefact. This article examines attacks on health care facilities in conflicts in six middle- to high- income countries that have occurred over the past three decades to try and determine if attacks have become more common, and to assess the different methods used to collect data on attacks. The six conflicts reviewed are Yemen (2015-Present), Syria (2011- Present), Iraq (2003-2011), Chechnya (1999-2000), Kosovo (1998-1999), and Bosnia and Herzegovina (1992-1995). We attempted to get the highest quality source(s) with summary data of the number of facilities attacked for each of the conflicts. The only conflict that did not have summary data was the conflict in Iraq. In this case, we tallied individual reported events of attacks on health care. Physicians for Human Rights (PHR) reported attacks on 315 facilities (4.38 per month) in Syria over a 7-year period, while the Monitoring Violence against Health Care (MVH) tool launched later by the World Health Organization (WHO) Turkey Health Cluster reported attacks on 135 facilities (9.64 per month) over a 14-month period. Yemen had a reported 93 attacks (4.65 per month), Iraq 12 (0.12 per month), Chechnya > 24 (2.4 per month), Kosovo > 100 (6.67 per month), and Bosnia 21 (0.41 per month). Methodologies to collect data, and definitions of both facilities and attacks varied widely across sources. The number of reported facilities attacked is by far the greatest in Syria, suggesting that this phenomenon has increased compared to earlier conflicts. However, data on attacks of facilities was incomplete for all of the conflicts examined, methodologies varied widely, and in some cases, attacks were not defined at all. A global, standardized system that allows multiple reporting routes with different levels of confirmation, as seen in Syria, would likely allow for a more reliable and reproducible documentation system, and potentially, an increase in accountability.

  15. Wounding patterns and human performance in knife attacks: optimising the protection provided by knife-resistant body armour.

    PubMed

    Bleetman, A; Watson, C H; Horsfall, I; Champion, S M

    2003-12-01

    Stab attacks generate high loads, and to defeat them, armour needs to be of a certain thickness and stiffness. Slash attacks produce much lower loads and armour designed to defeat them can be far lighter and more flexible. Phase 1: Human performance in slash attacks: 87 randomly selected students at the Royal Military College of Science were asked to make one slash attack with an instrumented blade on a vertically mounted target. No instructions on how to slash the target were given. The direction, contact forces and velocity of each attack were recorded. Phase 2: Clinical experience with edged weapon attacks: The location and severity of all penetrating injuries in patients attending the Glasgow Royal Infirmary between 1993 and 1996 were charted on anatomical figures. Phase 1: Two types of human slash behaviour were evident: a 'chop and drag' blow and a 'sweep motion' type of attack. 'Chop and drag' attacks had higher peak forces and velocities than sweep attacks. Shoulder to waist blows (diagonal) accounted for 82% of attacks, 71% of attackers used a long diagonal slash with an average cut length of 34 cm and 11% used short diagonal attacks with an average cut length of 25 cm. Only 18% of attackers slashed across the body (short horizontal); the average measured cut length of this type was 28 cm. The maximum peak force for the total sample population was 212 N; the maximum velocity was 14.88 m s(-1). The 95 percentile force for the total sample population was 181 N and the velocity was 9.89 m s(-1). Phase 2: 431 of the 500 patients had been wounded with edged weapons. The average number of wounds sustained by victims in knife assaults was 2.4. The distribution of wounds by frequency and severity are presented. Anti-slash protection is required for the arms, neck, shoulders, and thighs. The clinical experience of knife-attack victims provides information on the relative vulnerabilities of different regions of the body. It is anticipated that designing a tunic-type of Police uniform that is inherently stab and slash resistant will eventually replace the current obvious and often bulky extra protective vest. Attempts at making a combined garment will need to be guided by ergonomic considerations and field testing. A similar anatomical regional risk model might also be appropriate in the design of anti-ballistic armour and combined anti-ballistic and knife-resistant armour.

  16. Determining the scope of attacks on health in four governorates of Syria in 2016: Results of a field surveillance program

    PubMed Central

    Risko, Casey B.; Rayes, Diana; Albaik, Ahmad; Alnajar, Mohammed; Kewara, Mazen; Baker, Elise; Rubenstein, Leonard S.

    2018-01-01

    Background Violent attacks on and interferences with hospitals, ambulances, health workers, and patients during conflict destroy vital health services during a time when they are most needed and undermine the long-term capacity of the health system. In Syria, such attacks have been frequent and intense and represent grave violations of the Geneva Conventions, but the number reported has varied considerably. A systematic mechanism to document these attacks could assist in designing more protection strategies and play a critical role in influencing policy, promoting justice, and addressing the health needs of the population. Methods and findings We developed a mobile data collection questionnaire to collect data on incidents of attacks on healthcare directly from the field. Data collectors from the Syrian American Medical Society (SAMS), using the tool or a text messaging system, recorded information on incidents across four of Syria’s northern governorates (Aleppo, Idleb, Hama, and Homs) from January 1, 2016, to December 31, 2016. SAMS recorded a total of 200 attacks on healthcare in 2016, 102 of them using the mobile data collection tool. Direct attacks on health facilities comprised the majority of attacks recorded (88.0%; n = 176). One hundred and twelve healthcare staff and 185 patients were killed in these incidents. Thirty-five percent of the facilities were attacked more than once over the data collection period; hospitals were significantly more likely to be attacked more than once compared to clinics and other types of healthcare facilities. Aerial bombs were used in the overwhelming majority of cases (91.5%). We also compared the SAMS data to a separate database developed by Physicians for Human Rights (PHR) based on media reports and matched the incidents to compare the results from the two methods (this analysis was limited to incidents at health facilities). Among 90 relevant incidents verified by PHR and 177 by SAMS, there were 60 that could be matched to each other, highlighting the differences in results from the two methods. This study is limited by the complexities of data collection in a conflict setting, only partial use of the standardized reporting tool, and the fact that limited accessibility of some health facilities and workers and may be biased towards the reporting of attacks on larger or more visible health facilities. Conclusions The use of field data collectors and use of consistent definitions can play an important role in the tracking incidents of attacks on health services. A mobile systematic data collection tool can complement other methods for tracking incidents of attacks on healthcare and ensure the collection of detailed information about each attack that may assist in better advocacy, programs, and accountability but can be practically challenging. Comparing attacks between SAMS and PHR suggests that there may have been significantly more attacks than previously captured by any one methodology. This scale of attacks suggests that targeting of healthcare in Syria is systematic and highlights the failure of condemnation by the international community and medical groups working in Syria of such attacks to stop them. PMID:29689085

  17. The Na+(K+)/H+ exchanger Nhx1 controls multivesicular body-vacuolar lysosome fusion.

    PubMed

    Karim, Mahmoud Abdul; Brett, Christopher Leonard

    2018-02-01

    Loss-of-function mutations in human endosomal Na + (K + )/H + exchangers (NHEs) NHE6 and NHE9 are implicated in neurological disorders including Christianson syndrome, autism, and attention deficit and hyperactivity disorder. These mutations disrupt retention of surface receptors within neurons and glial cells by affecting their delivery to lysosomes for degradation. However, the molecular basis of how these endosomal NHEs control endocytic trafficking is unclear. Using Saccharomyces cerevisiae as a model, we conducted cell-free organelle fusion assays to show that transport activity of the orthologous endosomal NHE Nhx1 is important for multivesicular body (MVB)-vacuolar lysosome fusion, the last step of endocytosis required for surface protein degradation. We find that deleting Nhx1 disrupts the fusogenicity of the MVB, not the vacuole, by targeting pH-sensitive machinery downstream of the Rab-GTPase Ypt7 needed for SNARE-mediated lipid bilayer merger. All contributing mechanisms are evolutionarily conserved offering new insight into the etiology of human disorders linked to loss of endosomal NHE function. © 2018 Karim and Brett. This article is distributed by The American Society for Cell Biology under license from the author(s). Two months after publication it is available to the public under an Attribution–Noncommercial–Share Alike 3.0 Unported Creative Commons License (http://creativecommons.org/licenses/by-nc-sa/3.0).

  18. Douglas-fir beetle attack and tree mortality following wildfire

    Treesearch

    Sharon M. Hood; Barbara Bentz; Kevin C. Ryan

    2003-01-01

    A major concern after wildfires is the buildup of bark beetle populations in fire injured trees, and subsequent attack and population buildup in adjacent unburned areas. To examine this concern, we documented fire injury and insect attacks in Douglas-fir (Pseudotsuga menziesii) on the 2001 Green Knoll Fire, Wyoming to determine attack preferences, brood production, and...

  19. The Effects of Denial-of-Service Attacks on Secure Time-Critical Communications in the Smart Grid

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhang, Fengli; Li, QInghua; Mantooth, Homer Alan

    2016-04-02

    According to IEC 61850, many smart grid communications require messages to be delivered in a very short time. –Trip messages and sample values applied to the transmission level: 3 ms –Interlocking messages applied to the distribution level: 10 ms •Time-critical communications are vulnerable to denial-of-service (DoS) attacks –Flooding attack: Attacker floods many messages to the target network/machine. We conducted systematic, experimental study about how DoS attacks affect message delivery delays.

  20. The maul of the wild. Animal attacks can produce significant trauma.

    PubMed

    Conrad, L

    1994-03-01

    Wild-animal attacks are almost an anachronism in our day and age. They remind us that humans can still be food or prey. Cougar attacks, though rare, produce significant trauma. Characteristic patterns of injury and wound infection should be appropriately identified and treated. As we protect wild-animal species and acknowledge their right to share territory, interactions--and possibly attacks--are likely to increase. Awareness, education, knowledge and prevention, rather than the elimination of animal populations, may be the best way to control wild-animal attacks on humans in the future.

  1. Attacks and intrusion detection in wireless sensor networks of industrial SCADA systems

    NASA Astrophysics Data System (ADS)

    Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.

    2017-01-01

    The effectiveness of automated process control systems (APCS) and supervisory control and data acquisition systems (SCADA) information security depends on the applied protection technologies of transport environment data transmission components. This article investigates the problems of detecting attacks in wireless sensor networks (WSN) of SCADA systems. As a result of analytical studies, the authors developed the detailed classification of external attacks and intrusion detection in sensor networks and brought a detailed description of attacking impacts on components of SCADA systems in accordance with the selected directions of attacks.

  2. SFTP: A Secure and Fault-Tolerant Paradigm against Blackhole Attack in MANET

    NASA Astrophysics Data System (ADS)

    KumarRout, Jitendra; Kumar Bhoi, Sourav; Kumar Panda, Sanjaya

    2013-02-01

    Security issues in MANET are a challenging task nowadays. MANETs are vulnerable to passive attacks and active attacks because of a limited number of resources and lack of centralized authority. Blackhole attack is an attack in network layer which degrade the network performance by dropping the packets. In this paper, we have proposed a Secure Fault-Tolerant Paradigm (SFTP) which checks the Blackhole attack in the network. The three phases used in SFTP algorithm are designing of coverage area to find the area of coverage, Network Connection algorithm to design a fault-tolerant model and Route Discovery algorithm to discover the route and data delivery from source to destination. SFTP gives better network performance by making the network fault free.

  3. Panic disorder, panic attacks and panic attack symptoms across race-ethnic groups: results of the collaborative psychiatric epidemiology studies.

    PubMed

    Asnaani, Anu; Gutner, Cassidy A; Hinton, Devon E; Hofmann, Stefan G

    2009-01-01

    The current study investigates race-ethnic differences in rates of panic disorder, panic attacks and certain panic attack symptoms by jointly combining three major national epidemiological databases. The compared groups were White, African American, Latino and Asian. The White group had significantly higher rates of panic disorder, and of many panic symptoms, including palpitations, as compared to the African American, Asian and Latino groups. Several expected race-ethnic differences were not found. An explanation for these findings are adduced, and suggestions are given for future studies so that possible ethnic-racial differences in panic disorder, panic attacks and panic attack symptoms can be investigated in a more rigorous manner.

  4. A Learning-Based Approach to Reactive Security

    NASA Astrophysics Data System (ADS)

    Barth, Adam; Rubinstein, Benjamin I. P.; Sundararajan, Mukund; Mitchell, John C.; Song, Dawn; Bartlett, Peter L.

    Despite the conventional wisdom that proactive security is superior to reactive security, we show that reactive security can be competitive with proactive security as long as the reactive defender learns from past attacks instead of myopically overreacting to the last attack. Our game-theoretic model follows common practice in the security literature by making worst-case assumptions about the attacker: we grant the attacker complete knowledge of the defender's strategy and do not require the attacker to act rationally. In this model, we bound the competitive ratio between a reactive defense algorithm (which is inspired by online learning theory) and the best fixed proactive defense. Additionally, we show that, unlike proactive defenses, this reactive strategy is robust to a lack of information about the attacker's incentives and knowledge.

  5. Network Security Risk Assessment System Based on Attack Graph and Markov Chain

    NASA Astrophysics Data System (ADS)

    Sun, Fuxiong; Pi, Juntao; Lv, Jin; Cao, Tian

    2017-10-01

    Network security risk assessment technology can be found in advance of the network problems and related vulnerabilities, it has become an important means to solve the problem of network security. Based on attack graph and Markov chain, this paper provides a Network Security Risk Assessment Model (NSRAM). Based on the network infiltration tests, NSRAM generates the attack graph by the breadth traversal algorithm. Combines with the international standard CVSS, the attack probability of atomic nodes are counted, and then the attack transition probabilities of ones are calculated by Markov chain. NSRAM selects the optimal attack path after comprehensive measurement to assessment network security risk. The simulation results show that NSRAM can reflect the actual situation of network security objectively.

  6. Attacks on Bluetooth Security Architecture and Its Countermeasures

    NASA Astrophysics Data System (ADS)

    Iqbal, Mian Muhammad Waseem; Kausar, Firdous; Wahla, Muhammad Arif

    WPANs compliment the traditional IEEE 802.11 wireless networks by facilitating the clients with flexibility in network topologies, higher mobility and relaxed configuration/hardware requirements. Bluetooth, a WPAN technology, is an open standard for short-range radio frequency (RF) communication. However, it is also susceptible to typical security threats found in wireless LANs. This paper discuses some of the attack scenarios against the bluetooth network such as hostile intrusion, active Man-in-the-Middle (MITM) attack using unit key and various forms of denial of service (DoS) attacks. These threats and attacks compromise the confidentiality and availability of bluetooth data and services. This paper proposes an improved security architecture for bluetooth device which provides protection against the above mentioned attacks.

  7. Design and implementation of dynamic hybrid Honeypot network

    NASA Astrophysics Data System (ADS)

    Qiao, Peili; Hu, Shan-Shan; Zhai, Ji-Qiang

    2013-05-01

    The method of constructing a dynamic and self-adaptive virtual network is suggested to puzzle adversaries, delay and divert attacks, exhaust attacker resources and collect attacking information. The concepts of Honeypot and Honeyd, which is the frame of virtual Honeypot are introduced. The techniques of network scanning including active fingerprint recognition are analyzed. Dynamic virtual network system is designed and implemented. A virtual network similar to real network topology is built according to the collected messages from real environments in this system. By doing this, the system can perplex the attackers when Hackers attack and can further analyze and research the attacks. The tests to this system prove that this design can successfully simulate real network environment and can be used in network security analysis.

  8. A Novel Protective Framework for Defeating HTTP-Based Denial of Service and Distributed Denial of Service Attacks.

    PubMed

    Saleh, Mohammed A; Abdul Manaf, Azizah

    2015-01-01

    The growth of web technology has brought convenience to our life, since it has become the most important communication channel. However, now this merit is threatened by complicated network-based attacks, such as denial of service (DoS) and distributed denial of service (DDoS) attacks. Despite many researchers' efforts, no optimal solution that addresses all sorts of HTTP DoS/DDoS attacks is on offer. Therefore, this research aims to fix this gap by designing an alternative solution called a flexible, collaborative, multilayer, DDoS prevention framework (FCMDPF). The innovative design of the FCMDPF framework handles all aspects of HTTP-based DoS/DDoS attacks through the following three subsequent framework's schemes (layers). Firstly, an outer blocking (OB) scheme blocks attacking IP source if it is listed on the black list table. Secondly, the service traceback oriented architecture (STBOA) scheme is to validate whether the incoming request is launched by a human or by an automated tool. Then, it traces back the true attacking IP source. Thirdly, the flexible advanced entropy based (FAEB) scheme is to eliminate high rate DDoS (HR-DDoS) and flash crowd (FC) attacks. Compared to the previous researches, our framework's design provides an efficient protection for web applications against all sorts of DoS/DDoS attacks.

  9. A Novel Protective Framework for Defeating HTTP-Based Denial of Service and Distributed Denial of Service Attacks

    PubMed Central

    Saleh, Mohammed A.; Abdul Manaf, Azizah

    2015-01-01

    The growth of web technology has brought convenience to our life, since it has become the most important communication channel. However, now this merit is threatened by complicated network-based attacks, such as denial of service (DoS) and distributed denial of service (DDoS) attacks. Despite many researchers' efforts, no optimal solution that addresses all sorts of HTTP DoS/DDoS attacks is on offer. Therefore, this research aims to fix this gap by designing an alternative solution called a flexible, collaborative, multilayer, DDoS prevention framework (FCMDPF). The innovative design of the FCMDPF framework handles all aspects of HTTP-based DoS/DDoS attacks through the following three subsequent framework's schemes (layers). Firstly, an outer blocking (OB) scheme blocks attacking IP source if it is listed on the black list table. Secondly, the service traceback oriented architecture (STBOA) scheme is to validate whether the incoming request is launched by a human or by an automated tool. Then, it traces back the true attacking IP source. Thirdly, the flexible advanced entropy based (FAEB) scheme is to eliminate high rate DDoS (HR-DDoS) and flash crowd (FC) attacks. Compared to the previous researches, our framework's design provides an efficient protection for web applications against all sorts of DoS/DDoS attacks. PMID:26065015

  10. Effectiveness of the call in beach volleyball attacking play.

    PubMed

    Künzell, Stefan; Schweikart, Florian; Köhn, Daniel; Schläppi-Lienhard, Olivia

    2014-12-09

    In beach volleyball the setter has the opportunity to give her or his hitter a "call". The call intends that the setter suggests to her or his partner where to place the attack in the opponent's court. The effectiveness of a call is still unknown. We investigated the women's and men's Swiss National Beach Volleyball Championships in 2011 and analyzed 2185 attacks. We found large differences between female and male players. While men called in only 38.4% of attacks, women used calls in 85.5% of attacks. If the male players followed a given call, 63% of the attacks were successful. The success rate of attacks without any call was 55.8% and 47.6% when the call was ignored. These differences were not significant (χ(2)(2) = 4.55, p = 0.103). In women's beach volleyball, the rate of successful attacks was 61.5% when a call was followed, 35% for attacks without a call, and 42.6% when a call was ignored. The differences were highly significant (χ(2)(2) = 23.42, p < 0.0005). Taking into account the findings of the present study, we suggested that the call was effective in women's beach volleyball, while its effect in men's game was unclear. Considering the quality of calls we indicate that there is a significant potential to increase the effectiveness of a call.

  11. Practical security and privacy attacks against biometric hashing using sparse recovery

    NASA Astrophysics Data System (ADS)

    Topcu, Berkay; Karabat, Cagatay; Azadmanesh, Matin; Erdogan, Hakan

    2016-12-01

    Biometric hashing is a cancelable biometric verification method that has received research interest recently. This method can be considered as a two-factor authentication method which combines a personal password (or secret key) with a biometric to obtain a secure binary template which is used for authentication. We present novel practical security and privacy attacks against biometric hashing when the attacker is assumed to know the user's password in order to quantify the additional protection due to biometrics when the password is compromised. We present four methods that can reconstruct a biometric feature and/or the image from a hash and one method which can find the closest biometric data (i.e., face image) from a database. Two of the reconstruction methods are based on 1-bit compressed sensing signal reconstruction for which the data acquisition scenario is very similar to biometric hashing. Previous literature introduced simple attack methods, but we show that we can achieve higher level of security threats using compressed sensing recovery techniques. In addition, we present privacy attacks which reconstruct a biometric image which resembles the original image. We quantify the performance of the attacks using detection error tradeoff curves and equal error rates under advanced attack scenarios. We show that conventional biometric hashing methods suffer from high security and privacy leaks under practical attacks, and we believe more advanced hash generation methods are necessary to avoid these attacks.

  12. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models

    DOE PAGES

    Rao, Nageswara S. V.; Poole, Stephen W.; Ma, Chris Y. T.; ...

    2015-04-06

    The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical sub-infrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein theirmore » components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. In conclusion, the analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures.« less

  13. Quantum hacking: Saturation attack on practical continuous-variable quantum key distribution

    NASA Astrophysics Data System (ADS)

    Qin, Hao; Kumar, Rupesh; Alléaume, Romain

    2016-07-01

    We identify and study a security loophole in continuous-variable quantum key distribution (CVQKD) implementations, related to the imperfect linearity of the homodyne detector. By exploiting this loophole, we propose an active side-channel attack on the Gaussian-modulated coherent-state CVQKD protocol combining an intercept-resend attack with an induced saturation of the homodyne detection on the receiver side (Bob). We show that an attacker can bias the excess noise estimation by displacing the quadratures of the coherent states received by Bob. We propose a saturation model that matches experimental measurements on the homodyne detection and use this model to study the impact of the saturation attack on parameter estimation in CVQKD. We demonstrate that this attack can bias the excess noise estimation beyond the null key threshold for any system parameter, thus leading to a full security break. If we consider an additional criterion imposing that the channel transmission estimation should not be affected by the attack, then the saturation attack can only be launched if the attenuation on the quantum channel is sufficient, corresponding to attenuations larger than approximately 6 dB. We moreover discuss the possible countermeasures against the saturation attack and propose a countermeasure based on Gaussian postselection that can be implemented by classical postprocessing and may allow one to distill the secret key when the raw measurement data are partly saturated.

  14. Securing Cooperative Spectrum Sensing Against Collusive SSDF Attack using XOR Distance Analysis in Cognitive Radio Networks

    PubMed Central

    Feng, Jingyu; Zhang, Man; Xiao, Yun; Yue, Hongzhou

    2018-01-01

    Cooperative spectrum sensing (CSS) is considered as a powerful approach to improve the utilization of scarce spectrum resources. However, if CSS assumes that all secondary users (SU) are honest, it may offer opportunities for attackers to conduct a spectrum sensing data falsification (SSDF) attack. To suppress such a threat, recent efforts have been made to develop trust mechanisms. Currently, some attackers can collude with each other to form a collusive clique, and thus not only increase the power of SSDF attack but also avoid the detection of a trust mechanism. Noting the duality of sensing data, we propose a defense scheme called XDA from the perspective of XOR distance analysis to suppress a collusive SSDF attack. In the XDA scheme, the XOR distance calculation in line with the type of “0” and “1” historical sensing data is used to measure the similarity between any two SUs. Noting that collusive SSDF attackers hold high trust value and the minimum XOR distance, the algorithm to detect collusive SSDF attackers is designed. Meanwhile, the XDA scheme can perfect the trust mechanism to correct collusive SSDF attackers’ trust value. Simulation results show that the XDA scheme can enhance the accuracy of trust evaluation, and thus successfully reduce the power of collusive SSDF attack against CSS. PMID:29382061

  15. Relation of Temperature and Humidity to the Risk of Recurrent Gout Attacks

    PubMed Central

    Neogi, Tuhina; Chen, Clara; Niu, Jingbo; Chaisson, Christine; Hunter, David J.; Choi, Hyon; Zhang, Yuqing

    2014-01-01

    Gout attack risk may be affected by weather (e.g., because of volume depletion). We therefore examined the association of temperature and humidity with the risk of recurrent gout attacks by conducting an internet-based case-crossover study in the United States (in 2003–2010) among subjects with a diagnosis of gout who had 1 or more attacks during 1 year of follow-up. We examined the association of temperature and humidity over the prior 48 hours with the risk of gout attacks using a time-stratified approach and conditional logistic regression. Among 632 subjects with gout, there was a significant dose-response relationship between mean temperature in the prior 48 hours and the risk of subsequent gout attack (P = 0.01 for linear trend). Higher temperatures were associated with approximately 40% higher risk of gout attack compared with moderate temperatures. There was a reverse J-shaped relationship between mean relative humidity and the risk of gout attacks (P = 0.03 for quadratic trend). The combination of high temperature and low humidity had the greatest association (odds ratio = 2.04, 95% confidence interval: 1.26, 3.30) compared with moderate temperature and relative humidity. Thus, high ambient temperature and possibly extremes of humidity were associated with an increased risk of gout attack, despite the likelihood that individuals are often in climate-controlled indoor environments. PMID:24993733

  16. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rao, Nageswara S. V.; Poole, Stephen W.; Ma, Chris Y. T.

    The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical sub-infrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein theirmore » components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. In conclusion, the analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures.« less

  17. The influence of weather on migraine – are migraine attacks predictable?

    PubMed Central

    Hoffmann, Jan; Schirra, Tonio; Lo, Hendra; Neeb, Lars; Reuter, Uwe; Martus, Peter

    2015-01-01

    Objective The study aimed at elucidating a potential correlation between specific meteorological variables and the prevalence and intensity of migraine attacks as well as exploring a potential individual predictability of a migraine attack based on meteorological variables and their changes. Methods Attack prevalence and intensity of 100 migraineurs were correlated with atmospheric pressure, relative air humidity, and ambient temperature in 4-h intervals over 12 consecutive months. For each correlation, meteorological parameters at the time of the migraine attack as well as their variation within the preceding 24 h were analyzed. For migraineurs showing a positive correlation, logistic regression analysis was used to assess the predictability of a migraine attack based on meteorological information. Results In a subgroup of migraineurs, a significant weather sensitivity could be observed. In contrast, pooled analysis of all patients did not reveal a significant association. An individual prediction of a migraine attack based on meteorological data was not possible, mainly as a result of the small prevalence of attacks. Interpretation The results suggest that only a subgroup of migraineurs is sensitive to specific weather conditions. Our findings may provide an explanation as to why previous studies, which commonly rely on a pooled analysis, show inconclusive results. The lack of individual attack predictability indicates that the use of preventive measures based on meteorological conditions is not feasible. PMID:25642431

  18. High angle of attack flying qualities criteria for longitudinal rate command systems

    NASA Technical Reports Server (NTRS)

    Wilson, David J.; Citurs, Kevin D.; Davidson, John B.

    1994-01-01

    This study was designed to investigate flying qualities requirements of alternate pitch command systems for fighter aircraft at high angle of attack. Flying qualities design guidelines have already been developed for angle of attack command systems at 30, 45, and 60 degrees angle of attack, so this research fills a similar need for rate command systems. Flying qualities tasks that require post-stall maneuvering were tested during piloted simulations in the McDonnell Douglas Aerospace Manned Air Combat Simulation facility. A generic fighter aircraft model was used to test angle of attack rate and pitch rate command systems for longitudinal gross acquisition and tracking tasks at high angle of attack. A wide range of longitudinal dynamic variations were tested at 30, 45, and 60 degrees angle of attack. Pilot comments, Cooper-Harper ratings, and pilot induced oscillation ratings were taken from five pilots from NASA, USN, CAF, and McDonnell Douglas Aerospace. This data was used to form longitudinal design guidelines for rate command systems at high angle of attack. These criteria provide control law design guidance for fighter aircraft at high angle of attack, low speed flight conditions. Additional time history analyses were conducted using the longitudinal gross acquisition data to look at potential agility measures of merit and correlate agility usage to flying qualities boundaries. This paper presents an overview of this research.

  19. Defender-Attacker Decision Tree Analysis to Combat Terrorism.

    PubMed

    Garcia, Ryan J B; von Winterfeldt, Detlof

    2016-12-01

    We propose a methodology, called defender-attacker decision tree analysis, to evaluate defensive actions against terrorist attacks in a dynamic and hostile environment. Like most game-theoretic formulations of this problem, we assume that the defenders act rationally by maximizing their expected utility or minimizing their expected costs. However, we do not assume that attackers maximize their expected utilities. Instead, we encode the defender's limited knowledge about the attacker's motivations and capabilities as a conditional probability distribution over the attacker's decisions. We apply this methodology to the problem of defending against possible terrorist attacks on commercial airplanes, using one of three weapons: infrared-guided MANPADS (man-portable air defense systems), laser-guided MANPADS, or visually targeted RPGs (rocket propelled grenades). We also evaluate three countermeasures against these weapons: DIRCMs (directional infrared countermeasures), perimeter control around the airport, and hardening airplanes. The model includes deterrence effects, the effectiveness of the countermeasures, and the substitution of weapons and targets once a specific countermeasure is selected. It also includes a second stage of defensive decisions after an attack occurs. Key findings are: (1) due to the high cost of the countermeasures, not implementing countermeasures is the preferred defensive alternative for a large range of parameters; (2) if the probability of an attack and the associated consequences are large, a combination of DIRCMs and ground perimeter control are preferred over any single countermeasure. © 2016 Society for Risk Analysis.

  20. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models.

    PubMed

    Rao, Nageswara S V; Poole, Stephen W; Ma, Chris Y T; He, Fei; Zhuang, Jun; Yau, David K Y

    2016-04-01

    The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities, expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical subinfrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein their components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures, are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. The analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures. © 2015 Society for Risk Analysis.

  1. Heart attack first aid

    MedlinePlus

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  2. Correlated Attack Modeling (CAM)

    DTIC Science & Technology

    2003-10-01

    describing attack models to a scenario recognition engine, a prototype of such an engine was developed, using components of the EMERALD intrusion...content. Results – The attacker gains information enabling remote access to database (i.e., privileged login information, database layout to allow...engine that uses attack specifications written in CAML. The implementation integrates two advanced technologies devel- oped in the EMERALD program [27, 31

  3. Daily Stress as a Trigger of Migraine Attacks: Results of Thirteen Single-Subject Studies.

    ERIC Educational Resources Information Center

    Kohler, Thomas; Haimerl, Christianne

    1990-01-01

    Six-month longitudinal study examined whether migraine attacks were preceded by or occurred on stressful days. Every evening, 13 patients completed questionnaires assessing daily stress. Analyses on single-subject level tested when attacks occurred. Increased stress was generally not found for Days 2 and 3 before an attack, but often for Day 1 and…

  4. Pre-Attack Symptomatology and Temperament as Predictors of Children's Responses to the September 11 Terrorist Attacks

    ERIC Educational Resources Information Center

    Lengua, Liliana J.; Long, Anna C.; Smith, Kimberlee I.; Meltzoff, Andrew N.

    2005-01-01

    Background: The aims of this study were to assess the psychological response of children following the September 11, 2001 terrorist attacks in New York and Washington, DC and to examine prospective predictors of children's post-attack responses. Method: Children's responses were assessed in a community sample of children in Seattle, Washington,…

  5. Mountain pine beetle attack in ponderosa pine: Comparing methods for rating susceptibility

    Treesearch

    David C. Chojnacky; Barbara J. Bentz; Jesse A. Logan

    2000-01-01

    Two empirical methods for rating susceptibility of mountain pine beetle attack in ponderosa pine were evaluated. The methods were compared to stand data modeled to objectively rate each sampled stand for susceptibly to bark-beetle attack. Data on bark-beetle attacks, from a survey of 45 sites throughout the Colorado Plateau, were modeled using logistic regression to...

  6. The robustness of multiplex networks under layer node-based attack

    PubMed Central

    Zhao, Da-wei; Wang, Lian-hai; Zhi, Yong-feng; Zhang, Jun; Wang, Zhen

    2016-01-01

    From transportation networks to complex infrastructures, and to social and economic networks, a large variety of systems can be described in terms of multiplex networks formed by a set of nodes interacting through different network layers. Network robustness, as one of the most successful application areas of complex networks, has attracted great interest in a myriad of research realms. In this regard, how multiplex networks respond to potential attack is still an open issue. Here we study the robustness of multiplex networks under layer node-based random or targeted attack, which means that nodes just suffer attacks in a given layer yet no additional influence to their connections beyond this layer. A theoretical analysis framework is proposed to calculate the critical threshold and the size of giant component of multiplex networks when nodes are removed randomly or intentionally. Via numerous simulations, it is unveiled that the theoretical method can accurately predict the threshold and the size of giant component, irrespective of attack strategies. Moreover, we also compare the robustness of multiplex networks under multiplex node-based attack and layer node-based attack, and find that layer node-based attack makes multiplex networks more vulnerable, regardless of average degree and underlying topology. PMID:27075870

  7. The robustness of multiplex networks under layer node-based attack.

    PubMed

    Zhao, Da-wei; Wang, Lian-hai; Zhi, Yong-feng; Zhang, Jun; Wang, Zhen

    2016-04-14

    From transportation networks to complex infrastructures, and to social and economic networks, a large variety of systems can be described in terms of multiplex networks formed by a set of nodes interacting through different network layers. Network robustness, as one of the most successful application areas of complex networks, has attracted great interest in a myriad of research realms. In this regard, how multiplex networks respond to potential attack is still an open issue. Here we study the robustness of multiplex networks under layer node-based random or targeted attack, which means that nodes just suffer attacks in a given layer yet no additional influence to their connections beyond this layer. A theoretical analysis framework is proposed to calculate the critical threshold and the size of giant component of multiplex networks when nodes are removed randomly or intentionally. Via numerous simulations, it is unveiled that the theoretical method can accurately predict the threshold and the size of giant component, irrespective of attack strategies. Moreover, we also compare the robustness of multiplex networks under multiplex node-based attack and layer node-based attack, and find that layer node-based attack makes multiplex networks more vulnerable, regardless of average degree and underlying topology.

  8. Cyber-Physical Attack-Resilient Wide-Area Monitoring, Protection, and Control for the Power Grid

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ashok, Aditya; Govindarasu, Manimaran; Wang, Jianhui

    Cyber security and resiliency of Wide-Area Monitoring, Protection and Control (WAMPAC) applications is critically important to ensure secure, reliable, and economic operation of the bulk power system. WAMPAC relies heavily on the security of measurements and control commands transmitted over wide-area communication networks for real-time operational, protection, and control functions. Also, the current “N-1 security criteria” for grid operation is inadequate to address malicious cyber events and therefore it is important to fundamentally redesign WAMPAC and to enhance Energy Management System (EMS) applications to make them attack-resilient. In this paper, we propose an end-to-end defense-in-depth architecture for attack-resilient WAMPAC thatmore » addresses resilience at both the infrastructure layer and the application layers. Also, we propose an attack-resilient cyber-physical security framework that encompasses the entire security life cycle including risk assessment, attack prevention, attack detection, attack mitigation, and attack resilience. The overarching objective of this paper is to provide a broad scope that comprehensively describes most of the major research issues and potential solutions in the context of cyber-physical security of WAMPAC for the power grid.« less

  9. Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information.

    PubMed

    Wang, Chundong; Zhu, Likun; Gong, Liangyi; Zhao, Zhentang; Yang, Lei; Liu, Zheli; Cheng, Xiaochun

    2018-03-15

    With the development of the Internet-of-Things (IoT), wireless network security has more and more attention paid to it. The Sybil attack is one of the famous wireless attacks that can forge wireless devices to steal information from clients. These forged devices may constantly attack target access points to crush the wireless network. In this paper, we propose a novel Sybil attack detection based on Channel State Information (CSI). This detection algorithm can tell whether the static devices are Sybil attackers by combining a self-adaptive multiple signal classification algorithm with the Received Signal Strength Indicator (RSSI). Moreover, we develop a novel tracing scheme to cluster the channel characteristics of mobile devices and detect dynamic attackers that change their channel characteristics in an error area. Finally, we experiment on mobile and commercial WiFi devices. Our algorithm can effectively distinguish the Sybil devices. The experimental results show that our Sybil attack detection system achieves high accuracy for both static and dynamic scenarios. Therefore, combining the phase and similarity of channel features, the multi-dimensional analysis of CSI can effectively detect Sybil nodes and improve the security of wireless networks.

  10. Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information

    PubMed Central

    Wang, Chundong; Zhao, Zhentang; Yang, Lei; Liu, Zheli; Cheng, Xiaochun

    2018-01-01

    With the development of the Internet-of-Things (IoT), wireless network security has more and more attention paid to it. The Sybil attack is one of the famous wireless attacks that can forge wireless devices to steal information from clients. These forged devices may constantly attack target access points to crush the wireless network. In this paper, we propose a novel Sybil attack detection based on Channel State Information (CSI). This detection algorithm can tell whether the static devices are Sybil attackers by combining a self-adaptive multiple signal classification algorithm with the Received Signal Strength Indicator (RSSI). Moreover, we develop a novel tracing scheme to cluster the channel characteristics of mobile devices and detect dynamic attackers that change their channel characteristics in an error area. Finally, we experiment on mobile and commercial WiFi devices. Our algorithm can effectively distinguish the Sybil devices. The experimental results show that our Sybil attack detection system achieves high accuracy for both static and dynamic scenarios. Therefore, combining the phase and similarity of channel features, the multi-dimensional analysis of CSI can effectively detect Sybil nodes and improve the security of wireless networks. PMID:29543773

  11. The time of sunrise and the number of hours with daylight may influence the diurnal rhythm of acute heart attack mortality.

    PubMed

    Kriszbacher, Ildikó; Bódis, József; Boncz, Imre; Koppan, Agnes; Koppan, Miklós

    2010-04-01

    We investigated whether the time of sunrise and the number of daylight hours have an effect on the seasonality, or the daily rhythm of heart attack mortality. We analyzed retrospectively data of patients admitted to hospitals with the diagnosis of heart attack (n=32,329) and patients who deceased of a heart attack (n=5142) between January 1, 2004 and December 31, 2005 in Hungary. Heart attack mortality was highest during winter, while lowest number of events was recorded during summer . The daily peak of diurnality was between 6:00 am and 12:00 pm (33.77%). A positive correlation was found between the time of sunrise, time of sunset and the mortality caused by myocardial infarction (p<0,01). In the analysis of the number of daylight hours and the heart attack mortality we found a negative correlation (r=-0.105, p<0.05). No significant difference was found between sexes and different age-groups in heart attack mortality. Our data suggest, that the occurrence and the mortality of heart attack may be related to the time of sunrise and the number of daylight hours. Copyright 2008 Elsevier Ireland Ltd. All rights reserved.

  12. [Case of exploding head syndrome].

    PubMed

    Okura, Mutsumi; Taniguchi, Mitsutaka; Muraki, Hisae; Sugita, Hideko; Ohi, Motoharu

    2010-01-01

    Exploding head syndrome (EHS) attacks are characterized by the sensation of sudden loud banging noises, and are occasionally accompanied by the sensation of a flash light. Although these attacks in themselves are usually not painful, it is reported that EHS attacks may precede migraines and may be perceived as auras. A 53-year-old woman, with a 40-year history of fulgurating migraines, experienced 2 different types of EHS attacks. During most of the attacks, which were not painful, she heard sounds like someone yelling or cars passing by. Only 1 episode was accompanied with the sensation of a flash light and of sounds similar to those of an electrical short circuit. On the video-polysomnography, video-polysomnography showed 11 EHS attacks occurred during stage N1 and stage N2; these attacks were preceded by soft snoring. She also had moderate obstructive sleep apnea syndrome (Apnea Hypopnea Index: 16.7) for which an oral appliance was prescribed; the EHS attacks did not recur after this treatment. The pathophysiology of EHS is still unclear. A detailed analysis of PSG data may help in understanding the pathophysiology of this syndrome and also in the selection of therapeutic strategies.

  13. Situational awareness of a coordinated cyber attack

    NASA Astrophysics Data System (ADS)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  14. Protecting complex infrastructures against multiple strategic attackers

    NASA Astrophysics Data System (ADS)

    Hausken, Kjell

    2011-01-01

    Infrastructures are analysed subject to defence by a strategic defender and attack by multiple strategic attackers. A framework is developed where each agent determines how much to invest in defending versus attacking each of multiple targets. A target can have economic, human and symbolic values, which generally vary across agents. Investment expenditure functions for each agent can be linear in the investment effort, concave, convex, logistic, can increase incrementally, or can be subject to budget constraints. Contest success functions (e.g., ratio and difference forms) determine the probability of a successful attack on each target, dependent on the relative investments of the defender and attackers on each target, and on characteristics of the contest. Targets can be in parallel, in series, interlinked, interdependent or independent. The defender minimises the expected damage plus the defence expenditures. Each attacker maximises the expected damage minus the attack expenditures. The number of free choice variables equals the number of agents times the number of targets, or lower if there are budget constraints. Each agent is interested in how his investments vary across the targets, and the impact on his utilities. Alternative optimisation programmes are discussed, together with repeated games, dynamic games and incomplete information. An example is provided for illustration.

  15. Flight test of the X-29A at high angle of attack: Flight dynamics and controls

    NASA Technical Reports Server (NTRS)

    Bauer, Jeffrey E.; Clarke, Robert; Burken, John J.

    1995-01-01

    The NASA Dryden Flight Research Center has flight tested two X-29A aircraft at low and high angles of attack. The high-angle-of-attack tests evaluate the feasibility of integrated X-29A technologies. More specific objectives focus on evaluating the high-angle-of-attack flying qualities, defining multiaxis controllability limits, and determining the maximum pitch-pointing capability. A pilot-selectable gain system allows examination of tradeoffs in airplane stability and maneuverability. Basic fighter maneuvers provide qualitative evaluation. Bank angle captures permit qualitative data analysis. This paper discusses the design goals and approach for high-angle-of-attack control laws and provides results from the envelope expansion and handling qualities testing at intermediate angles of attack. Comparisons of the flight test results to the predictions are made where appropriate. The pitch rate command structure of the longitudinal control system is shown to be a valid design for high-angle-of-attack control laws. Flight test results show that wing rock amplitude was overpredicted and aileron and rudder effectiveness were underpredicted. Flight tests show the X-29A airplane to be a good aircraft up to 40 deg angle of attack.

  16. Fallout risk following a major nuclear attack on the United States.

    PubMed

    Harvey, T F; Shapiro, C S; Wittler, R F

    1992-01-01

    Fallout distributions are calculated for nuclear attacks on the contiguous United States. Four attack scenarios are treated, including counterforce and counterforce-countervalue attacks, for meteorological conditions associated with a typical day in summer and one in winter. The countervalue attacks contain mostly airbursts. To determine fallout effects, the population surviving the prompt effects is first calculated. For the prompt effects, a "conflagration-type" model is used. The counterforce attack produces about 8 million prompt deaths, and the counterforce-countervalue case projects 98 million prompt deaths. Partial relocation before attack to low-risk fallout areas at least 15 km from potential strategic targets would result in a decrease in projections of deaths by tens of millions. For fallout risk calculations, only the dose received in the first 48 h (the early or local fallout) is considered. Populations are assumed to be sheltered, with a shelter protection factor profile that varies for a large urban area, a small urban area, or a rural area. With these profiles, without relocation, the fallout fatalities for all four attack scenarios are calculated to be less than one million people. This can be compared to fallout fatalities of about 10 million for a hypothetical unsheltered "phantom" population.

  17. Design of Provider-Provisioned Website Protection Scheme against Malware Distribution

    NASA Astrophysics Data System (ADS)

    Yagi, Takeshi; Tanimoto, Naoto; Hariu, Takeo; Itoh, Mitsutaka

    Vulnerabilities in web applications expose computer networks to security threats, and many websites are used by attackers as hopping sites to attack other websites and user terminals. These incidents prevent service providers from constructing secure networking environments. To protect websites from attacks exploiting vulnerabilities in web applications, service providers use web application firewalls (WAFs). WAFs filter accesses from attackers by using signatures, which are generated based on the exploit codes of previous attacks. However, WAFs cannot filter unknown attacks because the signatures cannot reflect new types of attacks. In service provider environments, the number of exploit codes has recently increased rapidly because of the spread of vulnerable web applications that have been developed through cloud computing. Thus, generating signatures for all exploit codes is difficult. To solve these problems, our proposed scheme detects and filters malware downloads that are sent from websites which have already received exploit codes. In addition, to collect information for detecting malware downloads, web honeypots, which automatically extract the communication records of exploit codes, are used. According to the results of experiments using a prototype, our scheme can filter attacks automatically so that service providers can provide secure and cost-effective network environments.

  18. Brainjacking: Implant Security Issues in Invasive Neuromodulation.

    PubMed

    Pycroft, Laurie; Boccard, Sandra G; Owen, Sarah L F; Stein, John F; Fitzgerald, James J; Green, Alexander L; Aziz, Tipu Z

    2016-08-01

    The security of medical devices is critical to good patient care, especially when the devices are implanted. In light of recent developments in information security, there is reason to be concerned that medical implants are vulnerable to attack. The ability of attackers to exert malicious control over brain implants ("brainjacking") has unique challenges that we address in this review, with particular focus on deep brain stimulation implants. To illustrate the potential severity of this risk, we identify several mechanisms through which attackers could manipulate patients if unauthorized access to an implant can be achieved. These include blind attacks in which the attacker requires no patient-specific knowledge and targeted attacks that require patient-specific information. Blind attacks include cessation of stimulation, draining implant batteries, inducing tissue damage, and information theft. Targeted attacks include impairment of motor function, alteration of impulse control, modification of emotions or affect, induction of pain, and modulation of the reward system. We also discuss the limitations inherent in designing implants and the trade-offs that must be made to balance device security with battery life and practicality. We conclude that researchers, clinicians, manufacturers, and regulatory bodies should cooperate to minimize the risk posed by brainjacking. Copyright © 2016 Elsevier Inc. All rights reserved.

  19. A decision framework for managing risk to airports from terrorist attack.

    PubMed

    Shafieezadeh, Abdollah; Cha, Eun J; Ellingwood, Bruce R

    2015-02-01

    This article presents an asset-level security risk management framework to assist stakeholders of critical assets with allocating limited budgets for enhancing their safety and security against terrorist attack. The proposed framework models the security system of an asset, considers various threat scenarios, and models the sequential decision framework of attackers during the attack. Its novel contributions are the introduction of the notion of partial neutralization of attackers by defenders, estimation of total loss from successful, partially successful, and unsuccessful actions of attackers at various stages of an attack, and inclusion of the effects of these losses on the choices made by terrorists at various stages of the attack. The application of the proposed method is demonstrated in an example dealing with security risk management of a U.S. commercial airport, in which a set of plausible threat scenarios and risk mitigation options are considered. It is found that a combination of providing blast-resistant cargo containers and a video surveillance system on the airport perimeter fence is the best option based on minimum expected life-cycle cost considering a 10-year service period. © 2014 Society for Risk Analysis.

  20. Informatic analysis for hidden pulse attack exploiting spectral characteristics of optics in plug-and-play quantum key distribution system

    NASA Astrophysics Data System (ADS)

    Ko, Heasin; Lim, Kyongchun; Oh, Junsang; Rhee, June-Koo Kevin

    2016-10-01

    Quantum channel loopholes due to imperfect implementations of practical devices expose quantum key distribution (QKD) systems to potential eavesdropping attacks. Even though QKD systems are implemented with optical devices that are highly selective on spectral characteristics, information theory-based analysis about a pertinent attack strategy built with a reasonable framework exploiting it has never been clarified. This paper proposes a new type of trojan horse attack called hidden pulse attack that can be applied in a plug-and-play QKD system, using general and optimal attack strategies that can extract quantum information from phase-disturbed quantum states of eavesdropper's hidden pulses. It exploits spectral characteristics of a photodiode used in a plug-and-play QKD system in order to probe modulation states of photon qubits. We analyze the security performance of the decoy-state BB84 QKD system under the optimal hidden pulse attack model that shows enormous performance degradation in terms of both secret key rate and transmission distance.

  1. [A survey of perioperative asthmatic attack among patients with bronchial asthma underwent general anesthesia].

    PubMed

    Ie, Kenya; Yoshizawa, Atsuto; Hirano, Satoru; Izumi, Sinyuu; Hojo, Masaaki; Sugiyama, Haruhito; Kobayasi, Nobuyuki; Kudou, Kouichirou; Maehara, Yasuhiro; Kawachi, Masaharu; Miyakoshi, Kouichi

    2010-07-01

    We investigated the risk factor of perioperative asthmatic attack and effectiveness of preventing treatment for asthmatic attack before operation. We performed retrospective chart review of one hundred eleven patients with asthma underwent general anesthesia and surgical intervention from January 2006 to October 2007 in our hospital. The rate of perioperative asthmatic attack were as follows; 10.2% (5 in 49 cases) in no pretreatment group, 7.5% (3 in 40 cases) in any pretreatments except for systemic steroid, and 4.5% (1 in 22 cases) in systemic steroid pretreatment group. Neither preoperative asthma severity nor duration from the last attack had significant relevancy to perioperative attack rate. The otolaryngological surgery, especially those have nasal polyp and oral surgery had high perioperative asthma attack rate, although there was no significant difference. We recommend the systemic steroid pretreatment for asthmatic patients, especially when they have known risk factor such as administration of the systemic steroid within 6 months, or possibly new risk factor such as nasal polyp, otolaryngological and oral surgery.

  2. [Incidence of asthmatic attack during anesthesia in patients with a history of bronchial asthma].

    PubMed

    Nonaka, M; Sakanashi, Y; Sugahara, K; Terasaki, H

    1999-07-01

    We investigated retrospectively, the incidence of intraoperative asthmatic attack in patients with bronchial asthma, and compared the past 5-year period (Jan 1, 1979 to Dec 31, 1983) and the recent 5-year period (July 1, 1990 to June 30, 1994). The influence of anesthetic methods, induction agents, and intervals between the most recent attack and anesthesia were evaluated. The incidence of the attack during anesthesia in patients with asthma was similar in both period, 6.7% in the past and 7.8% in the recent period. Patients who had a history of recurrent attacks within 2 years prior to anesthesia tended to have higher incidence of intraoperative attack in both periods. Furthermore, the incidence of asthmatic attack was significantly greater in patients receiving inhalational anesthetics for induction of anesthesia than in those given intravenous anesthetics in the recent period. Although inhalational anesthetics are considered to be used safely for asthmatic patients, care should be taken when volatile anesthetics are administered to asthmatic patients during induction of anesthesia.

  3. The Weight of Cognitions in Panic: The Link between Misinterpretations and Panic Attacks

    PubMed Central

    De Cort, Klara; Hermans, Dirk; Noortman, Daphne; Arends, Wiesje; Griez, Eric J. L.; Schruers, Koen R. J.

    2013-01-01

    In cognitive theory it is hypothesized that panic attacks are provoked by catastrophic misinterpretations of bodily sensations. The aim of the present study was to investigate the ability of associated word pairs referring to catastrophic thinking (e.g. palpitations-heart attack) in producing panic attacks. Patients with PD (n = 20), patients with mixed anxiety disorders (n = 20), and a healthy control group (n = 30) participated in the present study. To enhance ecological validity we first conducted a stimulus validation experiment. Subsequently, nine suitable panic and neutral word pairs were presented in block to the participants. Anxiety levels were assessed before and after the presentation. PD patients were more anxious when reading these word pairs, compared to neutral word pairs. However, none of the participants experienced a panic attack upon reading the word pairs. From the present results it seems that catastrophic thinking is rather related to the anticipatory anxiety for panic attacks, but not necessarily with the occurrence of the panic attacks themselves. PMID:23940559

  4. Correlates of nest-defense behavior of common terns

    USGS Publications Warehouse

    Erwin, R.M.

    1988-01-01

    Nest-defense behavior was studied at seven Common Tern (Sterna hirundo) colonies in southern coastal New Jersey during June and July 1981. Data were collected weekly on numbers of adults, nests, eggs, and young in relation to the frequency and intensity of dive attacks on a human intruder by nesting terns. I explored the relationships between attack behavior and colony size/density, seasonality, and brood survival. The results provide little support for social facilitation since neither colony size (range 30-250 nests) nor density was related to mean attack frequency; however, in larger colonies, fewer birds participated in dive attacks. Although the intensity of attacks was strongly seasonal, patterns were very different among colonies and peak attack rates did not always coincide with peak hatching periods. Defense levels declined late in the season in most colonies regardless of whether brood survival was high or low. Colonies with individuals that attacked early in the season had higher overall nesting success than in colonies where individuals showed little early season aggression.

  5. The effects of stress, anxiety, and outdoor temperature on the frequency and severity of Raynaud's attacks: the Raynaud's Treatment Study.

    PubMed

    Brown, K M; Middaugh, S J; Haythornthwaite, J A; Bielory, L

    2001-04-01

    It was expected that stress and anxiety would be related to Raynaud's phenomenon (RP) attack characteristics when mild outdoor temperatures produced partial or no digital vasoconstriction. Hypotheses were that in warmer temperature categories, compared to those below 40 degrees F, higher stress or anxiety would be associated with more frequent, severe, and painful attacks. The Raynaud's Treatment Study recruited 313 participants with primary RP. Outcomes were attack rate, severity, and pain. Predictors were average daily outdoor temperature, stress, anxiety, age, gender, and a stress-by-temperature or an anxiety-by-temperature interaction. Outcomes were tested separately in multiple linear regression models. Stress and anxiety were tested in separate models. Stress was not a significant predictor of RP attack characteristics. Higher anxiety was related to more frequent attacks above 60 degrees F. It was also related to greater attack severity at all temperatures, and to greater pain above 60 degrees F and between 40 degrees and 49.9 degrees F.

  6. Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems

    NASA Astrophysics Data System (ADS)

    Une, Masashi; Otsuka, Akira; Imai, Hideki

    This paper will propose a wolf attack probability (WAP) as a new measure for evaluating security of biometric authentication systems. The wolf attack is an attempt to impersonate a victim by feeding “wolves” into the system to be attacked. The “wolf” means an input value which can be falsely accepted as a match with multiple templates. WAP is defined as a maximum success probability of the wolf attack with one wolf sample. In this paper, we give a rigorous definition of the new security measure which gives strength estimation of an individual biometric authentication system against impersonation attacks. We show that if one reestimates using our WAP measure, a typical fingerprint algorithm turns out to be much weaker than theoretically estimated by Ratha et al. Moreover, we apply the wolf attack to a finger-vein-pattern based algorithm. Surprisingly, we show that there exists an extremely strong wolf which falsely matches all templates for any threshold value.

  7. Secure Data Aggregation in Wireless Sensor Network-Fujisaki Okamoto(FO) Authentication Scheme against Sybil Attack.

    PubMed

    Nirmal Raja, K; Maraline Beno, M

    2017-07-01

    In the wireless sensor network(WSN) security is a major issue. There are several network security schemes proposed in research. In the network, malicious nodes obstruct the performance of the network. The network can be vulnerable by Sybil attack. When a node illicitly assertions multiple identities or claims fake IDs, the WSN grieves from an attack named Sybil attack. This attack threatens wireless sensor network in data aggregation, synchronizing system, routing, fair resource allocation and misbehavior detection. Henceforth, the research is carried out to prevent the Sybil attack and increase the performance of the network. This paper presents the novel security mechanism and Fujisaki Okamoto algorithm and also application of the work. The Fujisaki-Okamoto (FO) algorithm is ID based cryptographic scheme and gives strong authentication against Sybil attack. By using Network simulator2 (NS2) the scheme is simulated. In this proposed scheme broadcasting key, time taken for different key sizes, energy consumption, Packet delivery ratio, Throughput were analyzed.

  8. Anxiety disorders

    MedlinePlus

    ... Anxiety can also be a sudden attack of terror when there is no threat. What are anxiety ... People with panic disorder have sudden attacks of terror when there is no actual danger. Panic attacks ...

  9. Step to improve neural cryptography against flipping attacks.

    PubMed

    Zhou, Jiantao; Xu, Qinzhen; Pei, Wenjiang; He, Zhenya; Szu, Harold

    2004-12-01

    Synchronization of neural networks by mutual learning has been demonstrated to be possible for constructing key exchange protocol over public channel. However, the neural cryptography schemes presented so far are not the securest under regular flipping attack (RFA) and are completely insecure under majority flipping attack (MFA). We propose a scheme by splitting the mutual information and the training process to improve the security of neural cryptosystem against flipping attacks. Both analytical and simulation results show that the success probability of RFA on the proposed scheme can be decreased to the level of brute force attack (BFA) and the success probability of MFA still decays exponentially with the weights' level L. The synchronization time of the parties also remains polynomial with L. Moreover, we analyze the security under an advanced flipping attack.

  10. Quantitative patterns in drone wars

    NASA Astrophysics Data System (ADS)

    Garcia-Bernardo, Javier; Dodds, Peter Sheridan; Johnson, Neil F.

    2016-02-01

    Attacks by drones (i.e., unmanned combat air vehicles) continue to generate heated political and ethical debates. Here we examine the quantitative nature of drone attacks, focusing on how their intensity and frequency compare with that of other forms of human conflict. Instead of the power-law distribution found recently for insurgent and terrorist attacks, the severity of attacks is more akin to lognormal and exponential distributions, suggesting that the dynamics underlying drone attacks lie beyond these other forms of human conflict. We find that the pattern in the timing of attacks is consistent with one side having almost complete control, an important if expected result. We show that these novel features can be reproduced and understood using a generative mathematical model in which resource allocation to the dominant side is regulated through a feedback loop.

  11. The effect of ad hominem attacks on the evaluation of claims promoted by scientists.

    PubMed

    Barnes, Ralph M; Johnston, Heather M; MacKenzie, Noah; Tobin, Stephanie J; Taglang, Chelsea M

    2018-01-01

    Two experiments were conducted to determine the relative impact of direct and indirect (ad hominem) attacks on science claims. Four hundred and thirty-nine college students (Experiment 1) and 199 adults (Experiment 2) read a series of science claims and indicated their attitudes towards those claims. Each claim was paired with one of the following: A) a direct attack upon the empirical basis of the science claim B) an ad hominem attack on the scientist who made the claim or C) both. Results indicate that ad hominem attacks may have the same degree of impact as attacks on the empirical basis of the science claims, and that allegations of conflict of interest may be just as influential as allegations of outright fraud.

  12. The effect of ad hominem attacks on the evaluation of claims promoted by scientists

    PubMed Central

    2018-01-01

    Two experiments were conducted to determine the relative impact of direct and indirect (ad hominem) attacks on science claims. Four hundred and thirty-nine college students (Experiment 1) and 199 adults (Experiment 2) read a series of science claims and indicated their attitudes towards those claims. Each claim was paired with one of the following: A) a direct attack upon the empirical basis of the science claim B) an ad hominem attack on the scientist who made the claim or C) both. Results indicate that ad hominem attacks may have the same degree of impact as attacks on the empirical basis of the science claims, and that allegations of conflict of interest may be just as influential as allegations of outright fraud. PMID:29381757

  13. Social Networking—Another Breach In The Wall

    NASA Astrophysics Data System (ADS)

    Bamnote, Gajendra; Patil, Gajendra; Shejole, Amol

    2010-11-01

    With the increasing popularity of social networks like Facebook and MySpace, such sites have lately become the favourite destinations for spammers and attackers. Social networks have experienced complex social engineering attacks, massive spam and aggressive malware distribution in the recent past. This paper presents a practical case study of social engineering, malware distribution and phishing attacks against social networking sites that are identified over last few months. It is explained how private data of the users are exposed to attackers and how easily their privacy is compromised as a result of these attacks and their own careless behaviour.

  14. Characteristic features of injuries due to shark attacks: a review of 12 cases.

    PubMed

    Ihama, Yoko; Ninomiya, Kenji; Noguchi, Masamichi; Fuke, Chiaki; Miyazaki, Tetsuji

    2009-09-01

    Shark attacks on humans might not occur as often as is believed and the characteristic features of shark injuries on corpses have not been extensively reviewed. We describe the characteristic features of shark injuries on 12 corpses. The analysis of these injuries might reveal the motivation behind the attacks and/or the shark species involved in the attack. Gouge marks on the bones are evidence of a shark attack, even if the corpse is decomposed. Severance of the body part at the joints without a fracture was found to be a characteristic feature of shark injuries.

  15. Corrosion pitting of SiC by molten salts

    NASA Technical Reports Server (NTRS)

    Jacobson, N. S.; Smialek, J. L.

    1986-01-01

    The corrosion of SiC by thin films of Na2CO3 and Na2SO4 at 1000 C is characterized by a severe pitting attack of the SiC substrate. A range of different Si and SiC substrates were examined to isolate the factors critical to pitting. Two types of pitting attack are identified: attack at structural discontinuities and a crater-like attack. The crater-like pits are correlated with bubble formation during oxidation of the SiC. It appears that bubbles create unprotected regions, which are susceptible to enhanced attack and, hence, pit formation.

  16. Multiple operating system rotation environment moving target defense

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Evans, Nathaniel; Thompson, Michael

    Systems and methods for providing a multiple operating system rotation environment ("MORE") moving target defense ("MTD") computing system are described. The MORE-MTD system provides enhanced computer system security through a rotation of multiple operating systems. The MORE-MTD system increases attacker uncertainty, increases the cost of attacking the system, reduces the likelihood of an attacker locating a vulnerability, and reduces the exposure time of any located vulnerability. The MORE-MTD environment is effectuated by rotation of the operating systems at a given interval. The rotating operating systems create a consistently changing attack surface for remote attackers.

  17. Optimal Resource Allocation in Electrical Network Defense

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yao, Y; Edmunds, T; Papageorgiou, D

    2004-01-15

    Infrastructure networks supplying electricity, natural gas, water, and other commodities are at risk of disruption due to well-engineered and coordinated terrorist attacks. Countermeasures such as hardening targets, acquisition of spare critical components, and surveillance can be undertaken to detect and deter these attacks. Allocation of available countermeasures resources to sites or activities in a manner that maximizes their effectiveness is a challenging problem. This allocation must take into account the adversary's response after the countermeasure assets are in place and consequence mitigation measures the infrastructure operation can undertake after the attack. The adversary may simply switch strategies to avoid countermeasuresmore » when executing the attack. Stockpiling spares of critical energy infrastructure components has been identified as a key element of a grid infrastructure defense strategy in a recent National Academy of Sciences report [1]. Consider a scenario where an attacker attempts to interrupt the service of an electrical network by disabling some of its facilities while a defender wants to prevent or minimize the effectiveness of any attack. The interaction between the attacker and the defender can be described in three stages: (1) The defender deploys countermeasures, (2) The attacker disrupts the network, and (3) The defender responds to the attack by rerouting power to maintain service while trying to repair damage. In the first stage, the defender considers all possible attack scenarios and deploys countermeasures to defend against the worst scenarios. Countermeasures can include hardening targets, acquiring spare critical components, and installing surveillance devices. In the second stage, the attacker, with full knowledge of the deployed countermeasures, attempts to disable some nodes or links in the network to inflict the greatest loss on the defender. In the third stage, the defender re-dispatches power and restores disabled nodes or links to minimize the loss. The loss can be measured in costs, including the costs of using more expensive generators and the economic losses that can be attributed to loss of load. The defender's goal is to minimize the loss while the attacker wants to maximize it. Assuming some level of budget constraint, each side can only defend or attack a limited number of network elements. When an element is attacked, it is assumed that it will be totally disabled. It is assumed that when an element is defended it cannot be disabled, which may mean that it will be restored in a very short time after being attacked. The rest of the paper is organized as follows. Section 2 will briefly review literature related to multilevel programming and network defense. Section 3 presents a mathematical formulation of the electrical network defense problem. Section 4 describes the solution algorithms. Section 5 discusses computational results. Finally, Sec. 6 explores future research directions.« less

  18. Transient Ischemic Attack

    MedlinePlus Videos and Cool Tools

    Transient Ischemic Attack TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood ... The only difference between a stroke and TIA is that with TIA the blockage is transient (temporary). ...

  19. Randomized Prediction Games for Adversarial Machine Learning.

    PubMed

    Rota Bulo, Samuel; Biggio, Battista; Pillai, Ignazio; Pelillo, Marcello; Roli, Fabio

    In spam and malware detection, attackers exploit randomization to obfuscate malicious data and increase their chances of evading detection at test time, e.g., malware code is typically obfuscated using random strings or byte sequences to hide known exploits. Interestingly, randomization has also been proposed to improve security of learning algorithms against evasion attacks, as it results in hiding information about the classifier to the attacker. Recent work has proposed game-theoretical formulations to learn secure classifiers, by simulating different evasion attacks and modifying the classification function accordingly. However, both the classification function and the simulated data manipulations have been modeled in a deterministic manner, without accounting for any form of randomization. In this paper, we overcome this limitation by proposing a randomized prediction game, namely, a noncooperative game-theoretic formulation in which the classifier and the attacker make randomized strategy selections according to some probability distribution defined over the respective strategy set. We show that our approach allows one to improve the tradeoff between attack detection and false alarms with respect to the state-of-the-art secure classifiers, even against attacks that are different from those hypothesized during design, on application examples including handwritten digit recognition, spam, and malware detection.In spam and malware detection, attackers exploit randomization to obfuscate malicious data and increase their chances of evading detection at test time, e.g., malware code is typically obfuscated using random strings or byte sequences to hide known exploits. Interestingly, randomization has also been proposed to improve security of learning algorithms against evasion attacks, as it results in hiding information about the classifier to the attacker. Recent work has proposed game-theoretical formulations to learn secure classifiers, by simulating different evasion attacks and modifying the classification function accordingly. However, both the classification function and the simulated data manipulations have been modeled in a deterministic manner, without accounting for any form of randomization. In this paper, we overcome this limitation by proposing a randomized prediction game, namely, a noncooperative game-theoretic formulation in which the classifier and the attacker make randomized strategy selections according to some probability distribution defined over the respective strategy set. We show that our approach allows one to improve the tradeoff between attack detection and false alarms with respect to the state-of-the-art secure classifiers, even against attacks that are different from those hypothesized during design, on application examples including handwritten digit recognition, spam, and malware detection.

  20. Novel Psychological Formulation and Treatment of "Tic Attacks" in Tourette Syndrome.

    PubMed

    Robinson, Sally; Hedderly, Tammy

    2016-01-01

    One important, but underreported, phenomenon in Tourette syndrome (TS) is the occurrence of "tic attacks." These episodes have been described at conferences as sudden bouts of tics and/or functional tic-like movements, lasting from 15 min to several hours. They have also been described by patients in online TS communities. To date, there are no reports of tic attacks in the literature. The aim of this article is to stimulate discussion and inform clinical practices by describing the clinical presentation of 12 children (mean age 11 years and 3 months; SD = 2 years and 4 months) with TS and tic attacks, with a detailed case report for one case (13-year-old male). These children commonly present acutely to casualty departments and undergo unnecessary medical investigations. Interestingly, all children reported comorbid anxiety, with worries about the tics themselves and an increased internal focus of attention on tics once the attacks had started. In keeping with other children, the index case reported a strong internal focus of attention, with a relationship between physiological sensations/tic urges, worries about having tic attacks, and behavioral responses (e.g., body scanning, situational avoidance, and other responses). In our experience, the attacks reduce with psychological therapy, for example, the index case attended 13 sessions of therapy that included metacognitive and attention training techniques, as well as cognitive-behavioral strategies. Following treatment, an improvement was seen across a range of measures assessing tics, mood, anxiety, and quality of life. Thus, psychological techniques used to treat anxiety disorders are effective at supporting a reduction in tic attacks through modifying attention, worry processes, and negative beliefs. It is hypothesized that an attentional style of threat monitoring, difficulties tolerating internal sensory urges, cognitive misattributions, and maladaptive coping strategies contribute to the onset and maintenance of tic attacks. These cases provide support for the view that tic attacks are triggered and maintained by psychological factors, thereby challenging the view that tic attacks merely reflect extended bouts of tics. As such, we propose that the movements seen in tic attacks may resemble a combination of tics and functional neurological movements, with tic attacks reflecting episodes of panic and anxiety for individuals with TS.

  1. Non-harmful insertion of data mimicking computer network attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Neil, Joshua Charles; Kent, Alexander; Hash, Jr, Curtis Lee

    Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.

  2. Game Theory and Uncertainty Quantification for Cyber Defense Applications

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chatterjee, Samrat; Halappanavar, Mahantesh; Tipireddy, Ramakrishna

    Cyber-system defenders face the challenging task of protecting critical assets and information continually against multiple types of malicious attackers. Defenders typically operate within resource constraints while attackers operate at relatively low costs. As a result, design and development of resilient cyber-systems that can support mission goals under attack while accounting for the dynamics between attackers and defenders is an important research problem.

  3. Identifying Electromagnetic Attacks against Airports

    NASA Astrophysics Data System (ADS)

    Kreth, A.; Genender, E.; Doering, O.; Garbe, H.

    2012-05-01

    This work presents a new and sophisticated approach to detect and locate the origin of electromagnetic attacks. At the example of an airport, a normal electromagnetic environment is defined, in which electromagnetic attacks shall be identified. After a brief consideration of the capabilities of high power electromagnetic sources to produce high field strength values, this contribution finally presents the approach of a sensor network, realizing the identification of electromagnetic attacks.

  4. Execute-Only Attacks against Execute-Only Defenses

    DTIC Science & Technology

    2015-11-13

    attacks that have been widely used to bypass randomization-based memory corruption defenses. A recent technique, Readactor, provides one of the... corruption defenses with various impacts. We analyze the prevalence of opportunities for such attacks in popular code bases and build two proof-of-concept...our countermeasures introduce only a modest additional overhead. I. INTRODUCTION Memory corruption has been a primary vector of attacks against

  5. Epidemiological findings of major chemical attacks in the Syrian war are consistent with civilian targeting: a short report.

    PubMed

    Rodriguez-Llanes, Jose M; Guha-Sapir, Debarati; Schlüter, Benjamin-Samuel; Hicks, Madelyn Hsiao-Rei

    2018-01-01

    Evidence of use of toxic gas chemical weapons in the Syrian war has been reported by governmental and non-governmental international organizations since the war started in March 2011. To date, the profiles of victims of the largest chemical attacks in Syria remain unknown. In this study, we used descriptive epidemiological analysis to describe demographic characteristics of victims of the largest chemical weapons attacks in the Syrian war. We analysed conflict-related, direct deaths from chemical weapons recorded in non-government-controlled areas by the Violation Documentation Center, occurring from March 18, 2011 to April 10, 2017, with complete information on the victim's date and place of death, cause and demographic group. 'Major' chemical weapons events were defined as events causing ten or more direct deaths. As of April 10, 2017, a total of 1206 direct deaths meeting inclusion criteria were recorded in the dataset from all chemical weapons attacks regardless of size. Five major chemical weapons attacks caused 1084 of these documented deaths. Civilians comprised the majority ( n  = 1058, 97.6%) of direct deaths from major chemical weapons attacks in Syria and combatants comprised a minority of 2.4% ( n  = 26). In the first three major chemical weapons attacks, which occurred in 2013, children comprised 13%-14% of direct deaths, ranging in numbers from 2 deaths among 14 to 117 deaths among 923. Children comprised higher proportions of direct deaths in later major chemical weapons attacks, forming 21% ( n  = 7) of 33 deaths in the 2016 major attack and 34.8% ( n  = 32) of 92 deaths in the 2017 major attack. Our finding of an extreme disparity in direct deaths from major chemical weapons attacks in Syria, with 97.6% of victims being civilians and only 2.4% being combatants provides evidence that major chemical weapons attacks were indiscriminate or targeted civilians directly; both violations of International Humanitarian Law (IHL). Identifying and quantifying chemical weapons violations requires inter-disciplinary collaboration to inform international policy, humanitarian intervention and legal action.

  6. The Alberta Stroke Prevention in TIAs and mild strokes (ASPIRE) intervention: rationale and design for evaluating the implementation of a province-wide TIA triaging system.

    PubMed

    Jeerakathil, Thomas; Shuaib, Ashfaq; Majumdar, Sumit R; Demchuk, Andrew M; Butcher, Kenneth S; Watson, Tim J; Dean, Naeem; Gordon, Deb; Edmond, Cathy; Coutts, Shelagh B

    2014-10-01

    Stroke risk after transient ischaemic attack is high and, it is a challenge worldwide to provide urgent assessment and preventive services to entire populations. To determine whether a province-wide transient ischaemic attack Triaging algorithm and transient ischaemic attack hotline (the Alberta Stroke Prevention in transient ischaemic attacks and mild strokes intervention) can reduce the rate of stroke recurrence following transient ischaemic attack across the population of Alberta, Canada (population 3·7 million, 90-day rate of post-stroke transient ischaemic attack currently 9·5%). It also seeks to improve upon current transient ischaemic attack triaging rules by incorporating time from symptom onset as a predictive variable. The transient ischaemic attack algorithm and hotline were developed with a broad consensus of clinicians, patients, policy-makers, and researchers and based on local adaptation of the work of others and research and insights developed within the province. Because neither patient-level nor region-level randomization was possible, we conducted a quasi-experimental design examining changes in the post-transient ischaemic attack rate of stroke recurrence before and after the 15-month implementation period using an interrupted time-series regression analysis. The design controls for changes in case-mix, co-interventions, and secular trends. A prospective transient ischaemic attack cohort will also be concurrently created with telephone follow-up at seven-days and 90 days as well as passive follow-up over the longer term using linkages to provincial healthcare administrative databases. The primary outcome measure is the change in recurrence rate of stroke following transient ischaemic attack at seven-days and 90 days, comparing a period of two-years before vs. two-years after the intervention is implemented. All cases of recurrent stroke will be validated. Secondary outcomes include functional status, hospitalizations, morbidity, and mortality. We are undertaking a rigorous evaluation of a population-based approach to improving quality of transient ischaemic attack care. Whether positive or negative, our work should provide important insights for all potential stakeholders. © 2012 The Authors. International Journal of Stroke © 2012 World Stroke Organization.

  7. Weight Stigma Goes Viral on the Internet: Systematic Assessment of YouTube Comments Attacking Overweight Men and Women

    PubMed Central

    Hale, Brent; Knackmuhs, Eric; Mackert, Michael

    2018-01-01

    Background Anonymous verbal attacks against overweight individuals on social media are common and widespread. These comments often use negative, misogynist, or derogatory words, which stigmatize the targeted individuals with obesity. These verbal attacks may cause depression in overweight individuals, which could subsequently promote unhealthy eating behavior (ie, binge eating) and further weight gain. To develop an intervention policy and strategies that tackle the anonymous, Web-based verbal attacks, a thorough understanding of the comments is necessary. Objective This study aimed to examine how anonymous users verbally attack or defend overweight individuals in terms of 3 themes: (1) topic of verbal attack (ie, what aspects of overweight individuals are verbally attacked), (2) gender of commenters and targeted overweight individuals, and (3) intensity of derogation depending on the targeted gender (ie, the number of swear words used within comments). Methods This study analyzed the content of YouTube comments that discuss overweight individuals or groups from 2 viral videos, titled “Fat Girl Tinder Date” and “Fat Guy Tinder Date.” The twin videos provide an avenue through which to analyze discussions of obesity as they organically occurred in a contemporary setting. We randomly sampled and analyzed 320 comments based on a coding instrument developed for this study. Results First, there were twice as many comments verbally attacking overweight individuals (n=174) than comments defending them (n=89). Second, overweight women are attacked for their capacities (eg, laziness, maturity; 14/51, 28%), whereas overweight men are attacked for their heterosocial skills (eg, rudeness, annoyance; 24/29, 83%). Third, the majority of commenters who attacked overweight women are male (42/52, 81%). Fourth, attacking comments generated toward overweight women included more swear words (mean 0.44, SD 0.77) than those targeting men (mean 0.23, SD 0.48). Conclusions Our data elucidate a worrying situation of frequent disinhibited aggressive messages against overweight individuals online. Importantly, the patterns of verbal aggression differ depending on the gender of the targeted overweight individuals. Thus, gender-tailored intervention strategies that specifically tackle Internet users’ verbal aggression against overweight individuals need to be developed. PMID:29559426

  8. Shark attacks in Dakar and the Cap Vert Peninsula, Senegal: low incidence despite high occurrence of potentially dangerous species.

    PubMed

    Trape, Sébastien

    2008-01-30

    The International Shark Attack File mentions only four unprovoked shark attacks on the coast of West Africa during the period 1828-2004, an area where high concentrations of sharks and 17 species potentially dangerous to man have been observed. To investigate if the frequency of shark attacks could be really low and not just under-reported and whether there are potentially sharks that might attack in the area, a study was carried out in Dakar and the Cap Vert peninsula, Senegal. Personnel of health facilities, administrative services, traditional authorities and groups of fishermen from the region of Dakar were interviewed about the occurrence of shark attacks, and visual censuses were conducted along the coastline to investigate shark communities associated with the coasts of Dakar and the Cap Vert peninsula. Six attacks were documented for the period 1947-2005, including two fatal ones attributed to the tiger shark Galeocerdo cuvieri. All attacks concerned fishermen and only one occurred after 1970. Sharks were observed year round along the coastline in waters 3-15 m depth. Two species potentially dangerous for man, the nurse shark Ginglymostoma cirratum and the blacktip shark Carcharhinus limbatus, represented together 94% of 1,071 sharks enumerated during 1,459 hours of observations. Threatening behaviour from sharks was noted in 12 encounters (1.1%), including 8 encounters with C. limbatus, one with Galeocerdo cuvieri and 3 with unidentified sharks. These findings suggest that the frequency of shark attacks on the coast of West Africa is underestimated. However, they also indicate that the risk is very low despite the abundance of sharks. In Dakar area, most encounters along the coastline with potentially dangerous species do not result in an attack. Compared to other causes of water related deaths, the incidence of shark attack appears negligible, at least one thousand fold lower.

  9. Factors associated with recovery from acute optic neuritis in patients with multiple sclerosis.

    PubMed

    Malik, Muhammad Taimur; Healy, Brian C; Benson, Leslie A; Kivisakk, Pia; Musallam, Alexander; Weiner, Howard L; Chitnis, Tanuja

    2014-06-17

    To identify clinical and demographic features associated with the severity and recovery from acute optic neuritis (AON) episodes in patients with multiple sclerosis (MS). Adult (n = 253) and pediatric (n = 38) patients whose first symptom was AON were identified from our MS database. Severity measured by loss of visual acuity (mild attack ≤20/40, moderate attack 20/50-20/190, and severe attack ≥20/200) and recovery in visual acuity at 1 year after the attack (complete recovery ≤20/20, fair recovery 20/40, and poor recovery ≥20/50) were recorded. Demographic and clinical features associated with attack severity and recovery were identified using proportional odds logistic regression. For another group of patients, blood samples were available within 6 months of an AON attack. In this group, the impact of vitamin D level on the severity/recovery was also assessed. Men (adjusted odds ratio [OR] = 2.28, p = 0.03) and subjects with severe attacks (adjusted OR = 5.24, p < 0.001) had worse recovery. AON severity was similar between the pediatric and adult subjects, but recovery was significantly better in pediatric subjects in the unadjusted analysis (p = 0.041) and the analysis adjusted for sex (p = 0.029). Season-adjusted vitamin D level was significantly associated with attack severity (OR for 10-U increase in vitamin D level = 0.47; 95% confidence interval: 0.32, 0.68; p < 0.001). Vitamin D level was not associated with recovery from the attack (p = 0.98) in univariate analysis or after accounting for attack severity (p = 0.10). Vitamin D levels affect AON severity, whereas younger age, attack severity, and male sex affect AON recovery. Underlying mechanisms and potential therapeutic targets may identify new measures to mitigate disability accrual in MS. © 2014 American Academy of Neurology.

  10. Shark Attacks in Dakar and the Cap Vert Peninsula, Senegal: Low Incidence despite High Occurrence of Potentially Dangerous Species

    PubMed Central

    Trape, Sébastien

    2008-01-01

    Background The International Shark Attack File mentions only four unprovoked shark attacks on the coast of West Africa during the period 1828–2004, an area where high concentrations of sharks and 17 species potentially dangerous to man have been observed. To investigate if the frequency of shark attacks could be really low and not just under-reported and whether there are potentially sharks that might attack in the area, a study was carried out in Dakar and the Cap Vert peninsula, Senegal. Methodology/Principal Findings Personnel of health facilities, administrative services, traditional authorities and groups of fishermen from the region of Dakar were interviewed about the occurrence of shark attacks, and visual censuses were conducted along the coastline to investigate shark communities associated with the coasts of Dakar and the Cap Vert peninsula. Six attacks were documented for the period 1947–2005, including two fatal ones attributed to the tiger shark Galeocerdo cuvieri. All attacks concerned fishermen and only one occurred after 1970. Sharks were observed year round along the coastline in waters 3–15 m depth. Two species potentially dangerous for man, the nurse shark Ginglymostoma cirratum and the blacktip shark Carcharhinus limbatus, represented together 94% of 1,071 sharks enumerated during 1,459 hours of observations. Threatening behaviour from sharks was noted in 12 encounters (1.1%), including 8 encounters with C. limbatus, one with Galeocerdo cuvieri and 3 with unidentified sharks. Conclusions/Significance These findings suggest that the frequency of shark attacks on the coast of West Africa is underestimated. However, they also indicate that the risk is very low despite the abundance of sharks. In Dakar area, most encounters along the coastline with potentially dangerous species do not result in an attack. Compared to other causes of water related deaths, the incidence of shark attack appears negligible, at least one thousand fold lower. PMID:18231582

  11. Patients' perceptions of their heart attack and recovery: the influence of epidemiological "evidence" and personal experience.

    PubMed

    Wiles, R

    1998-06-01

    Secondary prevention of heart disease is widely viewed as likely to be more successful and cost effective than primary prevention. However, people's willingness to adopt lifestyle change is a complex issue in which people's perceptions of disease causation and risk as well as a range of socio-economic factors are important. This paper reports on a qualitative study of people following heart attack which examines their understandings of heart attack and the salience that lifestyle advice has in the light of these understandings. In-depth, qualitative interviews were conducted with 25 people recovering from heart attack. Each person was interviewed twice: at around two weeks and five months following their heart attack. The study found that information about recovery provided by health professionals was based on a simplified version of epidemiological evidence. This information played a central role in people's understandings about the nature of heart attack and their future risk in the early weeks following heart attack. However, as interviewees came to terms with the shock of the event, they tended to lose their trust in "official" accounts of cause and recovery and evidence from lay epidemiology that contradicted official accounts tended to emerge. This evidence encouraged interviewees to question the explanatory power of official accounts and to view the adoption of long-term lifestyle change as an action that would not guarantee protection from a further heart attack. This was true whether or not people's experiences of recovery reflected those "predicted" by health professionals although those awaiting further surgery or tests tended to maintain trust in official accounts over a longer period. It is concluded that the failure of official accounts to acknowledge the random nature of the occurrence of heart attack, the severity of heart attack and the level of recovery from heart attack is a central feature in people's reluctance to view lifestyle change as a rational action to take to prevent a further cardiac event.

  12. What happens in the pith stays in the pith: tissue-localized defense responses facilitate chemical niche differentiation between two spatially separated herbivores.

    PubMed

    Lee, Gisuk; Joo, Youngsung; Kim, Sang-Gyu; Baldwin, Ian T

    2017-11-01

    Herbivore attack is known to elicit systemic defense responses that spread throughout the host plant and influence the performance of other herbivores. While these plant-mediated indirect competitive interactions are well described, and the co-existence of herbivores from different feeding guilds is common, the mechanisms of co-existence are poorly understood. In both field and glasshouse experiments with a native tobacco, Nicotiana attenuata, we found no evidence of negative interactions when plants were simultaneously attacked by two spatially separated herbivores: a leaf chewer Manduca sexta and a stem borer Trichobaris mucorea. T. mucorea attack elicited jasmonic acid (JA) and jasmonoyl-l-isoleucine bursts in the pith of attacked stems similar to those that occur in leaves when M. sexta attacks N. attenuata leaves. Pith chlorogenic acid (CGA) levels increased 1000-fold to levels 6-fold higher than leaf levels after T. mucorea attack; these increases in pith CGA levels, which did not occur in M. sexta-attacked leaves, required JA signaling. With plants silenced in CGA biosynthesis (irHQT plants), CGA, as well as other caffeic acid conjugates, was demonstrated in both glasshouse and field experiments to function as a direct defense protecting piths against T. mucorea attack, but not against leaf chewers or sucking insects. T. mucorea attack does not systemically activate JA signaling in leaves, while M. sexta leaf-attack transiently induces detectable but minor pith JA levels that are dwarfed by local responses. We conclude that tissue-localized defense responses allow tissue-specialized herbivores to share the same host and occupy different chemical defense niches in the same hostplant. © 2017 The Authors The Plant Journal © 2017 John Wiley & Sons Ltd.

  13. Interaction of Insecticide and Media Moisture on Ambrosia Beetle (Coleoptera: Curculionidae) Attacks on Selected Ornamental Trees.

    PubMed

    Frank, Steven D; Anderson, Amanda L; Ranger, Christopher M

    2017-12-08

    Exotic ambrosia beetles, particularly Xylosandrus crassiusculus (Motschulsky) (Coleoptera: Curculionidae: Scolytinae) and Xylosandrus germanus (Blandford) (Coleoptera: Curculionidae: Scolytinae), are among the most damaging pests of ornamental trees in nurseries. Growers have had few tactics besides insecticide applications to reduce ambrosia beetle attacks but recent research has shown that attacks may be reduced by maintaining media moisture below a 50% threshold thereby reducing flood stress. We compared the efficacy of managing media moisture and insecticide applications for reducing ambrosia beetle attacks on three ornamental tree species in North Carolina. During trials in spring 2013 and 2015, flooded Cornus florida and Cornus kousa were heavily attacked despite sprays with permethrin, but nonflooded C. kousa or C. florida were not attacked. In spring 2015 trials, both nonflooded and flooded Styrax japonicus were heavily attacked regardless of permethrin applications. Although ethanol emissions were not measured, the apparently healthy nonflooded S. japonicus trees may have been exposed to an unknown physiological stress, such as low temperature injury, the previous winter, which predisposed them to beetle attack. However, ethanol levels within host tissues were not measured as part of the current study. X. crassiusculus (75%), Xyloborinus saxesenii Ratzburg (13%), and X. germanus (9%) were the most abundant species collected in ethanol baited traps deployed in 2015, while X. crassiusculus (63%) and X. germanus (36%) were the predominant species reared from attacked trees. Results indicate that managing media moisture levels at or below 50%, and maximizing tree health overall, may provide significant protection against Xylosandrus spp. attacks in flood intolerant tree species. © The Authors 2017. Published by Oxford University Press on behalf of Entomological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  14. Classification of HTTP Attacks: A Study on the ECML/PKDD 2007 Discovery Challenge

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gallagher, Brian; Eliassi-Rad, Tina

    2009-07-08

    As the world becomes more reliant on Web applications for commercial, financial, and medical transactions, cyber attacks on the World Wide Web are increasing in frequency and severity. Web applications provide an attractive alternative to traditional desktop applications due to their accessibility and ease of deployment. However, the accessibility of Web applications also makes them extremely vulnerable to attack. This inherent vulnerability is intensified by the distributed nature ofWeb applications and the complexity of configuring application servers. These factors have led to a proliferation of Web-based attacks, in which attackers surreptitiously inject code into HTTP requests, allowing them to executemore » arbitrary commands on remote systems and perform malicious activities such as reading, altering, or destroying sensitive data. One approach for dealing with HTTP-based attacks is to identify malicious code in incoming HTTP requests and eliminate bad requests before they are processed. Using machine learning techniques, we can build a classifier to automatically label requests as “Valid” or “Attack.” For this study, we develop a simple, but effective HTTP attack classifier, based on the vector space model used commonly for Information Retrieval. Our classifier not only separates attacks from valid requests, but can also identify specific attack types (e.g., “SQL Injection” or “Path Traversal”). We demonstrate the effectiveness of our approach through experiments on the ECML/PKDD 2007 Discovery Challenge data set. Specifically, we show that our approach achieves higher precision and recall than previous methods. In addition, our approach has a number of desirable characteristics, including robustness to missing contextual information, interpretability of models, and scalability.« less

  15. Anger attacks in bipolar versus recurrent depression.

    PubMed

    Grover, Sandeep; Painuly, Nitesh; Gupta, Nitin; Mattoo, Surendra K

    2011-01-01

    Research on anger attacks has been mostly limited to unipolar depression, and only a few studies have focused on anger attacks in bipolar depression. In a cross-sectional study, 22 subjects with bipolar depression were compared to 22 subjects with recurrent unipolar depression using an anger attack questionnaire, irritability, depression and anxiety scale and quality of life scale. Anger attacks were present in 62.5% subjects with recurrent depression (RDD group) compared to 54.5% in subjects with bipolar depression (BD group), but the difference between the groups was not statistically significant. Also, there was no significant difference between the RDD and BD groups on the Irritability Depression and Anxiety Scale and WHOQOL-Bref except that the BD group had a poorer quality of life (QOL) compared to the RDD group in the social relationship domain (t=-2.30, p<0.05). In the BD group, the subjects with anger attacks were older (t=2.77, p<0.05), had significantly higher scores on the Irritability-Outwards component of IDA (t=3.90, p<0.01) and shorter duration of illness (Mann Whitney Signed ranked value 20.00, p<0.01) and duration of treatment (Mann Whitney Signed ranked value 28.00, p<0.05) compared to BD group members without anger attacks. In the RDD group, the subjects with anger attacks had poor QOL in the social domain (t= -2.12, p<0.05), environmental domain (t=2.99, p=.01) and total (t=2.56, p<0.05) QOL compared to those without anger attacks. Anger attacks are equally prevalent in unipolar and bipolar depression, are not influenced by sociodemographic and clinical variables, and lead to comparable impact on the subjective QOL in both groups.

  16. Smoking Behavior and Alcohol Consumption in Individuals With Panic Attacks

    PubMed Central

    Mathew, Amanda R.; Norton, Peter J.; Zvolensky, Michael J.; Buckner, Julia D.; Smits, Jasper A. J.

    2011-01-01

    Individuals with anxiety often report greater smoking and drinking behaviors relative to those without a history of anxiety. In particular, smoking and alcohol use have been directly implicated among individuals experiencing panic attacks, diagnosed with panic disorder, or high on panic-relevant risk factors such as anxiety sensitivity. Less is known, however, about specific features of panic that may differentiate among those who do or do not use cigarettes or alcohol. The purpose of the current study was to replicate previous research findings of an association between panic symptomatology, cigarette smoking, and alcohol consumption, as well as extend findings by examining whether specific symptoms of panic attacks differentiated among those who do or do not use cigarettes or alcohol. Participants (n = 489) completed the Panic Attack Questionnaire-IV, a highly detailed assessment of panic attacks and symptoms, as well as self-report measures of smoking history and alcohol use. Consistent with previous research, participants who reported a history of panic attacks (n = 107) were significantly more likely to report current daily or lifetime daily cigarette smoking, and significantly greater hazardous or harmful alcohol use than participants with no panic history (n = 382). Although smoking and hazardous alcohol use were highly associated regardless of panic status, participants with panic attacks showed elevated hazardous alcohol use after controlling for daily or lifetime smoking. Surprisingly, although participants who reported having had at least one panic attack were more likely to smoke, panic attack symptoms, intensity, or frequency did not differentiate panickers who did or did not smoke. Furthermore, panic-related variables were not shown to differentially relate to problematic drinking among panickers. Implications for understanding the complex relationship between panic attacks and smoking and drinking behaviors are discussed. PMID:21915160

  17. Pre-attack symptomatology and temperament as predictors of children's responses to the September 11 terrorist attacks.

    PubMed

    Lengua, Liliana J; Long, Anna C; Smith, Kimberlee I; Meltzoff, Andrew N

    2005-06-01

    The aims of this study were to assess the psychological response of children following the September 11, 2001 terrorist attacks in New York and Washington, DC and to examine prospective predictors of children's post-attack responses. Children's responses were assessed in a community sample of children in Seattle, Washington, participating in an ongoing study. Symptomatology and temperament assessed prior to the attacks were examined as prospective predictors of post-attack post-traumatic stress (PTS), anxiety, depression and externalizing problems. Children demonstrated PTS symptoms and worries at levels comparable to those in children directly experiencing disasters, with 77% of children reporting being worried, 68% being upset by reminders, and 39% having upsetting thoughts. The most common PTS symptom cluster was re-experiencing, and 8% of children met criteria consistent with PTSD. African-American children reported more avoidant PTS symptoms and being more upset by the attacks than European-American children. Girls reported being more upset than boys. Prior internalizing, externalizing, social competence and self-esteem were related to post-attack PTS; and child inhibitory control, assessed prior to the 9/11 attacks, demonstrated a trend towards an association with post-attack PTS symptoms controlling for prior levels of symptomatology. PTS predicted child-report anxiety and conduct problem symptoms at follow-up, approximately 6 months after 9/11. Children experiencing a major disaster at a distance or indirectly through media exposure demonstrated worries and PTS symptoms suggesting that communities need to attend to children's mental health needs in response to national or regional disasters. Pre-disaster symptomatology or low self-regulation may render children more vulnerable in response to a disaster, and immediate post-disaster responses predict subsequent symptomatology. These variables might be used in the identification of children in need of intervention.

  18. Analyzing Cyber-Physical Threats on Robotic Platforms.

    PubMed

    Ahmad Yousef, Khalil M; AlMajali, Anas; Ghalyon, Salah Abu; Dweik, Waleed; Mohd, Bassam J

    2018-05-21

    Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBot TM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications.

  19. Disparities in adult awareness of heart attack warning signs and symptoms--14 states, 2005.

    PubMed

    2008-02-22

    In 2005, approximately 920,000 persons in the United States had a myocardial infarction (i.e., heart attack); in 2004, approximately 157,000 heart attacks were fatal. One study indicated that approximately half of cardiac deaths occur within 1 hour of symptom onset, before patients reach a hospital. Timely access to emergency cardiac care, receipt of advanced treatment, and potential for surviving a heart attack all depend on 1) early recognition of warning signs and symptoms of a heart attack by persons who are having a heart attack and bystanders and 2) immediately calling 9-1-1. Healthy People 2010 includes an objective to increase from 46% to 50% the proportion of adults aged > or =20 years who are aware of the early warning signs and symptoms of a heart attack and the importance of accessing rapid emergency care by calling 9-1-1 (objective 12-2). To update estimates of public awareness of heart attack warning signs and symptoms and knowledge of the importance of calling 9-1-1, CDC analyzed 2005 Behavioral Risk Factor Surveillance System (BRFSS) data from the 14 states that included questions on signs and symptoms of a heart attack. This report describes the results of that analysis, which indicated that although the awareness of certain individual warning signs was as high as 93% (i.e., for shortness of breath), awareness of all five warning signs was 31%, underscoring the need for public health measures to increase public awareness of heart attack warning signs and symptoms. In addition, disparities in awareness were observed by race/ethnicity, sex, and level of education, suggesting that new public health measures should target populations with the lowest levels of awareness.

  20. Lethal Trap Trees and Semiochemical Repellents as Area Host Protection Strategies for Spruce Beetle (Coleoptera: Curculionidae, Scolytinae) in Utah.

    PubMed

    Matthew Hansen, E; Steven Munson, A; Blackford, Darren C; Wakarchuk, David; Scott Baggett, L

    2016-10-01

    We tested lethal trap trees and repellent semiochemicals as area treatments to protect host trees from spruce beetle (Dendroctonus rufipennis Kirby) attacks. Lethal trap tree treatments ("spray treatment") combined a spruce beetle bait with carbaryl treatment of the baited spruce. Repellent treatments ("spray-repellent") combined a baited lethal trap tree within a 16-m grid of MCH (3-methylcyclohex-2-en-1-one) and two novel spruce beetle repellents. After beetle flight, we surveyed all trees within 50 m of plot center, stratified by 10-m radius subplots, and compared attack rates to those from baited and unbaited control plots. Compared to the baited controls, spruce in the spray treatment had significantly reduced likelihood of a more severe attack classification (e.g., mass-attacked over strip-attacked or unsuccessful-attacked over unattacked). Because spruce in the spray treatment also had significantly heightened probability of more severe attack classification than those in the unbaited controls, however, we do not recommend lethal trap trees as a stand-alone beetle suppression strategy for epidemic beetle populations. Spruce in the spray-repellent treatment were slightly more likely to be classified as more severely attacked within 30 m of plot center compared to unbaited controls but, overall, had reduced probabilities of beetle attack over the entire 50-m radius plots. The semiochemical repellents deployed in this study were effective at reducing attacks on spruce within treated plots despite the presence of a centrally located spruce beetle bait. Further testing will be required to clarify operational protocols such as dose, elution rate, and release device spacing. Published by Oxford University Press on behalf of Entomological Society of America 2016. This work is written by US Government employees and is in the public domain in the US.

  1. Population biology of the European woodwasp, Sirex noctilio, in Galicia, Spain.

    PubMed

    Lombardero, M J; Ayres, M P; Krivak-Tetley, F E; Fitza, K N E

    2016-10-01

    Sirex noctilio Fabricius (Hymenoptera, Siricidae) is rare and rarely studied where it is native in Eurasia, but is a widespread pest of pines in the Southern Hemisphere. Here we report on the abundance, basic biology, host use patterns and natural enemies of native S. noctilio in Galicia, Spain. Most trees attacked by S. noctilio failed to produce any adult progeny: >90% of emergences came from <20% of the attacked trees. The highest reproduction was in Pinus pinaster, followed by Pinus sylvestris and Pinus radiata. The proportions of S. noctilio requiring 1, 2 or 3 years for development were 0.72: 0.24: 0.04. Delayed development could be an adaptation to avoid parasitic nematodes, which sterilized 41.5% adults with one year generation time but only 19% of adults with 2 years generation time. Hymenoptera parasitoids accounted for 20% mortality. Sex ratios were male biased at 1: 2.9. Body size and fecundity were highly variable and lower than previously reported from the Southern Hemisphere. On attacked trees, there were 5-20 attacks per standard log (18 dm2), with usually 1-3 drills per attack. Attack densities and drills per attack were higher in trees that subsequently died. The production of S. noctilio per log was positively related to total attacks, and negatively related to: (1) attack density, (2) incidence of blue stain from Ophiostoma fungi and (3) frequency of lesions in plant tissue around points of attack. A preliminary life table for S. noctilio in Galicia estimated effects on potential population growth rate from (in decreasing order of importance) host suitability, unequal sex ratio, parasitic nematodes and Hymenoptera parasitoids.

  2. Human-Wildlife Conflicts in Nepal: Patterns of Human Fatalities and Injuries Caused by Large Mammals.

    PubMed

    Acharya, Krishna Prasad; Paudel, Prakash Kumar; Neupane, Prem Raj; Köhl, Michael

    2016-01-01

    Injury and death from wildlife attacks often result in people feeling violent resentment and hostility against the wildlife involved and, therefore, may undermine public support for conservation. Although Nepal, with rich biodiversity, is doing well in its conservation efforts, human-wildlife conflicts have been a major challenge in recent years. The lack of detailed information on the spatial and temporal patterns of human-wildlife conflicts at the national level impedes the development of effective conflict mitigation plans. We examined patterns of human injury and death caused by large mammals using data from attack events and their spatiotemporal dimensions collected from a national survey of data available in Nepal over five years (2010-2014). Data were analyzed using logistic regression and chi-square or Fisher's exact tests. The results show that Asiatic elephants and common leopards are most commonly involved in attacks on people in terms of attack frequency and fatalities. Although one-horned rhinoceros and bears had a higher frequency of attacks than Bengal tigers, tigers caused more fatalities than each of these two species. Attacks by elephants peaked in winter and most frequently occurred outside protected areas in human settlements. Leopard attacks occurred almost entirely outside protected areas, and a significantly greater number of attacks occurred in human settlements. Attacks by one-horned rhinoceros and tigers were higher in the winter, mainly in forests inside protected areas; similarly, attacks by bears occurred mostly within protected areas. We found that human settlements are increasingly becoming conflict hotspots, with burgeoning incidents involving elephants and leopards. We conclude that species-specific conservation strategies are urgently needed, particularly for leopards and elephants. The implications of our findings for minimizing conflicts and conserving these imperiled species are discussed.

  3. Panic attacks and panic disorder in a population-based sample of active Canadian military personnel.

    PubMed

    Kinley, D Jolene; Walker, John R; Mackenzie, Corey S; Sareen, Jitender

    2011-01-01

    The factors contributing to psychiatric problems among military personnel, particularly for panic, are unclear. The objective of this study was to examine the prevalence and correlates of panic disorder and panic attacks in the Canadian military. Statistics Canada and the Department of National Defense conducted the Canadian Community Health Survey-Canadian Forces Supplement in 2002 (May to December) with a representative sample of active Canadian military personnel (aged 16-54 years; N = 8,441; response rate, 81.5%). Comparisons were made between respondents with no past-year panic attacks, panic attacks without panic disorder, and panic disorder on measures of DSM-IV mental disorders, as well as validated measures of disability, distress, suicidal ideation, perceived need for mental health treatment, and mental health service use. Lifetime exposure to combat operations, witnessing of atrocities, and deployments were also assessed. Panic disorder and panic attacks were common in the military population, with past-year prevalence estimates of 1.8% and 7.0%, respectively. Both panic disorder and panic attacks were associated with increased odds of all mental disorders assessed, suicidal ideation, 2-week disability, and distress. Perceived need for mental health treatment and service use were common in individuals with panic attacks and panic disorder (perceived need: 46.3% for panic attacks, 89.6% for panic disorder; service use: 32.5% for panic attacks, 74.5% for panic disorder). Panic attacks and panic disorder in the military are associated with outcomes that could be detrimental to well-being and work performance, and early detection of panic in this population could help reduce these negative outcomes. © Copyright 2011 Physicians Postgraduate Press, Inc.

  4. Analyzing Cyber-Physical Threats on Robotic Platforms †

    PubMed Central

    2018-01-01

    Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBotTM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications. PMID:29883403

  5. Signal signature and transcriptome changes of Arabidopsis during pathogen and insect attack.

    PubMed

    De Vos, Martin; Van Oosten, Vivian R; Van Poecke, Remco M P; Van Pelt, Johan A; Pozo, Maria J; Mueller, Martin J; Buchala, Antony J; Métraux, Jean-Pierre; Van Loon, L C; Dicke, Marcel; Pieterse, Corné M J

    2005-09-01

    Plant defenses against pathogens and insects are regulated differentially by cross-communicating signaling pathways in which salicylic acid (SA), jasmonic acid (JA), and ethylene (ET) play key roles. To understand how plants integrate pathogen- and insect-induced signals into specific defense responses, we monitored the dynamics of SA, JA, and ET signaling in Arabidopsis after attack by a set of microbial pathogens and herbivorous insects with different modes of attack. Arabidopsis plants were exposed to a pathogenic leaf bacterium (Pseudomonas syringae pv. tomato), a pathogenic leaf fungus (Alternaria brassicicola), tissue-chewing caterpillars (Pieris rapae), cell-content-feeding thrips (Frankliniella occidentalis), or phloem-feeding aphids (Myzus persicae). Monitoring the signal signature in each plant-attacker combination showed that the kinetics of SA, JA, and ET production varies greatly in both quantity and timing. Analysis of global gene expression profiles demonstrated that the signal signature characteristic of each Arabidopsis-attacker combination is orchestrated into a surprisingly complex set of transcriptional alterations in which, in all cases, stress-related genes are overrepresented. Comparison of the transcript profiles revealed that consistent changes induced by pathogens and insects with very different modes of attack can show considerable overlap. Of all consistent changes induced by A. brassicicola, Pieris rapae, and E occidentalis, more than 50% also were induced consistently by P. syringae. Notably, although these four attackers all stimulated JA biosynthesis, the majority of the changes in JA-responsive gene expression were attacker specific. All together, our study shows that SA, JA, and ET play a primary role in the orchestration of the plant's defense response, but other regulatory mechanisms, such as pathway cross-talk or additional attacker-induced signals, eventually shape the highly complex attacker-specific defense response.

  6. WILD PIG ATTACKS ON HUMANS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mayer, J.

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animalsmore » were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.« less

  7. Human-Wildlife Conflicts in Nepal: Patterns of Human Fatalities and Injuries Caused by Large Mammals

    PubMed Central

    Acharya, Krishna Prasad; Paudel, Prakash Kumar; Neupane, Prem Raj; Köhl, Michael

    2016-01-01

    Injury and death from wildlife attacks often result in people feeling violent resentment and hostility against the wildlife involved and, therefore, may undermine public support for conservation. Although Nepal, with rich biodiversity, is doing well in its conservation efforts, human-wildlife conflicts have been a major challenge in recent years. The lack of detailed information on the spatial and temporal patterns of human-wildlife conflicts at the national level impedes the development of effective conflict mitigation plans. We examined patterns of human injury and death caused by large mammals using data from attack events and their spatiotemporal dimensions collected from a national survey of data available in Nepal over five years (2010–2014). Data were analyzed using logistic regression and chi-square or Fisher's exact tests. The results show that Asiatic elephants and common leopards are most commonly involved in attacks on people in terms of attack frequency and fatalities. Although one-horned rhinoceros and bears had a higher frequency of attacks than Bengal tigers, tigers caused more fatalities than each of these two species. Attacks by elephants peaked in winter and most frequently occurred outside protected areas in human settlements. Leopard attacks occurred almost entirely outside protected areas, and a significantly greater number of attacks occurred in human settlements. Attacks by one-horned rhinoceros and tigers were higher in the winter, mainly in forests inside protected areas; similarly, attacks by bears occurred mostly within protected areas. We found that human settlements are increasingly becoming conflict hotspots, with burgeoning incidents involving elephants and leopards. We conclude that species-specific conservation strategies are urgently needed, particularly for leopards and elephants. The implications of our findings for minimizing conflicts and conserving these imperiled species are discussed. PMID:27612174

  8. Heart Diseases and Disorders

    MedlinePlus

    ... the risk of injuries from falling. Circulatory Disorders Heart Attack (Myocardial Infarction ) When arteries become so clogged that ... damage or kill the heart muscle, causing a heart attack . Knowing the symptoms of a heart attack and ...

  9. Panic Disorder

    MedlinePlus

    ... your head? No. Most likely, you had a panic attack. Panic attacks can last from minutes to hours. They may ... made after a person experiences at least 2 panic attacks that occur without reason and are followed by ...

  10. Thrombolytic drugs for heart attack

    MedlinePlus

    ... gov/ency/article/007488.htm Thrombolytic drugs for heart attack To use the sharing features on this page, ... supply blood and oxygen to the heart. A heart attack can occur if a blood clot stops the ...

  11. Heart Attack Coronary Artery Disease

    MedlinePlus

    ... our e-newsletter! Aging & Health A to Z Heart Attack Coronary Artery Disease, Angina Basic Facts & Information What ... and oxygen supply; this is what causes a heart attack. If the damaged area is small, however, your ...

  12. Pericarditis - after heart attack

    MedlinePlus

    ... medlineplus.gov/ency/article/000166.htm Pericarditis - after heart attack To use the sharing features on this page, ... occur in the days or weeks following a heart attack . Causes Two types of pericarditis can occur after ...

  13. Prediction of the noise from a propeller at angle of attack

    NASA Technical Reports Server (NTRS)

    Krejsa, Eugene A.

    1990-01-01

    An analysis is presented to predict the noise of a propeller at angle of attack. The analysis is an extension of that reported by Mani which predicted the change in noise due to angle of attack to both unsteady loading and to azimuthal variation of the radiation efficiency of steady noise sources. Mani's analysis, however, was limited to small angles of attack. The analysis reported herein removes this small angle limitation. Results from the analysis are compared with the data of Woodward for a single rotation propeller and a counter rotating propeller. The comparison shows that including the effect of angle of attack on the steady noise sources significantly improves the agreement with data. Including higher order effects of angle of attack, while changing the predicted noise at far forward and aft angles, has little effect near the propeller plane.

  14. A Taxonomy of Attacks on the DNP3 Protocol

    NASA Astrophysics Data System (ADS)

    East, Samuel; Butts, Jonathan; Papa, Mauricio; Shenoi, Sujeet

    Distributed Network Protocol (DNP3) is the predominant SCADA protocol in the energy sector - more than 75% of North American electric utilities currently use DNP3 for industrial control applications. This paper presents a taxonomy of attacks on the protocol. The attacks are classified based on targets (control center, outstation devices and network/communication paths) and threat categories (interception, interruption, modification and fabrication). To facilitate risk analysis and mitigation strategies, the attacks are associated with the specific DNP3 protocol layers they exploit. Also, the operational impact of the attacks is categorized in terms of three key SCADA objectives: process confi- dentiality, process awareness and process control. The attack taxonomy clarifies the nature and scope of the threats to DNP3 systems, and can provide insights into the relative costs and benefits of implementing mitigation strategies.

  15. Anti-social networking: crowdsourcing and the cyber defence of national critical infrastructures.

    PubMed

    Johnson, Chris W

    2014-01-01

    We identify four roles that social networking plays in the 'attribution problem', which obscures whether or not cyber-attacks were state-sponsored. First, social networks motivate individuals to participate in Distributed Denial of Service attacks by providing malware and identifying potential targets. Second, attackers use an individual's social network to focus attacks, through spear phishing. Recipients are more likely to open infected attachments when they come from a trusted source. Third, social networking infrastructures create disposable architectures to coordinate attacks through command and control servers. The ubiquitous nature of these architectures makes it difficult to determine who owns and operates the servers. Finally, governments recruit anti-social criminal networks to launch attacks on third-party infrastructures using botnets. The closing sections identify a roadmap to increase resilience against the 'dark side' of social networking.

  16. Application of stochastic discrete event system framework for detection of induced low rate TCP attack.

    PubMed

    Barbhuiya, F A; Agarwal, Mayank; Purwar, Sanketh; Biswas, Santosh; Nandi, Sukumar

    2015-09-01

    TCP is the most widely accepted transport layer protocol. The major emphasis during the development of TCP was its functionality and efficiency. However, not much consideration was given on studying the possibility of attackers exploiting the protocol, which has lead to several attacks on TCP. This paper deals with the induced low rate TCP attack. Since the attack is relatively new, only a few schemes have been proposed to mitigate it. However, the main issues with these schemes are scalability, change in TCP header, lack of formal frameworks, etc. In this paper, we have adapted the stochastic DES framework for detecting the attack, which addresses most of these issues. We have successfully deployed and tested the proposed DES based IDS on a test bed. Copyright © 2015 ISA. Published by Elsevier Ltd. All rights reserved.

  17. Comparison of methods for localizing the source position of deauthentication attacks on WAP 802.11n using Chanalyzer and Wi-Spy 2.4x

    NASA Astrophysics Data System (ADS)

    Bahaweres, R. B.; Mokoginta, S.; Alaydrus, M.

    2017-01-01

    This paper descnbes a comparison of three methods used to locate the position of the source of deauthentication attacks on Wi-Fi using Chanalyzer, and Wi-Spy 2.4x adapter. The three methods are wardriving, absorption and trilateration. The position of constant deauthentication attacks is more easily analyzed compared to that of random attacks. Signal propagation may provide a comparison between signal strength and distance which makes the position of attackers more easily located. The results are shown on the chart patterns generated from the Received Signal Strength Indicator (RSS). And it is proven that these three methods can be used to localize the position of attackers, and can be recommended for use in the environment of organizations using Wi-Fi.

  18. Invisible Trojan-horse attack.

    PubMed

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  19. Cognitive and affective matching effects in persuasion: an amplification perspective.

    PubMed

    Clarkson, Joshua J; Tormala, Zakary L; Rucker, Derek D

    2011-11-01

    Past research suggests that cognitive and affective attitudes are more open to change toward cognitive and affective (i.e., matched) persuasive attacks, respectively. The present research investigates how attitude certainty influences this openness. Although an extensive literature suggests that certainty generally reduces an attitude's openness to change, the authors explore the possibility that certainty might increase an attitude's openness to change in the context of affective or cognitive appeals. Based on the recently proposed amplification hypothesis, the authors posit that high (vs. low) attitude certainty will boost the resistance of attitudes to mismatched attacks (e.g., affective attitudes attacked by cognitive messages) but boost the openness of attitudes to matched attacks (e.g., affective attitudes attacked by affective messages). Two experiments provide support for this hypothesis. Implications for increasing the openness of attitudes to both matched and mismatched attacks are discussed.

  20. Public health foundations and the tobacco industry: lessons from Minnesota

    PubMed Central

    Ibrahim, J; Tsoukalas, T; Glantz, S

    2004-01-01

    Objective: To investigate whether private foundations can be created in a way that will insulate them from attacks by the tobacco industry, using the Minnesota Partnership for Action Against Tobacco (MPAAT) as a case study. Design: Information was collected from internal tobacco industry documents, court documents, newspapers, and interviews with health advocates and elected officials. Results: The creation of MPAAT as an independent foundation did not insulate it from attacks by tobacco industry allies. During 2001–2002, MPAAT was repeatedly attacked by Attorney General Mike Hatch and major media, using standard tobacco industry rhetoric. This strategy of attack and demands for information were reminiscent of previous attacks on Minnesota's Plan for Nonsmoking and Health and the American Stop Smoking Intervention Study (ASSIST). MPAAT was ultimately forced to restructure its programme to abandon effective community norm change interventions around smoke-free policies and replace them with less effective individual cessation interventions. Neither MPAAT nor other health advocates mounted an effective public response to these attacks, instead relying on the insider strategy of responding in court. Conclusion: It is not possible to avoid attacks by the tobacco industry or its political allies. Like programmes administered by government agencies, tobacco control foundations must be prepared for these attacks, including a proactive plan to educate the public about the principles of community based tobacco control. Public health advocates also need to be willing to take prompt action to defend these programmes and hold public officials who attack tobacco control programmes accountable for their actions. PMID:15333877

  1. Major depressive disorder following terrorist attacks: A systematic review of prevalence, course and correlates

    PubMed Central

    2011-01-01

    Background Terrorist attacks are traumatic events that may result in a wide range of psychological disorders for people exposed. This review aimed to systematically assess the current evidence on major depressive disorder (MDD) after terrorist attacks. Methods A systematic review was performed. Studies included assessed the impact of human-made, intentional, terrorist attacks in direct victims and/or persons in general population and evaluated MDD based on diagnostic criteria. Results A total of 567 reports were identified, 11 of which were eligible for this review: 6 carried out with direct victims, 4 with persons in general population, and 1 with victims and general population. The reviewed literature suggests that the risk of MDD ranges between 20 and 30% in direct victims and between 4 and 10% in the general population in the first few months after terrorist attacks. Characteristics that tend to increase risk of MDD after a terrorist attack are female gender, having experienced more stressful situations before or after the attack, peritraumatic reactions during the attack, loss of psychosocial resources, and low social support. The course of MDD after terrorist attacks is less clear due to the scarcity of longitudinal studies. Conclusions Methodological limitations in the literature of this field are considered and potentially important areas for future research such as the assessment of the course of MDD, the study of correlates of MDD or the comorbidity between MDD and other mental health problems are discussed. PMID:21627850

  2. DOE Office of Scientific and Technical Information (OSTI.GOV)

    MacDonald, Douglas G.; Clements, Samuel L.; Patrick, Scott W.

    Securing high value and critical assets is one of the biggest challenges facing this nation and others around the world. In modern integrated systems, there are four potential modes of attack available to an adversary: • physical only attack, • cyber only attack, • physical-enabled cyber attack, • cyber-enabled physical attack. Blended attacks involve an adversary working in one domain to reduce system effectiveness in another domain. This enables the attacker to penetrate further into the overall layered defenses. Existing vulnerability assessment (VA) processes and software tools which predict facility vulnerabilities typically evaluate the physical and cyber domains separately. Vulnerabilitiesmore » which result from the integration of cyber-physical control systems are not well characterized and are often overlooked by existing assessment approaches. In this paper, we modified modification of the timely detection methodology, used for decades in physical security VAs, to include cyber components. The Physical and Cyber Risk Analysis Tool (PACRAT) prototype illustrates an integrated vulnerability assessment that includes cyber-physical interdependencies. Information about facility layout, network topology, and emplaced safeguards is used to evaluate how well suited a facility is to detect, delay, and respond to attacks, to identify the pathways most vulnerable to attack, and to evaluate how often safeguards are compromised for a given threat or adversary type. We have tested the PACRAT prototype on critical infrastructure facilities and the results are promising. Future work includes extending the model to prescribe the recommended security improvements via an automated cost-benefit analysis.« less

  3. Agent Based Study of Surprise Attacks:. Roles of Surveillance, Prompt Reaction and Intelligence

    NASA Astrophysics Data System (ADS)

    Shanahan, Linda; Sen, Surajit

    Defending a confined territory from a surprise attack is seldom possible. We use molecular dynamics and statistical physics inspired agent-based simulations to explore the evolution and outcome of such attacks. The study suggests robust emergent behavior, which emphasizes the importance of accurate surveillance, automated and powerful attack response, building layout, and sheds light on the role of communication restrictions in defending such territories.

  4. On the security of Y-00 under fast correlation and other attacks on the key

    NASA Astrophysics Data System (ADS)

    Yuen, Horace P.; Nair, Ranjith

    2007-04-01

    The security of the Y-00 direct encryption protocol under correlation attack is addressed. A Y-00 configuration that is more secure than AES under known-plaintext attack is presented. It is shown that under any ciphertext-only attack, full information-theoretic security on the Y-00 seed key is obtained for any encryption box ENC with proper deliberate signal randomization.

  5. Simple proof that Gaussian attacks are optimal among collective attacks against continuous-variable quantum key distribution with a Gaussian modulation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Leverrier, Anthony; Grangier, Philippe; Laboratoire Charles Fabry, Institut d'Optique, CNRS, University Paris-Sud, Campus Polytechnique, RD 128, F-91127 Palaiseau Cedex

    2010-06-15

    In this article, we give a simple proof of the fact that the optimal collective attacks against continuous-variable quantum key distribution with a Gaussian modulation are Gaussian attacks. Our proof, which makes use of symmetry properties of the protocol in phase space, is particularly relevant for the finite-key analysis of the protocol and therefore for practical applications.

  6. Attack polish for nickel-base alloys and stainless steels

    DOEpatents

    Steeves, Arthur F.; Buono, Donald P.

    1983-01-01

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels. The chemical attack polish comprises Fe(NO.sub.3).sub.3, concentrated CH.sub.3 COOH, concentrated H.sub.2 SO.sub.4 and H.sub.2 O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  7. Attack polish for nickel-base alloys and stainless steels

    DOEpatents

    Not Available

    1980-05-28

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels is described. The chemical attack polich comprises FeNO/sub 3/, concentrated CH/sub 3/COOH, concentrated H/sub 2/SO/sub 4/ and H/sub 2/O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  8. Evaluation of High-Angle-of-Attack Handling Qualities for the X-31A Using Standard Evaluation Maneuvers

    NASA Technical Reports Server (NTRS)

    Stoliker, Patrick C.; Bosworth, John T.

    1996-01-01

    The X-31A aircraft gross-acquisition and fine-tracking handling qualities have been evaluated using standard evaluation maneuvers developed by Wright Laboratory, Wright-Patterson Air Force Base. The emphasis of the testing is in the angle-of-attack range between 30 deg and 70 deg. Longitudinal gross-acquisition handling qualities results show borderline Level 1/Level 2 performance. Lateral gross-acquisition testing results in Level 1/Level 2 ratings below 45 deg angle of attack, degrading into Level 3 as angle of attack increases. The fine-tracking performance in both longitudinal and lateral axes also receives Level 1 ratings near 30 deg angle of attack, with the ratings tending towards Level 3 at angles of attack greater than 50 deg. These ratings do not match the expectations from the extensive close-in combat testing where the X-31A aircraft demonstrated fair to good handling qualities maneuvering for high angles of attack. This paper presents the results of the high-angle-of-attack handling qualities flight testing of the X-31A aircraft. Discussion of the preparation for the maneuvers, the pilot ratings, and selected pilot comments are included. Evaluation of the results is made in conjunction with existing Neal-Smith, bandwidth, Smith-Geddes, and military specifications.

  9. Evaluation of High-Angle-of-Attack Handling Qualities for the X-31A Using Standard Evaluation Maneuvers

    NASA Technical Reports Server (NTRS)

    Stoliker, Patrick C.; Bosworth, John T.

    1997-01-01

    The X-31A aircraft gross-acquisition and fine-tracking handling qualities have been evaluated using standard evaluation maneuvers developed by Wright Laboratory, Wright Patterson Air Force Base. The emphasis of the testing is in the angle-of-attack range between 30 deg. and 70 deg. Longitudinal gross-acquisition handling qualities results show borderline Level l/Level 2 performance. Lateral gross-acquisition testing results in Level l/Level 2 ratings below 45 deg. angle of attack, degrading into Level 3 as angle of attack increases. The fine tracking performance in both longitudinal and lateral axes also receives Level 1 ratings near 30 deg. angle of attack, with the ratings tending towards Level 3 at angles of attack greater than 50 deg. These ratings do not match the expectations from the extensive close-in combat testing where the X-31A aircraft demonstrated fair to good handling qualities maneuvering for high angles of attack. This paper presents the results of the high-angle-of-attack handling qualities flight testing of the X-31A aircraft. Discussion of the preparation for the maneuvers, the pilot ratings, and selected pilot comments are included. Evaluation of the results is made in conjunction with existing Neal Smith, bandwidth, Smith-Geddes, and military specifications.

  10. Jasmonate-induced responses are costly but benefit plants under attack in native populations

    PubMed Central

    Baldwin, Ian T.

    1998-01-01

    Herbivore attack is widely known to reduce food quality and to increase chemical defenses and other traits responsible for herbivore resistance. Inducible defenses are commonly thought to allow plants to forgo the costs of defense when not needed; however, neither their defensive function (increasing a plant’s fitness) nor their cost-savings function have been demonstrated in nature. The root-produced toxin nicotine increases after herbivore attack in the native, postfire annual Nicotiana attenuata and is internally activated by the wound hormone, jasmonic acid. I treated the roots of plants with the methyl ester of this hormone (MeJA) to elicit a response in one member of each of 745 matched pairs of plants growing in native populations with different probabilities of attack from herbivores, and measured the lifetime production of viable seed. In populations with intermediate rates of attack, induced plants were attacked less often by herbivores and survived to produce more seed than did their uninduced counterparts. Previous induction did not significantly increase the fitness of plants suffering high rates of attack. However, if plants had not been attacked, induced plants produced less seed than did their uninduced counterparts. Jasmonate-induced responses function as defenses but are costly, and inducibility allows this species to forgo these costs when the defenses are unnecessary. PMID:9653149

  11. Optimal response to attacks on the open science grids.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Altunay, M.; Leyffer, S.; Linderoth, J. T.

    2011-01-01

    Cybersecurity is a growing concern, especially in open grids, where attack propagation is easy because of prevalent collaborations among thousands of users and hundreds of institutions. The collaboration rules that typically govern large science experiments as well as social networks of scientists span across the institutional security boundaries. A common concern is that the increased openness may allow malicious attackers to spread more readily around the grid. We consider how to optimally respond to attacks in open grid environments. To show how and why attacks spread more readily around the grid, we first discuss how collaborations manifest themselves in themore » grids and form the collaboration network graph, and how this collaboration network graph affects the security threat levels of grid participants. We present two mixed-integer program (MIP) models to find the optimal response to attacks in open grid environments, and also calculate the threat level associated with each grid participant. Given an attack scenario, our optimal response model aims to minimize the threat levels at unaffected participants while maximizing the uninterrupted scientific production (continuing collaborations). By adopting some of the collaboration rules (e.g., suspending a collaboration or shutting down a site), the model finds optimal response to subvert an attack scenario.« less

  12. [Management of patients with bronchial asthma received general anesthesia and surgical intervention].

    PubMed

    To, Masako; Tajima, Makoto; Ogawa, Cyuhei; Otomo, Mamoru; Suzuki, Naohito; Sano, Yasuyuki

    2002-01-01

    Stimulation to bronchial mucosa is one of the major risk factor of asthma attack. When patients receive surgical intervention and general anesthesia, they are always exposed to stimulation to bronchial mucosa. Prevention method of bronchial asthma attack during surgical intervention is not established yet. We investigated that clinical course of patients with bronchial asthma who received general anesthesia and surgical intervention. Seventy-six patients with bronchial asthma were received general anesthesia and surgical intervention from 1993 to 1998. Twenty-four patients were mild asthmatic patients, 39 were moderate asthmatic patients and 13 were severe asthmatic patients. Preoperative treatment for preventing asthma attack was as follows; Eight patients were given intravenous infusion of aminophylline before operation. Fifty-two patients were given intravenous infusion of aminophylline and hydrocortisone before operation. Three patients were given intravenous infusion of hydrocortisone for consecutive 3 days before operation. Thirteen patients were given no treatment for preventing asthma attack. One patient was suffered from asthma attack during operation. She was given no preventing treatment for asthma attack before operation. Three patients were suffered from asthma attack after operation. No wound dehiscence was observed in all patients. To prevent asthma attack during operation, intravenous infusion of steroid before operation is recommended, when patients with asthma receive general anesthesia and surgical intervention.

  13. Dimensional structure of bodily panic attack symptoms and their specific connections to panic cognitions, anxiety sensitivity and claustrophobic fears.

    PubMed

    Drenckhan, I; Glöckner-Rist, A; Rist, F; Richter, J; Gloster, A T; Fehm, L; Lang, T; Alpers, G W; Hamm, A O; Fydrich, T; Kircher, T; Arolt, V; Deckert, J; Ströhle, A; Wittchen, H-U; Gerlach, A L

    2015-06-01

    Previous studies of the dimensional structure of panic attack symptoms have mostly identified a respiratory and a vestibular/mixed somatic dimension. Evidence for additional dimensions such as a cardiac dimension and the allocation of several of the panic attack symptom criteria is less consistent. Clarifying the dimensional structure of the panic attack symptoms should help to specify the relationship of potential risk factors like anxiety sensitivity and fear of suffocation to the experience of panic attacks and the development of panic disorder. In an outpatient multicentre study 350 panic patients with agoraphobia rated the intensity of each of the ten DSM-IV bodily symptoms during a typical panic attack. The factor structure of these data was investigated with nonlinear confirmatory factor analysis (CFA). The identified bodily symptom dimensions were related to panic cognitions, anxiety sensitivity and fear of suffocation by means of nonlinear structural equation modelling (SEM). CFA indicated a respiratory, a vestibular/mixed somatic and a cardiac dimension of the bodily symptom criteria. These three factors were differentially associated with specific panic cognitions, different anxiety sensitivity facets and suffocation fear. Taking into account the dimensional structure of panic attack symptoms may help to increase the specificity of the associations between the experience of panic attack symptoms and various panic related constructs.

  14. [Risk perception and psychological reactions in public crisis situations using the example of terror attacks].

    PubMed

    Grimm, A; Hulse, L; Schmidt, S

    2009-12-01

    The reactions to the 9/11 terror attacks were immense in the western population. In the current review, the impact of terror attacks is presented with surveys, clinical interviews, and scientific polls, which were identified in a comprehensive literature search. Results show that the fear of further terror attacks is comparatively overestimated in the population and is associated with numerous psychological consequences and reactions. The overestimation of the probability of further terror attacks is related among other reasons to its unique features and its strong representation in the media. Several independent studies proved that the number of stress symptoms and psychiatric diagnoses is associated with a high risk perception in relation to terror attacks. This was not only the case for victims of terror attacks, but also for people indirectly exposed to the terror attacks. In addition, there is evidence that the number of the stress symptoms correlate with the duration of TV consumption of new findings about terror attempts. Methodologically, there is a critical lack of more in-depth analyses to explain the development of risk perceptions and its influence on mental and physical health. Because of the international importance and cross-cultural differences, an international standardization of research is desirable.

  15. Enhancing Electromagnetic Side-Channel Analysis in an Operational Environment

    NASA Astrophysics Data System (ADS)

    Montminy, David P.

    Side-channel attacks exploit the unintentional emissions from cryptographic devices to determine the secret encryption key. This research identifies methods to make attacks demonstrated in an academic environment more operationally relevant. Algebraic cryptanalysis is used to reconcile redundant information extracted from side-channel attacks on the AES key schedule. A novel thresholding technique is used to select key byte guesses for a satisfiability solver resulting in a 97.5% success rate despite failing for 100% of attacks using standard methods. Two techniques are developed to compensate for differences in emissions from training and test devices dramatically improving the effectiveness of cross device template attacks. Mean and variance normalization improves same part number attack success rates from 65.1% to 100%, and increases the number of locations an attack can be performed by 226%. When normalization is combined with a novel technique to identify and filter signals in collected traces not related to the encryption operation, the number of traces required to perform a successful attack is reduced by 85.8% on average. Finally, software-defined radios are shown to be an effective low-cost method for collecting side-channel emissions in real-time, eliminating the need to modify or profile the target encryption device to gain precise timing information.

  16. Simulator study of the effectiveness of an automatic control system designed to improve the high-angle-of-attack characteristics of a fighter airplane

    NASA Technical Reports Server (NTRS)

    Gilbert, W. P.; Nguyen, L. T.; Vangunst, R. W.

    1976-01-01

    A piloted, fixed-base simulation was conducted to study the effectiveness of some automatic control system features designed to improve the stability and control characteristics of fighter airplanes at high angles of attack. These features include an angle-of-attack limiter, a normal-acceleration limiter, an aileron-rudder interconnect, and a stability-axis yaw damper. The study was based on a current lightweight fighter prototype. The aerodynamic data used in the simulation were measured on a 0.15-scale model at low Reynolds number and low subsonic Mach number. The simulation was conducted on the Langley differential maneuvering simulator, and the evaluation involved representative combat maneuvering. Results of the investigation show the fully augmented airplane to be quite stable and maneuverable throughout the operational angle-of-attack range. The angle-of-attack/normal-acceleration limiting feature of the pitch control system is found to be a necessity to avoid angle-of-attack excursions at high angles of attack. The aileron-rudder interconnect system is shown to be very effective in making the airplane departure resistant while the stability-axis yaw damper provided improved high-angle-of-attack roll performance with a minimum of sideslip excursions.

  17. Negative Campaigning and the Logic of Retaliation in Multiparty Competition.

    PubMed

    Dolezal, Martin; Ennser-Jedenastik, Laurenz; Müller, Wolfgang C

    2016-04-01

    The extant literature has demonstrated that the logic of retaliation is a core feature of negative campaigning. Attacks by one side induce counterattacks by the other. Yet most research on the interactive nature of negative campaigning is limited to two-party competition and provides little theoretical justification for why political actors should respond to attacks with counterattacks. The present paper addresses these research gaps. We argue that the negativity bias in human information processing and the zero-sum nature of elections make retaliation a rational strategy. Importantly, these arguments also imply that retaliation may not be the only plausible response to attacks in multiparty systems. Rather, parties may prefer to react to attacks from one competitor by attacking another. To grasp empirically how being attacked and attacking are related, we conduct a highly disaggregated time series analysis of such instances while controlling for other factors that may influence actor behavior. Our analyses draw on several thousand party press releases issued during three national election campaigns in Austria, a typical European multiparty system. They show that retaliation is an important strategy also in multiparty politics. Yet in such context, parties do not exclusively follow a tit-for-tat approach but rather display more complex patterns of attack behavior.

  18. Fallout risk following a major nuclear attack on the United States

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Harvey, T.F.; Shapiro, C.S.; Wittler, R.F.

    Fallout distributions are calculated for nuclear attacks on the contiguous United States. Four attack scenarios are treated, including counterforce and counterforce-countervalue attacks, for meteorological conditions associated with a typical day in summer and one in winter. The countervalue attacks contain mostly airbursts. To determine fallout effects, the population surviving the prompt effects is first calculated. For the prompt effects, a 'conflagration-type' model is used. The counterforce attack produces about 8 million prompt deaths, and the counterforce-countervalue case projects 98 million prompt deaths. Partial relocation before attack to low-risk fallout areas at least 15 km from potential strategic targets would resultmore » in a decrease in projections of deaths by tens of millions. For fallout risk calculations, only the dose received in the first 48 h (the early or local fallout) is considered. Populations are assumed to be sheltered, with a shelter protection factor profile that varies for a large urban area, a small urban area, or a rural area. With these profiles, without relocation, the fallout fatalities for all four attack scenarios are calculated to be less than one million people. This can be compared to fallout fatalities of about 10 million for a hypothetical unsheltered 'phantom' population.« less

  19. Construction of a Cyber Attack Model for Nuclear Power Plants

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Varuttamaseni, Athi; Bari, Robert A.; Youngblood, Robert

    The consideration of how one compromised digital equipment can impact neighboring equipment is critical to understanding the progression of cyber attacks. The degree of influence that one component may have on another depends on a variety of factors, including the sharing of resources such as network bandwidth or processing power, the level of trust between components, and the inclusion of segmentation devices such as firewalls. The interactions among components via mechanisms that are unique to the digital world are not usually considered in traditional PRA. This means potential sequences of events that may occur during an attack may be missedmore » if one were to only look at conventional accident sequences. This paper presents a method where, starting from the initial attack vector, the progression of a cyber attack can be modeled. The propagation of the attack is modeled by considering certain attributes of the digital components in the system. These attributes determine the potential vulnerability of a component to a class of attack and the capability gained by the attackers once they are in control of the equipment. The use of attributes allows similar components (components with the same set of attributes) to be modeled in the same way, thereby reducing the computing resources required for analysis of large systems.« less

  20. Alkaline hydrolysis of ethylene phosphate: an ab initio study by supermolecule model and polarizable continuum approach.

    PubMed

    Xia, Futing; Zhu, Hua

    2011-09-01

    The alkaline hydrolysis reaction of ethylene phosphate (EP) has been investigated using a supermolecule model, in which several explicit water molecules are included. The structures and single-point energies for all of the stationary points are calculated in the gas phase and in solution at the B3LYP/6-31++G(df,p) and MP2/6-311++G(df,2p) levels. The effect of water bulk solvent is introduced by the polarizable continuum model (PCM). Water attack and hydroxide attack pathways are taken into account for the alkaline hydrolysis of EP. An associative mechanism is observed for both of the two pathways with a kinetically insignificant intermediate. The water attack pathway involves a water molecule attacking and a proton transfer from the attacking water to the hydroxide in the first step, followed by an endocyclic bond cleavage to the leaving group. While in the first step of the hydroxide attack pathway the nucleophile is the hydroxide anion. The calculated barriers in aqueous solution for the water attack and hydroxide attack pathways are all about 22 kcal/mol. The excellent agreement between the calculated and observed values demonstrates that both of the two pathways are possible for the alkaline hydrolysis of EP. Copyright © 2011 Wiley Periodicals, Inc.

  1. Photon-number-splitting versus cloning attacks in practical implementations of the Bennett-Brassard 1984 protocol for quantum cryptography

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Niederberger, Armand; Scarani, Valerio; Gisin, Nicolas

    2005-04-01

    In practical quantum cryptography, the source sometimes produces multiphoton pulses, thus enabling the eavesdropper Eve to perform the powerful photon-number-splitting (PNS) attack. Recently, it was shown by Curty and Luetkenhaus [Phys. Rev. A 69, 042321 (2004)] that the PNS attack is not always the optimal attack when two photons are present: if errors are present in the correlations Alice-Bob and if Eve cannot modify Bob's detection efficiency, Eve gains a larger amount of information using another attack based on a 2{yields}3 cloning machine. In this work, we extend this analysis to all distances Alice-Bob. We identify a new incoherent 2{yields}3more » cloning attack which performs better than those described before. Using it, we confirm that, in the presence of errors, Eve's better strategy uses 2{yields}3 cloning attacks instead of the PNS. However, this improvement is very small for the implementations of the Bennett-Brassard 1984 (BB84) protocol. Thus, the existence of these new attacks is conceptually interesting but basically does not change the value of the security parameters of BB84. The main results are valid both for Poissonian and sub-Poissonian sources.« less

  2. Negative Campaigning and the Logic of Retaliation in Multiparty Competition

    PubMed Central

    Dolezal, Martin; Ennser-Jedenastik, Laurenz; Müller, Wolfgang C.

    2016-01-01

    The extant literature has demonstrated that the logic of retaliation is a core feature of negative campaigning. Attacks by one side induce counterattacks by the other. Yet most research on the interactive nature of negative campaigning is limited to two-party competition and provides little theoretical justification for why political actors should respond to attacks with counterattacks. The present paper addresses these research gaps. We argue that the negativity bias in human information processing and the zero-sum nature of elections make retaliation a rational strategy. Importantly, these arguments also imply that retaliation may not be the only plausible response to attacks in multiparty systems. Rather, parties may prefer to react to attacks from one competitor by attacking another. To grasp empirically how being attacked and attacking are related, we conduct a highly disaggregated time series analysis of such instances while controlling for other factors that may influence actor behavior. Our analyses draw on several thousand party press releases issued during three national election campaigns in Austria, a typical European multiparty system. They show that retaliation is an important strategy also in multiparty politics. Yet in such context, parties do not exclusively follow a tit-for-tat approach but rather display more complex patterns of attack behavior. PMID:27904657

  3. Password-only authenticated three-party key exchange proven secure against insider dictionary attacks.

    PubMed

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Paik, Juryon; Won, Dongho

    2014-01-01

    While a number of protocols for password-only authenticated key exchange (PAKE) in the 3-party setting have been proposed, it still remains a challenging task to prove the security of a 3-party PAKE protocol against insider dictionary attacks. To the best of our knowledge, there is no 3-party PAKE protocol that carries a formal proof, or even definition, of security against insider dictionary attacks. In this paper, we present the first 3-party PAKE protocol proven secure against both online and offline dictionary attacks as well as insider and outsider dictionary attacks. Our construct can be viewed as a protocol compiler that transforms any 2-party PAKE protocol into a 3-party PAKE protocol with 2 additional rounds of communication. We also present a simple and intuitive approach of formally modelling dictionary attacks in the password-only 3-party setting, which significantly reduces the complexity of proving the security of 3-party PAKE protocols against dictionary attacks. In addition, we investigate the security of the well-known 3-party PAKE protocol, called GPAKE, due to Abdalla et al. (2005, 2006), and demonstrate that the security of GPAKE against online dictionary attacks depends heavily on the composition of its two building blocks, namely a 2-party PAKE protocol and a 3-party key distribution protocol.

  4. LiPISC: A Lightweight and Flexible Method for Privacy-Aware Intersection Set Computation

    PubMed Central

    Huang, Shiyong; Ren, Yi; Choo, Kim-Kwang Raymond

    2016-01-01

    Privacy-aware intersection set computation (PISC) can be modeled as secure multi-party computation. The basic idea is to compute the intersection of input sets without leaking privacy. Furthermore, PISC should be sufficiently flexible to recommend approximate intersection items. In this paper, we reveal two previously unpublished attacks against PISC, which can be used to reveal and link one input set to another input set, resulting in privacy leakage. We coin these as Set Linkage Attack and Set Reveal Attack. We then present a lightweight and flexible PISC scheme (LiPISC) and prove its security (including against Set Linkage Attack and Set Reveal Attack). PMID:27326763

  5. Research on the technology of detecting the SQL injection attack and non-intrusive prevention in WEB system

    NASA Astrophysics Data System (ADS)

    Hu, Haibin

    2017-05-01

    Among numerous WEB security issues, SQL injection is the most notable and dangerous. In this study, characteristics and procedures of SQL injection are analyzed, and the method for detecting the SQL injection attack is illustrated. The defense resistance and remedy model of SQL injection attack is established from the perspective of non-intrusive SQL injection attack and defense. Moreover, the ability of resisting the SQL injection attack of the server has been comprehensively improved through the security strategies on operation system, IIS and database, etc.. Corresponding codes are realized. The method is well applied in the actual projects.

  6. Anxiety-related somatic reactions during missile attacks.

    PubMed

    Carmeli, A; Liberman, N; Mevorach, L

    1991-01-01

    During the Persian Gulf war the Israeli civilian population was the target of missile attacks that could have carried poison gas warheads. During the attacks all civilians were ordered to wear gas masks and move into sealed rooms. Four telephone surveys studied the somatic reactions to this anxiety-arousing situation. The percent of subjects reporting the somatic reactions declined from 38% after the first attack to 20% 12 days later. Somatic reactions were more prevalent among females than males, and among those who completed elementary school only compared to those with an academic education. A complex pattern of relationships between expectancies about chemical warfare attacks and somatic reactions is discussed.

  7. Robustness of networks formed from interdependent correlated networks under intentional attacks

    NASA Astrophysics Data System (ADS)

    Liu, Long; Meng, Ke; Dong, Zhaoyang

    2018-02-01

    We study the problem of intentional attacks targeting to interdependent networks generated with known degree distribution (in-degree oriented model) or distribution of interlinks (out-degree oriented model). In both models, each node's degree is correlated with the number of its links that connect to the other network. For both models, varying the correlation coefficient has a significant effect on the robustness of a system undergoing random attacks or attacks targeting nodes with low degree. For a system with an assortative relationship between in-degree and out-degree, reducing the broadness of networks' degree distributions can increase the resistance of systems against intentional attacks.

  8. A Case of Familial Mediterranean Fever Having Intermittent Leukopenia.

    PubMed

    Beyitler, Ilke; Kavukcu, Salih

    2018-03-01

    Familial Mediterranean fever (FMF) is a genetically inherited autoinflammatory disorder characterized by inflammatory attacks and may result in amyloidosis as a severe complication. Elevation of acute phase reactants, including leukocytosis, is seen during attack periods. Here we describe a 13-year-old female patient with a very rare clinical presentation of FMF, who would experience FMF attacks when she did not regularly take her colchicine. During these attacks she had leukopenia and neutropenia instead of leukocytosis. The leukocyte count returned to normal when she continued the medication and avoided attacks. Ethnicity and clinical signs are important in leukopenic patientsand should be investigated for FMF to avoid unnecessary procedures and complications.

  9. Exposure to the World Trade Center Attack and the Use of Cigarettes and Alcohol Among New York City Public High-School Students

    PubMed Central

    Wu, Ping; Duarte, Cristiane S.; Mandell, Donald J.; Fan, Bin; Liu, Xinhua; Fuller, Cordelia J.; Musa, George; Cohen, Michael; Cohen, Patricia; Hoven, Christina W.

    2006-01-01

    We examined exposure to the World Trade Center attack and changes in cigarette smoking and drinking among 2731 New York City public high-school students evaluated 6 months after the attack. Increased drinking was associated with direct exposure to the World Trade Center attack (P < .05). Increased smoking was not directly associated with exposure to the World Trade Center attack but was marginally significantly associated with posttraumatic stress disorder (P= .06). Our findings suggest that targeted substance-use interventions for youths may be warranted after large-scale disasters. PMID:16571705

  10. LiPISC: A Lightweight and Flexible Method for Privacy-Aware Intersection Set Computation.

    PubMed

    Ren, Wei; Huang, Shiyong; Ren, Yi; Choo, Kim-Kwang Raymond

    2016-01-01

    Privacy-aware intersection set computation (PISC) can be modeled as secure multi-party computation. The basic idea is to compute the intersection of input sets without leaking privacy. Furthermore, PISC should be sufficiently flexible to recommend approximate intersection items. In this paper, we reveal two previously unpublished attacks against PISC, which can be used to reveal and link one input set to another input set, resulting in privacy leakage. We coin these as Set Linkage Attack and Set Reveal Attack. We then present a lightweight and flexible PISC scheme (LiPISC) and prove its security (including against Set Linkage Attack and Set Reveal Attack).

  11. Heart Attack - Multiple Languages

    MedlinePlus

    ... Heart Attack - العربية (Arabic) Bilingual PDF Health Information Translations Bosnian (bosanski) Expand Section Heart Attack - bosanski (Bosnian) Bilingual PDF Health Information Translations Chinese, Simplified (Mandarin dialect) (简体中文) Expand Section Heart ...

  12. Lifestyle Changes for Heart Attack Prevention

    MedlinePlus

    ... Venous Thromboembolism Aortic Aneurysm More Lifestyle Changes for Heart Attack Prevention Updated:Mar 29,2018 Sounds simple doesn' ... to read. Many topics also available in Spanish . Heart Attack Tools & Resources My Cardiac Coach What Is a ...

  13. Being active after a heart attack (image)

    MedlinePlus

    ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ...

  14. Securing mobile ad hoc networks using danger theory-based artificial immune algorithm.

    PubMed

    Abdelhaq, Maha; Alsaqour, Raed; Abdelhaq, Shawkat

    2015-01-01

    A mobile ad hoc network (MANET) is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based attacks. Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network. Therefore, the objective of this paper is to investigate the capability of a danger theory-based artificial immune algorithm called the mobile dendritic cell algorithm (MDCA) to detect flooding-based attacks in MANETs. The MDCA applies the dendritic cell algorithm (DCA) to secure the MANET with additional improvements. The MDCA is tested and validated using Qualnet v7.1 simulation tool. This work also introduces a new simulation module for a flooding attack called the resource consumption attack (RCA) using Qualnet v7.1. The results highlight the high efficiency of the MDCA in detecting RCAs in MANETs.

  15. Robust allocation of a defensive budget considering an attacker's private information.

    PubMed

    Nikoofal, Mohammad E; Zhuang, Jun

    2012-05-01

    Attackers' private information is one of the main issues in defensive resource allocation games in homeland security. The outcome of a defense resource allocation decision critically depends on the accuracy of estimations about the attacker's attributes. However, terrorists' goals may be unknown to the defender, necessitating robust decisions by the defender. This article develops a robust-optimization game-theoretical model for identifying optimal defense resource allocation strategies for a rational defender facing a strategic attacker while the attacker's valuation of targets, being the most critical attribute of the attacker, is unknown but belongs to bounded distribution-free intervals. To our best knowledge, no previous research has applied robust optimization in homeland security resource allocation when uncertainty is defined in bounded distribution-free intervals. The key features of our model include (1) modeling uncertainty in attackers' attributes, where uncertainty is characterized by bounded intervals; (2) finding the robust-optimization equilibrium for the defender using concepts dealing with budget of uncertainty and price of robustness; and (3) applying the proposed model to real data. © 2011 Society for Risk Analysis.

  16. Securing Mobile Ad Hoc Networks Using Danger Theory-Based Artificial Immune Algorithm

    PubMed Central

    2015-01-01

    A mobile ad hoc network (MANET) is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based attacks. Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network. Therefore, the objective of this paper is to investigate the capability of a danger theory-based artificial immune algorithm called the mobile dendritic cell algorithm (MDCA) to detect flooding-based attacks in MANETs. The MDCA applies the dendritic cell algorithm (DCA) to secure the MANET with additional improvements. The MDCA is tested and validated using Qualnet v7.1 simulation tool. This work also introduces a new simulation module for a flooding attack called the resource consumption attack (RCA) using Qualnet v7.1. The results highlight the high efficiency of the MDCA in detecting RCAs in MANETs. PMID:25946001

  17. Robust Structural Analysis and Design of Distributed Control Systems to Prevent Zero Dynamics Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Weerakkody, Sean; Liu, Xiaofei; Sinopoli, Bruno

    We consider the design and analysis of robust distributed control systems (DCSs) to ensure the detection of integrity attacks. DCSs are often managed by independent agents and are implemented using a diverse set of sensors and controllers. However, the heterogeneous nature of DCSs along with their scale leave such systems vulnerable to adversarial behavior. To mitigate this reality, we provide tools that allow operators to prevent zero dynamics attacks when as many as p agents and sensors are corrupted. Such a design ensures attack detectability in deterministic systems while removing the threat of a class of stealthy attacks in stochasticmore » systems. To achieve this goal, we use graph theory to obtain necessary and sufficient conditions for the presence of zero dynamics attacks in terms of the structural interactions between agents and sensors. We then formulate and solve optimization problems which minimize communication networks while also ensuring a resource limited adversary cannot perform a zero dynamics attacks. Polynomial time algorithms for design and analysis are provided.« less

  18. Measurement of Aerodynamic Forces for Various Mean Angles of Attack on an Airfoil Oscillating in Pitch and on Two Finite-span Wings Oscillating in Bending with Emphasis on Damping in the Stall

    NASA Technical Reports Server (NTRS)

    Rainey, A Gerald

    1957-01-01

    The oscillating air forces on a two-dimensional wing oscillating in pitch about the midchord have been measured at various mean angles of attack and at Mach numbers of 0.35 and 0.7. The magnitudes of normal-force and pitching-moment coefficients were much higher at high angles of attack than at low angles of attack for some conditions. Large regions of negative damping in pitch were found, and it was shown that the effect of increasing the Mach number 0.35 to 0.7 was to decrease the initial angle of attack at which negative damping occurred. Measurements of the aerodynamic damping of a 10-percent-thick and of a 3-percent-thick finite-span wing oscillating in the first bending mode indicate no regions of negative damping for this type of motion over the range of variables covered. The damping measured at high angles of attack was generally larger than that at low angles of attack. (author)

  19. Random domain name and address mutation (RDAM) for thwarting reconnaissance attacks

    PubMed Central

    Chen, Xi; Zhu, Yuefei

    2017-01-01

    Network address shuffling is a novel moving target defense (MTD) that invalidates the address information collected by the attacker by dynamically changing or remapping the host’s network addresses. However, most network address shuffling methods are limited by the limited address space and rely on the host’s static domain name to map to its dynamic address; therefore these methods cannot effectively defend against random scanning attacks, and cannot defend against an attacker who knows the target’s domain name. In this paper, we propose a network defense method based on random domain name and address mutation (RDAM), which increases the scanning space of the attacker through a dynamic domain name method and reduces the probability that a host will be hit by an attacker scanning IP addresses using the domain name system (DNS) query list and the time window methods. Theoretical analysis and experimental results show that RDAM can defend against scanning attacks and worm propagation more effectively than general network address shuffling methods, while introducing an acceptable operational overhead. PMID:28489910

  20. Security Events and Vulnerability Data for Cybersecurity Risk Estimation.

    PubMed

    Allodi, Luca; Massacci, Fabio

    2017-08-01

    Current industry standards for estimating cybersecurity risk are based on qualitative risk matrices as opposed to quantitative risk estimates. In contrast, risk assessment in most other industry sectors aims at deriving quantitative risk estimations (e.g., Basel II in Finance). This article presents a model and methodology to leverage on the large amount of data available from the IT infrastructure of an organization's security operation center to quantitatively estimate the probability of attack. Our methodology specifically addresses untargeted attacks delivered by automatic tools that make up the vast majority of attacks in the wild against users and organizations. We consider two-stage attacks whereby the attacker first breaches an Internet-facing system, and then escalates the attack to internal systems by exploiting local vulnerabilities in the target. Our methodology factors in the power of the attacker as the number of "weaponized" vulnerabilities he/she can exploit, and can be adjusted to match the risk appetite of the organization. We illustrate our methodology by using data from a large financial institution, and discuss the significant mismatch between traditional qualitative risk assessments and our quantitative approach. © 2017 Society for Risk Analysis.

  1. An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks.

    PubMed

    Wang, Chenyu; Xu, Guoai; Sun, Jing

    2017-12-19

    As an essential part of Internet of Things (IoT), wireless sensor networks (WSNs) have touched every aspect of our lives, such as health monitoring, environmental monitoring and traffic monitoring. However, due to its openness, wireless sensor networks are vulnerable to various security threats. User authentication, as the first fundamental step to protect systems from various attacks, has attracted much attention. Numerous user authentication protocols armed with formal proof are springing up. Recently, two biometric-based schemes were proposed with confidence to be resistant to the known attacks including offline dictionary attack, impersonation attack and so on. However, after a scrutinization of these two schemes, we found them not secure enough as claimed, and then demonstrated that these schemes suffer from various attacks, such as offline dictionary attack, impersonation attack, no user anonymity, no forward secrecy, etc. Furthermore, we proposed an enhanced scheme to overcome the identified weaknesses, and proved its security via Burrows-Abadi-Needham (BAN) logic and the heuristic analysis. Finally, we compared our scheme with other related schemes, and the results showed the superiority of our scheme.

  2. Terrorism in Spain: emergency medical aspects.

    PubMed

    García-Castrillo Riesgo, Luis; García Merino, Antonio

    2003-01-01

    A terrorism movement has been active in Spain during the last 20 years, with a painful number of victims. Civil Defense is in charge of the coordination of all the structures that are implicated in a terrorist incident. There are three typical patterns of attacks: (1) individual attacks; (2) group attacks; and (3) mass attacks. The individual attacks are done with guns, usually 9 mm, fired from a short distance; victims die from serious intracranial damage. Collective attacks are done using explosives under vehicles, tramp bombs, or "bomb vehicles;" victims are of different severity with wounds, burns, and blast injuries. With mass attacks with "bomb vehicles" in buildings or crowded public places, the numbers of victims are elevated and produce brutal social consequences. Emergency Medical Services integrated in to "Civil Defense" try to minimize the damage by initializing treatment on-scene and with the rapid provision of definitive care. During the last year, post-traumatic stress disorder treatment groups have been providing care to the victims and personnel. Chemical or biological weapons have not been used, although this is a great concern to the authorities.

  3. An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks

    PubMed Central

    Xu, Guoai; Sun, Jing

    2017-01-01

    As an essential part of Internet of Things (IoT), wireless sensor networks (WSNs) have touched every aspect of our lives, such as health monitoring, environmental monitoring and traffic monitoring. However, due to its openness, wireless sensor networks are vulnerable to various security threats. User authentication, as the first fundamental step to protect systems from various attacks, has attracted much attention. Numerous user authentication protocols armed with formal proof are springing up. Recently, two biometric-based schemes were proposed with confidence to be resistant to the known attacks including offline dictionary attack, impersonation attack and so on. However, after a scrutinization of these two schemes, we found them not secure enough as claimed, and then demonstrated that these schemes suffer from various attacks, such as offline dictionary attack, impersonation attack, no user anonymity, no forward secrecy, etc. Furthermore, we proposed an enhanced scheme to overcome the identified weaknesses, and proved its security via Burrows–Abadi–Needham (BAN) logic and the heuristic analysis. Finally, we compared our scheme with other related schemes, and the results showed the superiority of our scheme. PMID:29257066

  4. Aspirin

    MedlinePlus

    ... aches. Nonprescription aspirin is also used to prevent heart attacks in people who have had a heart attack in the past or who have angina (chest ... are experiencing or who have recently experienced a heart attack. Nonprescription aspirin is also used to prevent ischemic ...

  5. Can Vitamins Help Prevent a Heart Attack?

    MedlinePlus

    ... taking vitamins help prevent heart disease or a heart attack? Answers from Rekha Mankad, M.D. It's not yet clear ... risk of developing heart disease or having a heart attack. But, what is known is that no vitamin ...

  6. Operational Test and Evaluation Handbook for Aircrew Training Devices. Volume II. Operational Effectiveness Evaluation

    DTIC Science & Technology

    1982-02-01

    should also convey an understanding of the differ- ences in learning behavior between initial learning activity and later skill maintenance and...refinement might then be, ATTACK MANEUVERS * Pop-up attack # Loft/ LADO type attack * Level/laydown attack Figure 5-4 showe diagrammatically the...sensitive to differ- ences in performance. Severai criteria should be used to guide the selection/development of performance measures, i.e., measure validity

  7. Go Ahead of Malware’s Infections and Controls: Towards New Techniques for Proactive Cyber Defense

    DTIC Science & Technology

    2016-12-08

    in SDN (such as topology poisoning attacks and data-to-control plan saturation attacks) and developed new defense for SDN (such as TopoGuard and... Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures As part of our research on discovering new vulnerabilities...future network- ing paradigm. We demonstrate that this new attacks can effectively poison the network topology information, then further successfully

  8. Passive Fingerprinting Of Computer Network Reconnaissance Tools

    DTIC Science & Technology

    2009-09-01

    v6 for version 6 MITM : Man-In-The-Middle Attack MSS: Maximum Segment Size NOP: No Operation Performed NPS: Naval Postgraduate School OS...specific, or man-in-the- middle ( MITM ) attacks. Depending on the attacker’s position to access the targeted network, the attacker may be able to...identification numbers. Both are ordinarily supposed to be initialized as a random number to make it difficult for an attacker to perform an injection MITM

  9. Robustness of Controllability for Networks Based on Edge-Attack

    PubMed Central

    Nie, Sen; Wang, Xuwen; Zhang, Haifeng; Li, Qilang; Wang, Binghong

    2014-01-01

    We study the controllability of networks in the process of cascading failures under two different attacking strategies, random and intentional attack, respectively. For the highest-load edge attack, it is found that the controllability of Erdős-Rényi network, that with moderate average degree, is less robust, whereas the Scale-free network with moderate power-law exponent shows strong robustness of controllability under the same attack strategy. The vulnerability of controllability under random and intentional attacks behave differently with the increasing of removal fraction, especially, we find that the robustness of control has important role in cascades for large removal fraction. The simulation results show that for Scale-free networks with various power-law exponents, the network has larger scale of cascades do not mean that there will be more increments of driver nodes. Meanwhile, the number of driver nodes in cascading failures is also related to the edges amount in strongly connected components. PMID:24586507

  10. Determination of corrections to flow direction measurements obtained with a wing-tip mounted sensor. M.S. Thesis

    NASA Technical Reports Server (NTRS)

    Moul, T. M.

    1983-01-01

    The nature of corrections for flow direction measurements obtained with a wing-tip mounted sensor was investigated. Corrections for the angle of attack and sideslip, measured by sensors mounted in front of each wing tip of a general aviation airplane, were determined. These flow corrections were obtained from both wind-tunnel and flight tests over a large angle-of-attack range. Both the angle-of-attack and angle-of-sideslip flow corrections were found to be substantial. The corrections were a function of the angle of attack and angle of sideslip. The effects of wing configuration changes, small changes in Reynolds number, and spinning rotation on the angle-of-attack flow correction were found to be small. The angle-of-attack flow correction determined from the static wind-tunnel tests agreed reasonably well with the correction determined from flight tests.

  11. Robustness of controllability for networks based on edge-attack.

    PubMed

    Nie, Sen; Wang, Xuwen; Zhang, Haifeng; Li, Qilang; Wang, Binghong

    2014-01-01

    We study the controllability of networks in the process of cascading failures under two different attacking strategies, random and intentional attack, respectively. For the highest-load edge attack, it is found that the controllability of Erdős-Rényi network, that with moderate average degree, is less robust, whereas the Scale-free network with moderate power-law exponent shows strong robustness of controllability under the same attack strategy. The vulnerability of controllability under random and intentional attacks behave differently with the increasing of removal fraction, especially, we find that the robustness of control has important role in cascades for large removal fraction. The simulation results show that for Scale-free networks with various power-law exponents, the network has larger scale of cascades do not mean that there will be more increments of driver nodes. Meanwhile, the number of driver nodes in cascading failures is also related to the edges amount in strongly connected components.

  12. Prediction of the noise from a propeller at angle of attack

    NASA Technical Reports Server (NTRS)

    Krejsa, Eugene A.

    1990-01-01

    An analysis is presented to predict the noise of a propeller at angle of attack. The analysis is an extension of that reported by Mani (1990) which predicted the change in noise due to angle of attack due to both unsteady loading and to azimuthal variation of the radiation efficiency of steady noise sources. Mani's analysis, however, was limited to small angles of attack. The analysis reported herein removes this small angle limitation. Results from the analysis are compared with the data of Woodward (1987, 1988), for a single rotation propeller and for a counter rotating propeller. The comparison shows that including the effect of angle of attack on the steady noise sources significantly improves the agreement with data. Including higher order effects of angle of attack, while changing the predicted noise at far forward and aft angles, has little effect near the propeller plane.

  13. Analyzing the Effectiveness of the Self-organized Public-Key Management System on MANETs under the Lack of Cooperation and the Impersonation Attacks

    NASA Astrophysics Data System (ADS)

    da Silva, Eduardo; Dos Santos, Aldri Luiz; Lima, Michele N.; Albini, Luiz Carlos Pessoa

    Among the key management schemes for MANETs, the Self-Organized Public-Key Management System (PGP-Like) is the main chaining-based key management scheme. It is fully self-organized and does not require any certificate authority. Two kinds of misbehavior attacks are considered to be great threats to PGP-Like: lack of cooperation and impersonation attacks. This work quantifies the impact of such attacks on the PGP-Like. Simulation results show that PGP-Like was able to maintain its effectiveness when submitted to the lack of cooperation attack, contradicting previously theoretical results. It correctly works even in the presence of more than 60% of misbehaving nodes, although the convergence time is affected with only 20% of misbehaving nodes. On the other hand, PGP-Like is completely vulnerable to the impersonation attack. Its functionality is affected with just 5% of misbehaving nodes, confirming previously theoretical results.

  14. Major depressive disorder with anger attacks and cardiovascular risk factors.

    PubMed

    Fraguas, Renerio; Iosifescu, Dan V; Bankier, Bettina; Perlis, Roy; Clementi-Craven, Nicoletta; Alpert, Jonathan; Fava, Maurizio

    2007-01-01

    Depression and anger have been separately associated with cardiovascular risk factors. We investigated if major depressive disorder (MDD) with concomitant anger attacks was associated with cardiovascular risk factors. We measured total serum cholesterol, glycemia, resting blood pressure, and smoking parameters in 333 (52.9% women) MDD nonpsychotic outpatients, mean age of 39.4 years. MDD was diagnosed with the Structured Clinical Interview (SCID) in accordance with the Diagnostic and Statistic Manual of Mental Disorders, Third Edition, Revised (DSM-III-R). The presence of anger attacks was established with the Massachusetts General Hospital Anger Attacks Questionnaire. In a logistic regression analysis, anger attacks were independently associated with cholesterol levels > or = 200 mg/dL (odds ratio [OR], 2.16; 95% confidence interval [CI], 1.18-3.94) and years of smoking > 11 (OR, 2.59; 95% CI, 1.32-5.04). MDD with anger attacks was significantly associated with increased cholesterol levels and years of smoking.

  15. Evaluation of risk from acts of terrorism :the adversary/defender model using belief and fuzzy sets.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Darby, John L.

    Risk from an act of terrorism is a combination of the likelihood of an attack, the likelihood of success of the attack, and the consequences of the attack. The considerable epistemic uncertainty in each of these three factors can be addressed using the belief/plausibility measure of uncertainty from the Dempster/Shafer theory of evidence. The adversary determines the likelihood of the attack. The success of the attack and the consequences of the attack are determined by the security system and mitigation measures put in place by the defender. This report documents a process for evaluating risk of terrorist acts using anmore » adversary/defender model with belief/plausibility as the measure of uncertainty. Also, the adversary model is a linguistic model that applies belief/plausibility to fuzzy sets used in an approximate reasoning rule base.« less

  16. Weak laws against acid attacks on women: an Indian perspective.

    PubMed

    Ahmad, Nehaluddin

    2012-01-01

    Acid attacks, especially on women, have seen an alarming growth in India over the last decade. While these attacks can be attributed to various factors such as the social weakness of women in a male-dominated society, the situation is exacerbated by the general neglect of the lawmakers. As acid is inexpensive and easily available, it serves as an ideal weapon for the perpetrators. Further, as this offence is bailable in certain situations, the punishment does not act as a sufficient deterrent in most cases. This paper describes the horrendous effects that acid attacks have on the victims physically, psychologically and socially. It also examines the contemporary laws governing acid attacks on victims and offenders. Ideas for a better legal approach will also be examined with special reference to acid attacks as a crime, and the validity of specific legal provisions for female victims.

  17. Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards.

    PubMed

    An, Younghwa

    2012-01-01

    Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server.

  18. Combating Memory Corruption Attacks On Scada Devices

    NASA Astrophysics Data System (ADS)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  19. Large-scale wind-tunnel investigation of a close-coupled canard-delta-wing fighter model through high angles of attack

    NASA Technical Reports Server (NTRS)

    Stoll, F.; Koenig, D. G.

    1983-01-01

    Data obtained through very high angles of attack from a large-scale, subsonic wind-tunnel test of a close-coupled canard-delta-wing fighter model are analyzed. The canard delays wing leading-edge vortex breakdown, even for angles of attack at which the canard is completely stalled. A vortex-lattice method was applied which gave good predictions of lift and pitching moment up to an angle of attack of about 20 deg, where vortex-breakdown effects on performance become significant. Pitch-control inputs generally retain full effectiveness up to the angle of attack of maximum lift, beyond which, effectiveness drops off rapidly. A high-angle-of-attack prediction method gives good estimates of lift and drag for the completely stalled aircraft. Roll asymmetry observed at zero sideslip is apparently caused by an asymmetry in the model support structure.

  20. At the forefront of thought: the effect of media exposure on airplane typicality.

    PubMed

    Novick, Laura R

    2003-12-01

    The terrorist attacks of September 11, 2001 provided a unique opportunity to investigate the causal status of frequency on typicality for one exemplar of a common conceptual category--namely, the typicality of airplane as a member of the category of vehicles. The extensive media coverage following the attacks included numerous references to the hijacked airplanes and to the consequences of suspending air travel to and from the United States for several days. The present study, involving 152 undergraduates, assessed airplane typicality at three time points ranging from 5 h to 1 month after the attacks and then again at 4.5 months after the attacks. Airplane was judged to be a more typical vehicle for 1 month following the attacks, relative to a baseline calculated from data collected yearly for 5 years preceding the attacks. By 4.5 months, however, typicality was back to baseline.

  1. Relationship between attack and pause in world Taekwondo championship contests: effects of gender and weight category.

    PubMed

    Santos, Victor Gustavo Ferreira; Pires, Flavio Oliveira; Bertuzzi, Romulo; Frachini, Emerson; da Silva-Cavalcante, Marcos David; Peduti Dal Molin Kiss, Maria Augusta; Lima-Silva, Adriano Eduardo

    2014-04-01

    The aim of this study was to compare between weight and gender categories the attack and pause times during the 2007 Taekwondo World Championship. A total of 88 rounds (47 male and 41 female contests) were analyzed. There was no difference in attack/balancing times ratio between genders (0.13 ± 0.06 vs 0.13 ± 0.06, P > 0.05). The attack number was significantly higher in round 3 than in round 1 for all categories and genders. The balancing time was lower during the round 3 than round 1 for low-weight male and high-weight female categories. The delta of change from round 1 to 3 (round 3 - round 1) for attack time and attack/balancing times ratio were lower in male than female. Female seems to intensify more the combat in the last round than male, and this seems be related to the weight division.

  2. Heavy-Ion Microbeam Fault Injection into SRAM-Based FPGA Implementations of Cryptographic Circuits

    NASA Astrophysics Data System (ADS)

    Li, Huiyun; Du, Guanghua; Shao, Cuiping; Dai, Liang; Xu, Guoqing; Guo, Jinlong

    2015-06-01

    Transistors hit by heavy ions may conduct transiently, thereby introducing transient logic errors. Attackers can exploit these abnormal behaviors and extract sensitive information from the electronic devices. This paper demonstrates an ion irradiation fault injection attack experiment into a cryptographic field-programmable gate-array (FPGA) circuit. The experiment proved that the commercial FPGA chip is vulnerable to low-linear energy transfer carbon irradiation, and the attack can cause the leakage of secret key bits. A statistical model is established to estimate the possibility of an effective fault injection attack on cryptographic integrated circuits. The model incorporates the effects from temporal, spatial, and logical probability of an effective attack on the cryptographic circuits. The rate of successful attack calculated from the model conforms well to the experimental results. This quantitative success rate model can help evaluate security risk for designers as well as for the third-party assessment organizations.

  3. The use of new facility by means internal balance with sting support for wide range Angle of Attack aircraft

    NASA Astrophysics Data System (ADS)

    Subagyo; Daryanto, Yanto; Risnawan, Novan

    2018-04-01

    The development of facilities for the testing of wide range angle of attack aircraft in the wind tunnel at subsonic regime has done and implemented. Development required to meet the test at an angle of attack from -20 ° to 40 °. Testing the wide range angle of attack aircraft with a wide variation of the angle of attack become important needs. This can be done simply by using the sting support-equipped by internal balance to measure the forces and moments component aerodynamics. The results of development and use on the wide range angle of attack aircraft testing are aerodynamics characteristics in the form of the coefficient three components forces and the three components of the moment. A series of test aircraft was successfully carried out and the results are shown in the form of graphs of characteristic of aerodynamics at wind speed 70 m/s.

  4. Shooting Alone: The Pre-Attack Experiences and Behaviors of U.S. Solo Mass Murderers.

    PubMed

    Gill, Paul; Silver, James; Horgan, John; Corner, Emily

    2017-05-01

    This paper outlines the sociodemographic, developmental, antecedent attack, attack preparation, and commission properties of 115 mass murderers between 1990 and 2014. The results indicate that mass murderer attacks are usually the culmination of a complex mix of personal, political, and social drivers that crystalize at the same time to drive the individual down the path of violent action. We specifically focus upon areas related to prior criminal engagement, leakage, and attack location familiarity. Whether the violence comes to fruition is usually a combination of the availability and vulnerability of suitable targets that suit the heady mix of personal and political grievances and the individual's capability to engage in an attack from both a psychological and technical capability standpoint. Many individual cases share a mixture of unfortunate personal life circumstances coupled with an intensification of beliefs/grievances that later developed into the idea to engage in violence. © 2016 American Academy of Forensic Sciences.

  5. Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards

    PubMed Central

    An, Younghwa

    2012-01-01

    Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server. PMID:22899887

  6. Acute Treatment of Migraine

    PubMed Central

    ÖZTÜRK, Vesile

    2013-01-01

    Migraine is one of the most frequent disabling neurological conditions with a major impact on the patient’s quality of life. Migraine has been described as a chronic disorder that characterized with attacks. Attacks are characterized by moderate–severe, often unilateral, pulsating headache attacks, typically lasting 4 to 72 hours. Migraine remains underdiagnosed and undertreated despite advances in the understanding of its pathophysiology. This article reviews management of migraine acute pharmacological treatment. Currently, for the acute treatment of migraine attacks, non-steroidal anti-inflammatory drugs (NSAIDs) and triptans (serotonin 5HT1B/1D receptor agonists) are recommended. Before intake of NSAID and triptans, metoclopramide or domperidone is useful. In very severe attacks, subcutaneous sumatriptan is first choice. The patient should be treated early in the attack, use an adequate dose and formulation of a medication. Ideally, acute therapy should be restricted to no more than 2 to 3 days per week to avoid medication overuse. PMID:28360580

  7. A Probabilistic Framework for Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chatterjee, Samrat; Tipireddy, Ramakrishna; Oster, Matthew R.

    Quantification and propagation of uncertainties in cyber attacker payoffs is a key aspect within multiplayer, stochastic security games. These payoffs may represent penalties or rewards associated with player actions and are subject to various sources of uncertainty, including: (1) cyber-system state, (2) attacker type, (3) choice of player actions, and (4) cyber-system state transitions over time. Past research has primarily focused on representing defender beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and mathematical intervals. For cyber-systems, probability distributions may helpmore » address statistical (aleatory) uncertainties where the defender may assume inherent variability or randomness in the factors contributing to the attacker payoffs. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attacker’s payoff generation mechanism. Such epistemic uncertainties are more suitably represented as generalizations of probability boxes. This paper explores the mathematical treatment of such mixed payoff uncertainties. A conditional probabilistic reasoning approach is adopted to organize the dependencies between a cyber-system’s state, attacker type, player actions, and state transitions. This also enables the application of probabilistic theories to propagate various uncertainties in the attacker payoffs. An example implementation of this probabilistic framework and resulting attacker payoff distributions are discussed. A goal of this paper is also to highlight this uncertainty quantification problem space to the cyber security research community and encourage further advancements in this area.« less

  8. Investigation of the Low-Subsonic Stability and Control Characteristics of a Free-Flying Model of a Thick 70 deg Delta Reentry Configuration

    NASA Technical Reports Server (NTRS)

    Paulson, John W.; Shanks, Robert E.

    1961-01-01

    An investigation of the low-subsonic flight characteristics of a thick 70 deg delta reentry configuration having a diamond cross section has been made in the Langley full-scale tunnel over an angle-of-attack range from 20 to 45 deg. Flight tests were also made at angles of attack near maximum lift (alpha = 40 deg) with a radio-controlled model dropped from a helicopter. Static and dynamic force tests were made over an angle-of-attack range from 0 to 90 deg. The longitudinal stability and control characteristics were considered satisfactory when the model had positive static longitudinal stability. It was possible to fly the model with a small amount of static instability, but the longitudinal characteristics were considered unsatisfactory in this condition. At angles of attack above the stall the model developed a large, constant-amplitude pitching oscillation. The lateral stability characteristics were considered to be only fair at angles of attack from about 20 to 35 deg because of a lightly damped Dutch roll oscillation. At higher angles of attack the oscillation was well damped and the lateral stability was generally satisfactory. The Dutch roll damping at the lower angles of attack was increased to satisfactory values by means of a simple rate-type roll damper. The lateral control characteristics were generally satisfactory throughout the angle- of-attack range, but there was some deterioration in aileron effectiveness in the high angle-of-attack range due mainly to a large increase in damping in roll.

  9. Subjective Cognitive Symptoms During a Migraine Attack: A Prospective Study of a Clinic-Based Sample.

    PubMed

    Gil-Gouveia, Raquel; Oliveira, António G; Martins, Isabel Pavão

    2016-01-01

    A migraine attack aggregates a range of different symptoms, besides pain, that contribute to attack-related disability. Cognitive dysfunction is an unacknowledged part of the migraine attack. To provide a profile of the frequency and character of migraine attack-related cognitive symptoms occurring during the headache phase of the attack. Cross-sectional survey. Clinical-based sample of episodic migraine patients. Sequential patients were screened about the occurrence of cognitive symptoms during migraine attacks using an open-ended question followed by a self-fulfilled symptom checklist. Of 165 migraine patients (15 men, age average 37.3 ± 10.7 years), 89.7% described cognitive symptoms during the headache phase of the migraine attack. On average 2.5 ± 1.6 symptoms were reported per patient, uninfluenced by demographic or disease-related variables. The most common spontaneous symptoms related to executive functions, such as poor ability to concentrate (37%), difficulty in reasoning (25%), and thinking (23%). The pattern of responses on the symptoms checklist corroborated with those reported spontaneously and quantitative scores of the checklist were higher in patients with spontaneous symptoms. Open-ended questions tend to overestimate frequency; data accuracy may be influenced by the population chosen (clinical-based, some using prophylactic treatment). This study detailed the frequency and characteristics of migraine attack-related subjective cognitive symptoms and found its frequency to be similar to reports of other migraine defining symptoms (ex. nausea, photophobia) in recent clinical series. Patients' reports were consistent and dominated by complaints of attention difficulties, diminished cognitive efficiency, and processing speed impairment.

  10. Factors influencing care seeking for a self-defined worst panic attack.

    PubMed

    Katerndahl, David A

    2002-04-01

    Only 60 percent of persons who experience panic attacks seek treatment for them, many at the emergency department. The author documented care-seeking behaviors among persons living in the community who had experienced panic attacks and studied determinants of care seeking. In-depth structured interviews were conducted with 97 randomly selected community-dwelling adults who met DSM-III-R criteria for panic attacks. Participants were asked whether they had contemplated using or had actually used medical, alternative, and family sources of care when they had experienced their worst attack. Seventy-seven participants (79 percent) had considered using a general medical or mental health site when they experienced their worst attack. Of these, 50 (52 percent) had actually used such a site. General medical sites were contemplated more often (72 percent of participants) than mental health sites (27 percent), particularly emergency departments (43 percent) and family physicians' offices (34 percent). Other sources, such as friends or family members, alternative sites, and self-treatment, were contemplated less often. Once contemplated, certain sources were readily used, such as ambulances, family members, and self-treatment. Several factors were significantly associated with whether a person contemplated seeking care: access or barriers to treatment, perception of symptoms and of the reasons for the panic attack, and family-related variables. Contemplation and use of a mental health site after a panic attack was rare among the participants in this study. Further study of determinants of care seeking may help explain why persons who experience panic attacks fail to seek treatment or seek treatment from non-mental health sources.

  11. Development of mental health first aid guidelines for panic attacks: a Delphi study.

    PubMed

    Kelly, Claire M; Jorm, Anthony F; Kitchener, Betty A

    2009-08-10

    Panic attacks are common, and while they are not life-threatening events, they can lead to the development of panic disorder and agoraphobia. Appropriate help at the time that a panic attack occurs may decrease the fear associated with the attack and reduce the risk of developing an anxiety disorder. However, few people have the knowledge and skills required to assist. Simple first aid guidelines may help members of the public to offer help to people who experience panic attacks. The Delphi method was used to reach consensus in a panel of experts. Experts included 50 professionals and 6 people who had experience of panic attacks and were active in mental health advocacy. Statements about how to assist someone who is having a panic attack were sourced through a systematic search of both professional and lay literature. These statements were rated for importance as first aid guidelines by the expert and consumer panels and guidelines were written using the items most consistently endorsed. Of 144 statements presented to the panels, 27 were accepted. These statements were used to develop the guidelines appended to this paper. There are a number of actions which are considered to be useful for members of the public to do if they encounter someone who is having a panic attack. These guidelines will be useful in revision of curricula of mental health first aid programs. They can also be used by members of the public who want immediate information about how to assist someone who is experiencing panic attacks.

  12. Panic Attack History and Smoking Topography

    PubMed Central

    Farris, Samantha G.; Brown, Lily A.; Goodwin, Renee D.; Zvolensky, Michael J.

    2016-01-01

    Background Little is known about panic attacks and puffing topography, a behavioral index of the value of smoking reinforcement. This study examined smoking style during the course of smoking of a single cigarette among adult daily smokers with and without a history of panic attacks. Method Participants (n = 124, Mage = 43.9, SD = 9.7; 44.4% female) were non-treatment seeking daily smokers. Lifetime panic attack history was assessed via diagnostic assessment; 28.2% (n = 35) of the sample had a panic attack history. Participants smoked one cigarette during an ad libitum smoking trial. Puff volume, duration, and inter-puff interval were measured using the Clinical Research Support System (CReSS) pocket device. Results Regression analyses revealed that panic attack status was not associated with significant differences in average puff volume, duration, or inter-puff interval. Multi-level modeling was used to examine puffing trajectories. Puff-level data revealed that there was a significant quadratic time x panic effect for puff volume and duration. Those with a panic attack history demonstrated relatively sustained levels of both puff volume and duration over time, whereas those without a history of panic attacks demonstrated an increase followed by a decrease in volume and duration over time. These effects were not accounted for by the presence of general psychopathology. Discussion Smokers with a panic attack history demonstrate more persistent efforts to self-regulate the delivery of nicotine, and thus may be at risk for continued smoking and dependence. Tailored treatment may be needed to address unique vulnerabilities among this group. PMID:28033542

  13. Panic attack history and smoking topography.

    PubMed

    Farris, Samantha G; Brown, Lily A; Goodwin, Renee D; Zvolensky, Michael J

    2017-02-01

    Little is known about panic attacks and puffing topography, a behavioral index of the value of smoking reinforcement. This study examined smoking style during the course of smoking of a single cigarette among adult daily smokers with and without a history of panic attacks. Participants (n=124, M age =43.9, SD=9.7; 44.4% female) were non-treatment seeking daily smokers. Lifetime panic attack history was assessed via diagnostic assessment; 28.2% (n=35) of the sample had a panic attack history. Participants smoked one cigarette during an ad libitum smoking trial. Puff volume, duration, and inter-puff interval were measured using the Clinical Research Support System (CReSS) pocket device. Regression analyses revealed that panic attack status was not associated with significant differences in average puff volume, duration, or inter-puff interval. Multi-level modeling was used to examine puffing trajectories. Puff-level data revealed that there was a significant quadratic time x panic effect for puff volume and duration. Those with a panic attack history demonstrated relatively sustained levels of both puff volume and duration over time, whereas those without a history of panic attacks demonstrated an increase followed by a decrease in volume and duration over time. These effects were not accounted for by the presence of general psychopathology. Smokers with a panic attack history demonstrate more persistent efforts to self-regulate the delivery of nicotine, and thus may be at risk for continued smoking and dependence. Tailored treatment may be needed to address unique vulnerabilities among this group. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  14. Wind-Tunnel Investigation of the Low-Speed Static Stability and Control Characteristics of a Model of the Bell MX-776 (RASCAL) in Combined Angle of Attack and Sideslip

    NASA Technical Reports Server (NTRS)

    Letko, William

    1949-01-01

    An investigation has been made in the Langley stability tunnel to determine the low-speed static stability and control characteristics of a model of the Bell MX-776. The results show the model to be longitudinally unstable in the angle-of-attack range around zero angle of attack and to become stable at moderate angles of attack. The results of the present investigation agree reasonably well with results obtained in other facilities at low speed. The present pitching-moment results at low Mach numbers also agree reasonably well with unpublished results of tests of the model at supersonic Mach numbers (up to Mach number 1.86). Unpublished results at moderate and high subsonic speeds, however, indicate considerably greater instability at low angles of attack than is indicated by low-speed results. The results of the present tests also showed that the pitching-moment coefficients for angles of attack up to 12deg remained fairly constant with sideslip angle up to 12deg. The elevators tested produced relatively large pitching moments at zero angle of attack but, as the angle of attack was increased, the elevator effectiveness decreased. The rate of decrease of elevator effectiveness with angle of attack was less for 8deg than for 20deg elevator deflection. Therefore although 8deg deflection caused an appreciable change in longitudinal trim angle and trim lift coefficient a deflection of 20deg caused only a small additional increase in trim angle and trim lift coefficient.

  15. Increasing employee awareness of the signs and symptoms of heart attack and the need to use 911 in a State Health Department.

    PubMed

    Fogle, Crystelle C; Oser, Carrie S; Blades, Lynda L; Harwell, Todd S; Helgerson, Steven D; Gohdes, Dorothy; Spence, Michael R; Dawson, Drew E

    2004-07-01

    Early recognition of the signs and symptoms of a heart attack can lead to reduced morbidity and mortality. A workplace intervention was conducted among 523 Montana state health department employees in 2003 to increase awareness of the signs and symptoms of heart attack and the need to use 911. All employees received an Act in Time to Heart Attack Signs brochure and wallet card with their paychecks. Act in Time posters were placed in key workplace areas. A weekly e-mail message, including a contest entry opportunity addressing the signs and symptoms of heart attack, was sent to all employees. Baseline and follow-up telephone surveys were conducted to evaluate intervention effectiveness. Awareness of heart attack signs and symptoms and the need to call 911 increased significantly among employees from baseline to follow-up: pain or discomfort in the jaw, neck, or back (awareness increased from 69% to 91%); feeling weak, light-headed, or faint (awareness increased from 79% to 89%); call 911 if someone is having a heart attack or stroke (awareness increased from 84% to 90%). Awareness of chest pain, pain or discomfort in the arms or shoulders, and shortness of breath were more than 90% at baseline and did not increase significantly at follow-up. At baseline, 69% of respondents correctly reported five or more of the signs and symptoms of heart attack; 89% reported correctly at follow-up. This low-cost workplace intervention increased awareness of the signs and symptoms of heart attack and the need to call 911.

  16. Racial disparities in knowledge of stroke and heart attack risk factors and warning signs among Michigan adults.

    PubMed

    Fussman, Chris; Rafferty, Ann P; Reeves, Mathew J; Zackery, Shannon; Lyon-Callo, Sarah; Anderson, Beth

    2009-01-01

    To describe the level of knowledge regarding risk factors and warning signs for stroke and heart attack among White and African American adults in Michigan and to quantify racial disparities. Knowledge of stroke and heart attack risk factors and warning signs was assessed by using data from the 2004 Michigan Behavioral Risk Factor Survey. Prevalence estimates of knowledge were generated, and statistical differences in knowledge between Whites and African Americans were assessed. Adequate knowledge was defined as knowing 3 correct warning signs or risk factors. Logistic regression models were used to quantify the racial disparity in knowledge while controlling for potential confounding. Whites had substantially higher levels of adequate knowledge of risk factors (stroke: 31.6% vs 13.8%; heart attack: 52.6% vs 24.3%) and warning signs (stroke: 30.0% vs 17.2%; heart attack: 29.3% vs 13.8%) compared with African Americans (all observed differences were significant at P < .05). The odds of adequate knowledge of risk factors (stroke: adjusted odds ratio [AOR] 2.9; heart attack: AOR 3.4) and warning signs (stroke: AOR 2.0; heart attack: AOR 2.4) were significantly higher for Whites than for African Americans. A strong racial disparity in the knowledge of stroke and heart attack risk factors and warning signs exists among Michigan adults. Communitywide public education programs in conjunction with targeted interventions for at-risk populations are necessary to produce meaningful improvements in the awareness of stroke and heart attack risk factors and warning signs among Michigan adults.

  17. Mass casualty response in the 2008 Mumbai terrorist attacks.

    PubMed

    Roy, Nobhojit; Kapil, Vikas; Subbarao, Italo; Ashkenazi, Isaac

    2011-12-01

    The November 26-29, 2008, terrorist attacks on Mumbai were unique in its international media attention, multiple strategies of attack, and the disproportionate national fear they triggered. Everyone was a target: random members of the general population, iconic targets, and foreigners alike were under attack by the terrorists. A retrospective, descriptive study of the distribution of terror victims to various city hospitals, critical radius, surge capacity, and the nature of specialized medical interventions was gathered through police, legal reports, and interviews with key informants. Among the 172 killed and 304 injured people, about four-fifths were men (average age, 33 years) and 12% were foreign nationals. The case-fatality ratio for this event was 2.75:1, and the mortality rate among those who were critically injured was 12%. A total of 38.5% of patients arriving at the hospitals required major surgical intervention. Emergency surgical operations were mainly orthopedic (external fixation for compound fractures) and general surgical interventions (abdominal explorations for penetrating bullet/shrapnel injuries). The use of heavy-duty automatic weapons, explosives, hostages, and arson in these terrorist attacks alerts us to new challenges to medical counterterrorism response. The need for building central medical control for a coordinated response and for strengthening public hospital capacity are lessons learned for future attacks. These particular terrorist attacks had global consequences, in terms of increased security checks and alerts for and fears of further similar "Mumbai-style" attacks. The resilience of the citizens of Mumbai is a critical measure of the long-term effects of terror attacks.

  18. Impact of a comprehensive smoke-free law following a partial smoke-free law on incidence of heart attacks at a rural community hospital.

    PubMed

    Johnson, Eric L; Beal, James R

    2013-03-01

    Secondhand smoking (passive smoking) is associated with many negative health effects, primarily respiratory and cardiovascular diseases. Approximately, 46,000 deaths from cardiovascular disease are associated with secondhand smoke exposure annually in the United States, which is roughly 150 deaths in North Dakota. Studies show that passage of smoke-free laws at the community level can reduce the incidence of heart attack. We conducted a retrospective review of electronic medical records of patients admitted for heart attacks 4 months prior (April 15, 2010 through August 14, 2010) to implementation of the smoke-free ordinance and 4 months following (August 15, 2010 through December 14, 2010) implementation of the comprehensive smoke-free ordinance in Grand Forks, ND, United States. We found an association between the heart attack rate and implementation of the comprehensive smoke-free law. The heart attack rate prior to the ban was 0.5% (83/16,702) compared with 0.3% (63/18,513) after the ban (p = .023). Thus, the rate of heart attacks decreased 30.6% and number of heart attack admissions decreased 24.1%, from 83 to 63, after implementation of a comprehensive smoke-free law. We found an implementation of the comprehensive smoke-free law was associated with a decrease in the heart attack rate. The heart attack rate decreased 30.6%. Our finding was similar to previous community level smoke-free law implementation studies and notable for the change going from a partial smoke-free law to a comprehensive smoke-free law.

  19. Generalized watermarking attack based on watermark estimation and perceptual remodulation

    NASA Astrophysics Data System (ADS)

    Voloshynovskiy, Sviatoslav V.; Pereira, Shelby; Herrigel, Alexander; Baumgartner, Nazanin; Pun, Thierry

    2000-05-01

    Digital image watermarking has become a popular technique for authentication and copyright protection. For verifying the security and robustness of watermarking algorithms, specific attacks have to be applied to test them. In contrast to the known Stirmark attack, which degrades the quality of the image while destroying the watermark, this paper presents a new approach which is based on the estimation of a watermark and the exploitation of the properties of Human Visual System (HVS). The new attack satisfies two important requirements. First, image quality after the attack as perceived by the HVS is not worse than the quality of the stego image. Secondly, the attack uses all available prior information about the watermark and cover image statistics to perform the best watermark removal or damage. The proposed attack is based on a stochastic formulation of the watermark removal problem, considering the embedded watermark as additive noise with some probability distribution. The attack scheme consists of two main stages: (1) watermark estimation and partial removal by a filtering based on a Maximum a Posteriori (MAP) approach; (2) watermark alteration and hiding through addition of noise to the filtered image, taking into account the statistics of the embedded watermark and exploiting HVS characteristics. Experiments on a number of real world and computer generated images show the high efficiency of the proposed attack against known academic and commercial methods: the watermark is completely destroyed in all tested images without altering the image quality. The approach can be used against watermark embedding schemes that operate either in coordinate domain, or transform domains like Fourier, DCT or wavelet.

  20. Lupus: When the Body Attacks Itself | NIH MedlinePlus the Magazine

    MedlinePlus

    ... of this page please turn JavaScript on. Feature: Lupus Lupus: When the Body Attacks Itself Past Issues / Spring 2014 Table of Contents fast facts 1 Lupus occurs when the body's immune system attacks the ...

  1. Novel Psychological Formulation and Treatment of “Tic Attacks” in Tourette Syndrome

    PubMed Central

    Robinson, Sally; Hedderly, Tammy

    2016-01-01

    One important, but underreported, phenomenon in Tourette syndrome (TS) is the occurrence of “tic attacks.” These episodes have been described at conferences as sudden bouts of tics and/or functional tic-like movements, lasting from 15 min to several hours. They have also been described by patients in online TS communities. To date, there are no reports of tic attacks in the literature. The aim of this article is to stimulate discussion and inform clinical practices by describing the clinical presentation of 12 children (mean age 11 years and 3 months; SD = 2 years and 4 months) with TS and tic attacks, with a detailed case report for one case (13-year-old male). These children commonly present acutely to casualty departments and undergo unnecessary medical investigations. Interestingly, all children reported comorbid anxiety, with worries about the tics themselves and an increased internal focus of attention on tics once the attacks had started. In keeping with other children, the index case reported a strong internal focus of attention, with a relationship between physiological sensations/tic urges, worries about having tic attacks, and behavioral responses (e.g., body scanning, situational avoidance, and other responses). In our experience, the attacks reduce with psychological therapy, for example, the index case attended 13 sessions of therapy that included metacognitive and attention training techniques, as well as cognitive–behavioral strategies. Following treatment, an improvement was seen across a range of measures assessing tics, mood, anxiety, and quality of life. Thus, psychological techniques used to treat anxiety disorders are effective at supporting a reduction in tic attacks through modifying attention, worry processes, and negative beliefs. It is hypothesized that an attentional style of threat monitoring, difficulties tolerating internal sensory urges, cognitive misattributions, and maladaptive coping strategies contribute to the onset and maintenance of tic attacks. These cases provide support for the view that tic attacks are triggered and maintained by psychological factors, thereby challenging the view that tic attacks merely reflect extended bouts of tics. As such, we propose that the movements seen in tic attacks may resemble a combination of tics and functional neurological movements, with tic attacks reflecting episodes of panic and anxiety for individuals with TS. PMID:27242975

  2. Vestibular syncope: A disorder associated with drop attack in Ménière's disease.

    PubMed

    Pyykkö, Ilmari; Manchaiah, Vinaya; Zou, Jing; Levo, Hilla; Kentala, Erna

    2018-04-01

    Experiments in humans and animals indicate that vestibular influx through vestibular sympathetic reflex is an important and vital part of the regulatory system of circulation. The otolith organ adjusts the circulatory responses through the vestibular sympathetic reflex during an upright stance and may trigger a vasovagal attack of syncope. The aim of the present study was to evaluate the prevalence and association of syncope attacks among patients with Ménière's disease (MD). Vestibular syncope was defined as a sudden and transient loss of consciousness, which subsides spontaneously in people with vestibular disorders and without localizing neurological deficit. During clinical interactions, we encountered 5 patients with syncope during a Tumarkin attack of MD. Thereafter we evaluated data from 952 patients collected with a questionnaire from the Finnish Ménière Association (FMA). The data contained case histories with special attention to Tumarkin attacks, participation restriction, migraines, and syncope attacks. The mean age of the subjects participating in the study was 60.6 years (range 25-75 years). The duration of the disease was on average 9.8 years (range 0.5-35 years). In the current study sample, attacks of syncope were reported by 38 patients (4%) in association with the vertigo attack. Syncope was associated with Tumarkin attacks (X 2 =16.7, p<0.001), migraine (X 2 =7.4, p<0.011), history of ischemic heart disease (X 2 =6.0, p<0.025), and history of cerebrovascular disease (X 2 =11.7, p<0.004). Duration of MD was correlated with syncope. Syncope was provoked by physical strain and environmental pressure, and was associated with impairment of the visual field (i.e., visual blurring). In logistic regression analysis, syncope was significantly associated with Tumarkin attacks (odds ratio 3.2), migraines (odds ratio 2.3) and nausea (odds ratio 1.3). The attack of syncope was experienced as frightening, and general health related quality of life (HRQoL) was significantly worsened. Also, the patients suffered more from fatigue. The current study indicates that patients with MD who suffer from Tumarkin attacks can suffer from syncope. It confirms the role of the otolith organ in controlling the circulatory homeostasis of the body. The actions are mediated through the vestibular sympathetic reflex. Copyright © 2017 Elsevier B.V. All rights reserved.

  3. Weight Stigma Goes Viral on the Internet: Systematic Assessment of YouTube Comments Attacking Overweight Men and Women.

    PubMed

    Jeon, Yongwoog Andrew; Hale, Brent; Knackmuhs, Eric; Mackert, Michael

    2018-03-20

    Anonymous verbal attacks against overweight individuals on social media are common and widespread. These comments often use negative, misogynist, or derogatory words, which stigmatize the targeted individuals with obesity. These verbal attacks may cause depression in overweight individuals, which could subsequently promote unhealthy eating behavior (ie, binge eating) and further weight gain. To develop an intervention policy and strategies that tackle the anonymous, Web-based verbal attacks, a thorough understanding of the comments is necessary. This study aimed to examine how anonymous users verbally attack or defend overweight individuals in terms of 3 themes: (1) topic of verbal attack (ie, what aspects of overweight individuals are verbally attacked), (2) gender of commenters and targeted overweight individuals, and (3) intensity of derogation depending on the targeted gender (ie, the number of swear words used within comments). This study analyzed the content of YouTube comments that discuss overweight individuals or groups from 2 viral videos, titled "Fat Girl Tinder Date" and "Fat Guy Tinder Date." The twin videos provide an avenue through which to analyze discussions of obesity as they organically occurred in a contemporary setting. We randomly sampled and analyzed 320 comments based on a coding instrument developed for this study. First, there were twice as many comments verbally attacking overweight individuals (n=174) than comments defending them (n=89). Second, overweight women are attacked for their capacities (eg, laziness, maturity; 14/51, 28%), whereas overweight men are attacked for their heterosocial skills (eg, rudeness, annoyance; 24/29, 83%). Third, the majority of commenters who attacked overweight women are male (42/52, 81%). Fourth, attacking comments generated toward overweight women included more swear words (mean 0.44, SD 0.77) than those targeting men (mean 0.23, SD 0.48). Our data elucidate a worrying situation of frequent disinhibited aggressive messages against overweight individuals online. Importantly, the patterns of verbal aggression differ depending on the gender of the targeted overweight individuals. Thus, gender-tailored intervention strategies that specifically tackle Internet users' verbal aggression against overweight individuals need to be developed. ©Yongwoog Andrew Jeon, Brent Hale, Eric Knackmuhs, Michael Mackert. Originally published in the Interactive Journal of Medical Research (http://www.i-jmr.org/), 20.03.2018.

  4. An open-label study to evaluate the long-term safety and efficacy of lanadelumab for prevention of attacks in hereditary angioedema: design of the HELP study extension.

    PubMed

    Riedl, Marc A; Bernstein, Jonathan A; Craig, Timothy; Banerji, Aleena; Magerl, Markus; Cicardi, Marco; Longhurst, Hilary J; Shennak, Mustafa M; Yang, William H; Schranz, Jennifer; Baptista, Jovanna; Busse, Paula J

    2017-01-01

    Hereditary angioedema (HAE) is characterized by recurrent attacks of subcutaneous or submucosal edema. Attacks are unpredictable, debilitating, and have a significant impact on quality of life. Patients may be prescribed prophylactic therapy to prevent angioedema attacks. Current prophylactic treatments may be difficult to administer (i.e., intravenously), require frequent administrations or are not well tolerated, and breakthrough attacks may still occur frequently. Lanadelumab is a subcutaneously-administered monoclonal antibody inhibitor of plasma kallikrein in clinical development for prophylaxis of hereditary angioedema attacks. A Phase 1b study supported its efficacy in preventing attacks. A Phase 3, randomized, double-blind, placebo-controlled, parallel-arm study has been completed and an open-label extension is currently ongoing. The primary objective of the open-label extension is to evaluate the long-term safety of repeated subcutaneous administrations of lanadelumab in patients with type I/II HAE. Secondary objectives include evaluation of efficacy and time to first angioedema attack to determine outer bounds of the dosing interval. The study will also evaluate immunogenicity, pharmacokinetics/pharmacodynamics, quality of life, characteristics of breakthrough attacks, ease of self-administration, and safety/efficacy in patients who switch to lanadelumab from another prophylactic therapy. The open-label extension will enroll patients who completed the double-blind study ("rollover patients") and those who did not participate in the double-blind study ("non-rollover patients"), which includes patients who may or may not be currently using another prophylactic therapy. Rollover patients will receive a single 300 mg dose of lanadelumab on Day 0 and the second dose after the patient's first confirmed angioedema attack. Thereafter, lanadelumab will be administered every 2 weeks. Non-rollover patients will receive 300 mg lanadelumab every 2 weeks regardless of the first attack. All patients will receive their last dose on Day 350 (maximum of 26 doses), and will then undergo a 4-week follow-up. Prevention of attacks can reduce the burden of illness associated with HAE. Prophylactic therapy requires extended, repeated dosing and the results of this study will provide important data on the long-term safety and efficacy of lanadelumab, a monoclonal antibody inhibitor of plasma kallikrein for subcutaneous administration for the treatment of HAE. Trial registration NCT02741596.

  5. Improved Fake-State Attack to the Quantum Key Distribution Systems

    NASA Astrophysics Data System (ADS)

    Zhang, Sheng; Wang, Jian; Tang, Chao-jing

    2012-09-01

    It has been showed that most commercial quantum cryptosystems are vulnerable to the fake-state attacks, which employ the loophole that the avalanche photodiodes as single photon detectors still produce detection events in the linear mode. However, previous fake-state attacks may be easily prevented by either installing a watch dog or reconfiguring the dead-time assigning component. In this paper, we present a new technique to counteract the after-pulse effect ever enhanced by the fake-state attacks, in order to lower the quantum bit error rate. Obviously, it is more difficult to detect the presented attack scheme. Indeed, it contributes to promoting of implementing a secure quantum cryptosystem in real life.

  6. Content modification attacks on consensus seeking multi-agent system with double-integrator dynamics.

    PubMed

    Dong, Yimeng; Gupta, Nirupam; Chopra, Nikhil

    2016-11-01

    In this paper, vulnerability of a distributed consensus seeking multi-agent system (MAS) with double-integrator dynamics against edge-bound content modification cyber attacks is studied. In particular, we define a specific edge-bound content modification cyber attack called malignant content modification attack (MCoMA), which results in unbounded growth of an appropriately defined group disagreement vector. Properties of MCoMA are utilized to design detection and mitigation algorithms so as to impart resilience in the considered MAS against MCoMA. Additionally, the proposed detection mechanism is extended to detect the general edge-bound content modification attacks (not just MCoMA). Finally, the efficacies of the proposed results are illustrated through numerical simulations.

  7. Content modification attacks on consensus seeking multi-agent system with double-integrator dynamics

    NASA Astrophysics Data System (ADS)

    Dong, Yimeng; Gupta, Nirupam; Chopra, Nikhil

    2016-11-01

    In this paper, vulnerability of a distributed consensus seeking multi-agent system (MAS) with double-integrator dynamics against edge-bound content modification cyber attacks is studied. In particular, we define a specific edge-bound content modification cyber attack called malignant content modification attack (MCoMA), which results in unbounded growth of an appropriately defined group disagreement vector. Properties of MCoMA are utilized to design detection and mitigation algorithms so as to impart resilience in the considered MAS against MCoMA. Additionally, the proposed detection mechanism is extended to detect the general edge-bound content modification attacks (not just MCoMA). Finally, the efficacies of the proposed results are illustrated through numerical simulations.

  8. Noise of the SR-3 propeller model at 2 deg and 4 deg angle of attack

    NASA Technical Reports Server (NTRS)

    Dittmar, J. H.; Jeracki, R. J.

    1981-01-01

    The noise effect of operating supersonic tip speed propellers at angle of attack with respect to the incoming flow was determined. Increases in the maximum blade passage noise were observed for the propeller operating at angle of attack. The noise increase was not symmetrical with one wall of the wind tunnel having significantly more noise increase than the other wall. This was apparently the result of the rotational direction of the propeller. The lack of symmetry of the noise at angle of attack to the use of oppositely rotating propellers on opposite sides of an airplane fuselage as a way of minimizing the noise due to operation at angle of attack.

  9. Offense-Defense Balance in Cyberspace: A Proposed Model

    DTIC Science & Technology

    2012-12-01

    enable faster multitasking , the more computations per second can be accomplished. Increased processing speed will allow an attacker to send attacks...depend on what spam or DDoS needs to be accomplished with prices ranging from $30-$70 a day for DDoS to $10 for 1 million spam emails . 21 For...In addition to DDoS attacks on webservers, there were web defacements (using various tools such as SQL injections) and email flooding. The attacks

  10. Department of Defense Information Network (DODIN): A Study of Current Cyber Threats and Best Practices for Network Security

    DTIC Science & Technology

    2016-06-10

    DODIN) is being threatened by state actors, non-state actors, and continuous hacking and cyber-attacks. These threats against the network come in a...variety of forms; physical attacks from radio jamming, logical cyber threats from hacking , or a combination of both physical and logical attacks. Each...year the number of hacking attacks is increasing. Corporations like Symantec publish annual reports on cyber threats and provide tips for best

  11. CORESAFE: A Formal Approach against Code Replacement Attacks on Cyber Physical Systems

    DTIC Science & Technology

    2018-04-19

    AFRL-AFOSR-JP-TR-2018-0035 CORESAFE:A Formal Approach against Code Replacement Attacks on Cyber Physical Systems Sandeep Shukla INDIAN INSTITUTE OF...Formal Approach against Code Replacement Attacks on Cyber Physical Systems 5a.  CONTRACT NUMBER 5b.  GRANT NUMBER FA2386-16-1-4099 5c.  PROGRAM ELEMENT...Institute of Technology Kanpur India Final Report for AOARD Grant “CORESAFE: A Formal Approach against Code Replacement Attacks on Cyber Physical

  12. Advanced Cyber Industrial Control System Tactics, Techniques, and Procedures (ACI TTP) for Department of Defense (DOD) Industrial Control Systems (ICS)

    DTIC Science & Technology

    2016-08-10

    enable JCS managers to detect advanced cyber attacks, mitigate the effects of those attacks, and recover their networks following an attack. It also... managers of ICS networks to Detect, Mitigate, and Recover from nation-state-level cyber attacks (strategic, deliberate, well-trained, and funded...Successful Detection of cyber anomalies is best achieved when IT and ICS managers remain in close coordination. The Integrity Checks Table

  13. A hybrid protection approaches for denial of service (DoS) attacks in wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Gunasekaran, Mahalakshmi; Periakaruppan, Subathra

    2017-06-01

    Wireless sensor network (WSN) contains the distributed autonomous devices with the sensing capability of physical and environmental conditions. During the clustering operation, the consumption of more energy causes the draining in battery power that leads to minimum network lifetime. Hence, the WSN devices are initially operated on low-power sleep mode to maximise the lifetime. But, the attacks arrival cause the disruption in low-power operating called denial of service (DoS) attacks. The conventional intrusion detection (ID) approaches such as rule-based and anomaly-based methods effectively detect the DoS attacks. But, the energy consumption and false detection rate are more. The absence of attack information and broadcast of its impact to the other cluster head (CH) leads to easy DoS attacks arrival. This article combines the isolation and routing tables to detect the attack in the specific cluster and broadcasts the information to other CH. The intercommunication between the CHs prevents the DoS attacks effectively. In addition, the swarm-based defence approach is proposed to migrate the fault channel to normal operating channel through frequency hop approaches. The comparative analysis between the proposed table-based intrusion detection systems (IDSs) and swarm-based defence approaches with the traditional IDS regarding the parameters of transmission overhead/efficiency, energy consumption, and false positive/negative rates proves the capability of DoS prediction/prevention in WSN.

  14. A benchmark system to optimize our defense against an attack on the US food supply using the Risk Reduction Effectiveness and Capabilities Assessment Program.

    PubMed

    Hodoh, Ofia; Dallas, Cham E; Williams, Paul; Jaine, Andrew M; Harris, Curt

    2015-01-01

    A predictive system was developed and tested in a series of exercises with the objective of evaluating the preparedness and effectiveness of the multiagency response to food terrorism attacks. A computerized simulation model, Risk Reduction Effectiveness and Capabilities Assessment Program (RRECAP), was developed to identify the key factors that influence the outcomes of an attack and quantify the relative reduction of such outcomes caused by each factor. The model was evaluated in a set of Tabletop and Full-Scale Exercises that simulate biological and chemical attacks on the food system. More than 300 participants representing more than 60 federal, state, local, and private sector agencies and organizations. The exercises showed that agencies could use RRECAP to identify and prioritize their advance preparation to mitigate such attacks with minimal expense. RRECAP also demonstrated the relative utility and limitations of the ability of medical resources to treat patients if responders do not recognize and mitigate the attack rapidly, and the exercise results showed that proper advance preparation would reduce these deficiencies. Using computer simulation prediction of the medical outcomes of food supply attacks to identify optimal remediation activities and quantify the benefits of various measures provides a significant tool to agencies in both the public and private sector as they seek to prepare for such an attack.

  15. The distinguishing motor features of cataplexy: a study from video-recorded attacks.

    PubMed

    Pizza, Fabio; Antelmi, Elena; Vandi, Stefano; Meletti, Stefano; Erro, Roberto; Baumann, Christian R; Bhatia, Kailash P; Dauvilliers, Yves; Edwards, Mark J; Iranzo, Alex; Overeem, Sebastiaan; Tinazzi, Michele; Liguori, Rocco; Plazzi, Giuseppe

    2018-05-01

    To describe the motor pattern of cataplexy and to determine its phenomenological differences from pseudocataplexy in the differential diagnosis of episodic falls. We selected 30 video-recorded cataplexy and 21 pseudocataplexy attacks in 17 and 10 patients evaluated for suspected narcolepsy and with final diagnosis of narcolepsy type 1 and conversion disorder, respectively, together with self-reported attacks features, and asked expert neurologists to blindly evaluate the motor features of the attacks. Video documented and self-reported attack features of cataplexy and pseudocataplexy were contrasted. Video-recorded cataplexy can be positively differentiated from pseudocataplexy by the occurrence of facial hypotonia (ptosis, mouth opening, tongue protrusion) intermingled by jerks and grimaces abruptly interrupting laughter behavior (i.e. smile, facial expression) and postural control (head drops, trunk fall) under clear emotional trigger. Facial involvement is present in both partial and generalized cataplexy. Conversely, generalized pseudocataplexy is associated with persistence of deep tendon reflexes during the attack. Self-reported features confirmed the important role of positive emotions (laughter, telling a joke) in triggering the attacks, as well as the more frequent occurrence of partial body involvement in cataplexy compared with pseudocataplexy. Cataplexy is characterized by abrupt facial involvement during laughter behavior. Video recording of suspected cataplexy attacks allows the identification of positive clinical signs useful for diagnosis and, possibly in the future, for severity assessment.

  16. Behavioral Modeling of Adversaries with Multiple Objectives in Counterterrorism.

    PubMed

    Mazicioglu, Dogucan; Merrick, Jason R W

    2018-05-01

    Attacker/defender models have primarily assumed that each decisionmaker optimizes the cost of the damage inflicted and its economic repercussions from their own perspective. Two streams of recent research have sought to extend such models. One stream suggests that it is more realistic to consider attackers with multiple objectives, but this research has not included the adaption of the terrorist with multiple objectives to defender actions. The other stream builds off experimental studies that show that decisionmakers deviate from optimal rational behavior. In this article, we extend attacker/defender models to incorporate multiple objectives that a terrorist might consider in planning an attack. This includes the tradeoffs that a terrorist might consider and their adaption to defender actions. However, we must also consider experimental evidence of deviations from the rationality assumed in the commonly used expected utility model in determining such adaption. Thus, we model the attacker's behavior using multiattribute prospect theory to account for the attacker's multiple objectives and deviations from rationality. We evaluate our approach by considering an attacker with multiple objectives who wishes to smuggle radioactive material into the United States and a defender who has the option to implement a screening process to hinder the attacker. We discuss the problems with implementing such an approach, but argue that research in this area must continue to avoid misrepresenting terrorist behavior in determining optimal defensive actions. © 2017 Society for Risk Analysis.

  17. Identification and Ranking of Critical Assets within an Electrical Grid under Threat of Cyber Attack

    NASA Astrophysics Data System (ADS)

    Boyer, Blake R.

    This paper examines the ranking of critical assets within an electrical grid under threat of cyber attack.1 Critical to this analysis is the assumption of zero hour exploits namely, the threat of an immediate attack as soon as a vulnerability is discovered. Modeling shows that over time load fluctuations as well as other system variations will change the importance of each asset in the delivery of bulk power. As opposed to classic stability studies where risk can be shown to be greatest during high load periods, the zero hour exploit-cyber-risk assumes that vulnerabilities will be attacked as soon as they are discovered. The probability of attacks is made uniform over time to include any and all possible attacks. Examining the impact of an attack and how the grid reacts immediately following an attack will identify and determine the criticality of each asset. This work endeavors to fulfill the NERC Critical Infrastructure Protection Requirements CIP-001-1 through CIP-009-2, cyber security requirements for the reliable supply of bulk power to customers throughout North America. 1Critical assets will here refer to facilities, systems, and equipment, which, if destroyed, degraded, or otherwise rendered unavailable, would affect the reliability or operability of the Bulk Electric System, NERC Glossary of Terms Used in Reliability Standards, 2009

  18. Adaptive cyber-attack modeling system

    NASA Astrophysics Data System (ADS)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  19. Password-Only Authenticated Three-Party Key Exchange Proven Secure against Insider Dictionary Attacks

    PubMed Central

    Nam, Junghyun; Choo, Kim-Kwang Raymond

    2014-01-01

    While a number of protocols for password-only authenticated key exchange (PAKE) in the 3-party setting have been proposed, it still remains a challenging task to prove the security of a 3-party PAKE protocol against insider dictionary attacks. To the best of our knowledge, there is no 3-party PAKE protocol that carries a formal proof, or even definition, of security against insider dictionary attacks. In this paper, we present the first 3-party PAKE protocol proven secure against both online and offline dictionary attacks as well as insider and outsider dictionary attacks. Our construct can be viewed as a protocol compiler that transforms any 2-party PAKE protocol into a 3-party PAKE protocol with 2 additional rounds of communication. We also present a simple and intuitive approach of formally modelling dictionary attacks in the password-only 3-party setting, which significantly reduces the complexity of proving the security of 3-party PAKE protocols against dictionary attacks. In addition, we investigate the security of the well-known 3-party PAKE protocol, called GPAKE, due to Abdalla et al. (2005, 2006), and demonstrate that the security of GPAKE against online dictionary attacks depends heavily on the composition of its two building blocks, namely a 2-party PAKE protocol and a 3-party key distribution protocol. PMID:25309956

  20. Practical quantum private query with better performance in resisting joint-measurement attack

    NASA Astrophysics Data System (ADS)

    Wei, Chun-Yan; Wang, Tian-Yin; Gao, Fei

    2016-04-01

    As a kind of practical protocol, quantum-key-distribution (QKD)-based quantum private queries (QPQs) have drawn lots of attention. However, joint-measurement (JM) attack poses a noticeable threat to the database security in such protocols. That is, by JM attack a malicious user can illegally elicit many more items from the database than the average amount an honest one can obtain. Taking Jacobi et al.'s protocol as an example, by JM attack a malicious user can obtain as many as 500 bits, instead of the expected 2.44 bits, from a 104-bit database in one query. It is a noticeable security flaw in theory, and would also arise in application with the development of quantum memories. To solve this problem, we propose a QPQ protocol based on a two-way QKD scheme, which behaves much better in resisting JM attack. Concretely, the user Alice cannot get more database items by conducting JM attack on the qubits because she has to send them back to Bob (the database holder) before knowing which of them should be jointly measured. Furthermore, JM attack by both Alice and Bob would be detected with certain probability, which is quite different from previous protocols. Moreover, our protocol retains the good characters of QKD-based QPQs, e.g., it is loss tolerant and robust against quantum memory attack.

  1. Factors governing risk of cougar attacks on humans

    USGS Publications Warehouse

    Mattson, David; Logan, Kenneth; Sweanor, Linda

    2011-01-01

    Since the 1980s wildlife managers in the United States and Canada have expressed increasing concern about the physical threat posed by cougars (Puma concolor) to humans. We developed a conceptual framework and analyzed 386 human–cougar encounters (29 fatal attacks, 171 instances of nonfatal contact, and 186 close-threatening encounters) to provide information relevant to public safety. We conceived of human injury and death as the outcome of 4 transitions affected by different suites of factors: (1) a human encountering a cougar: (2) given an encounter, odds that the cougar would be aggressive; (3) given aggression, odds that the cougar would attack; and (4) given an attack, odds that the human would die. We developed multivariable logistic regression models to explain variation in odds at transitions three and four using variables pertaining to characteristics of involved people and cougars. Young (≤ 2.5 years) or unhealthy (by weight, condition, or disease) cougars were more likely than any others to be involved in close (typically <5 m) encounters that threatened the involved person. Of cougars in close encounters, females were more likely than males to attack, and of attacking animals, adults were more likely than juveniles to kill the victim (32% versus 9% fatality, respectively). During close encounters, victims who used a weapon killed the involved cougar in 82% of cases. Other mitigating behaviors (e.g., yelling, backing away, throwing objects, increasing stature) also substantially lessened odds of attack. People who were moving quickly or erratically when an encounter happened (running, playing, skiing, snowshoeing, biking, ATV-riding) were more likely to be attacked and killed compared to people who were less active (25% versus 8% fatality). Children (≤ 10 years) were more likely than single adults to be attacked, but intervention by people of any age reduced odds of a child’s death by 4.6×. Overall, cougar attacks on people in Canada and the United States were rare (currently 4 to 6/year) compared to attacks by large felids and wolves (Canis lupus) in Africa and Asia (hundreds to thousands/year).

  2. Formulating a strategy for securing high-speed rail in the United States.

    DOT National Transportation Integrated Search

    2013-03-01

    This report presents an analysis of information relating to attacks, attempted attacks, and plots against high-speed rail (HSR) : systems. It draws upon empirical data from MTIs Database of Terrorist and Serious Criminal Attacks Against Public Sur...

  3. Make the call, don't miss a beat: Heart Attack Information for Women

    MedlinePlus

    ... Other resources Learn more about heart disease and heart attacks. Make the Call, Don't Miss a Beat ... symptoms Learn the 7 most common signs of heart attack in men and women. Chest pain or discomfort " ...

  4. 47 CFR 76.1612 - Personal attack.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Personal attack. 76.1612 Section 76.1612 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE Notices § 76.1612 Personal attack. (a) When, during origination cablecasting of...

  5. Depredation of domestic herds by pumas based on farmer's information in Southern Brazil.

    PubMed

    Schulz, Francine; Printes, Rodrigo C; Oliveira, Larissa R

    2014-10-15

    Large carnivores such as pumas are frequently killed due to conflicts with human populations involving predation on domestic herds. In Southern Brazil, traditional pasture systems, where animals feed without specific husbandry practices is typical, becoming the herds vulnerable to puma attacks. The aim of this study was to examine the conflict between local people and pumas in a Protected Areas mosaic in southern Brazil. Forty-five face-to-face interviews with local people were performed during the year of 2011, using a structured questionnaire with open and closed questions about puma attack episodes in some farms. Based on responses, the conflict and puma attacks were described, and the characteristics of attacked farms and estimated financial losses were evaluated. The first respondents were indicated by the Local Environmental Agency, and the others were indicated by the first one and so on, which is known as "snow-ball" method. Our data suggested that pumas used to attack in unfavorable conditions of visibility (foggy days) and on easier prey (e.g. sheep). Most of the attacks reported were close to forested areas and were focused on free herds during feeding activities. Some farmers said they gave up their sheep breeding activity due to losses caused by puma attacks. However, some farmers could over estimate their losses. Moreover, pumas were considered a threat to domestic herds and respondents mentioned cases of illegal puma hunting in the area. The results of questionnaires suggested that puma attack episodes were related to fragmentation of their habitat associated to incorrect management of herds in the farms studied. The diagnosis of this type of conflict and the characterization of most attacked sites are extremely important to create strategies to prevent and control attacks by wild carnivores. Deep changes in husbandry practices added to educational programs should be implemented, in order to maintain the sustainability of rural activities as well as the survival of pumas in southern Brazil.

  6. The relationship between levels of plasma-soluble urokinase plasminogen activator receptor (suPAR) and presence of migraine attack and aura.

    PubMed

    Yılmaz, Nigar; Yılmaz, Mustafa; Sirin, Burcu; Yılmaztekin, Sureyya; Kutlu, Gülnihal

    2017-10-01

    Migraine is one of the most common types of pain associated with sterile inflammatory conditions. Soluble urokinase plasminogen activator receptor (suPAR) is a potential novel inflammatory marker. We aim to determine the association between serum values of suPAR, procalcitonin, fibrinogen, and high-sensitivity C-reactive protein (hs-CRP) and migraine disease characteristics. The study involved a total of 60 migraine patients (33 patients in the interictal period, 27 patients in the attack period) and 30 healthy individuals. The serum values of suPAR were found to be significantly higher in migraine patients in the attack period than in migraine patients in the interictal period, and in healthy individuals (p < .01 for both). In addition, levels of suPAR were determined to be higher in migraine with aura patients than in migraine without aura patients. When we subdivided migraine patients according to frequency of attack (attacks/month), significant differences were found between the suPAR and procalcitonin levels (measured during the attack period) of those in the frequent-attack group (4-5 or more) versus those in the less frequent attack group (less than 4). Serum levels of procalcitonin were shown to be significantly higher in migraine patients during the attack period compared with migraine patients in the interictal period and in control subjects (p = .001 for both). Significant differences were found between plasma levels of fibrinogen in migraine patients versus control subjects (p < .01). No statistically significant difference was found between levels of hs-CRP in migraine patients versus the control group. These findings may show that presenting a high level of suPAR in migraine patients with attack and aura results to predisposition to occurring on the symptoms and that high levels of suPAR, procalcitonin and fibrinogen in patients with migraine result in neurogenic inflammation during migraine headaches.

  7. Fundamental studies of hydrogen attack in carbon-0.5molybdenum steel and weldments applied in petroelum and petrochemical industries

    NASA Astrophysics Data System (ADS)

    Liu, Peng

    High temperature hydrogen attack (HTHA) is a form of surface decarburization, internal decarburization, and/or intergranular cracking in steels exposed to high temperature (>400°F) and high hydrogen pressure. Hydrogen attack is an irreversible process which can cause permanent damage resulting in degradation of mechanical properties and failures such as leakage, bursting, fire, and/or explosion. The continuous progression of hydrogen attack in C-0.5Mo steel and weldments below the C-0.5Mo Nelson Curve has caused a significant concern for the integrity and serviceability of C-0.5Mo steel utilized for pressure vessels and piping in the petroleum refinery and petrochemical industries. A state-of-the-art literature review was implemented to provide a comprehensive overview of the published research efforts on hydrogen attack studies. The evolution of "Nelson Curves" for carbon steel, C-0.5Mo, and Cr-Mo steels was historically reviewed in regard to design applications and limitations. Testing techniques for hydrogen attack assessment were summarized under the categories of hydrogen exposure testing, mechanical evaluation, and dilatometric swelling testing. In accord with the demands of these industries, fundamental studies of hydrogen attack in C-0.5Mo steel and weldments were accomplished in terms of quantitative methodologies for hydrogen damage evaluation; hydrogen damage assessment of service exposed weldments and autoclave exposed materials; effects of carbon and alloying elements, heat treatments, hot and cold working, welding processes and postweld heat treatment (PWHT) on hydrogen attack susceptibility; development of continuous cooling transformation (CCT) diagrams for C-0.5Mo base metals and the coarse grained heat-affected zone (CGHAZ); carbide evaluation for the C-0.5Mo steel after service exposure and heat treatment; methane evolution by the reaction of hydrogen and carbides; hydrogen diffusion and methane pressure through the wall thickness of one-sided hydrogen exposure assembly; hydrogen attack mechanism and hydrogen attack limit modeling.

  8. Performance Evaluation of Localization Accuracy for a Log-Normal Shadow Fading Wireless Sensor Network under Physical Barrier Attacks

    PubMed Central

    Abdulqader Hussein, Ahmed; Rahman, Tharek A.; Leow, Chee Yen

    2015-01-01

    Localization is an apparent aspect of a wireless sensor network, which is the focus of much interesting research. One of the severe conditions that needs to be taken into consideration is localizing a mobile target through a dispersed sensor network in the presence of physical barrier attacks. These attacks confuse the localization process and cause location estimation errors. Range-based methods, like the received signal strength indication (RSSI), face the major influence of this kind of attack. This paper proposes a solution based on a combination of multi-frequency multi-power localization (C-MFMPL) and step function multi-frequency multi-power localization (SF-MFMPL), including the fingerprint matching technique and lateration, to provide a robust and accurate localization technique. In addition, this paper proposes a grid coloring algorithm to detect the signal hole map in the network, which refers to the attack-prone regions, in order to carry out corrective actions. The simulation results show the enhancement and robustness of RSS localization performance in the face of log normal shadow fading effects, besides the presence of physical barrier attacks, through detecting, filtering and eliminating the effect of these attacks. PMID:26690159

  9. Attacker-defender game from a network science perspective

    NASA Astrophysics Data System (ADS)

    Li, Ya-Peng; Tan, Suo-Yi; Deng, Ye; Wu, Jun

    2018-05-01

    Dealing with the protection of critical infrastructures, many game-theoretic methods have been developed to study the strategic interactions between defenders and attackers. However, most game models ignore the interrelationship between different components within a certain system. In this paper, we propose a simultaneous-move attacker-defender game model, which is a two-player zero-sum static game with complete information. The strategies and payoffs of this game are defined on the basis of the topology structure of the infrastructure system, which is represented by a complex network. Due to the complexity of strategies, the attack and defense strategies are confined by two typical strategies, namely, targeted strategy and random strategy. The simulation results indicate that in a scale-free network, the attacker virtually always attacks randomly in the Nash equilibrium. With a small cost-sensitive parameter, representing the degree to which costs increase with the importance of a target, the defender protects the hub targets with large degrees preferentially. When the cost-sensitive parameter exceeds a threshold, the defender switches to protecting nodes randomly. Our work provides a new theoretical framework to analyze the confrontations between the attacker and the defender on critical infrastructures and deserves further study.

  10. Vulnerability of water supply systems to cyber-physical attacks

    NASA Astrophysics Data System (ADS)

    Galelli, Stefano; Taormina, Riccardo; Tippenhauer, Nils; Salomons, Elad; Ostfeld, Avi

    2016-04-01

    The adoption of smart meters, distributed sensor networks and industrial control systems has largely improved the level of service provided by modern water supply systems. Yet, the progressive computerization exposes these critical infrastructures to cyber-physical attacks, which are generally aimed at stealing critical information (cyber-espionage) or causing service disruption (denial-of-service). Recent statistics show that water and power utilities are undergoing frequent attacks - such as the December power outage in Ukraine - , attracting the interest of operators and security agencies. Taking the security of Water Distribution Networks (WDNs) as domain of study, our work seeks to characterize the vulnerability of WDNs to cyber-physical attacks, so as to conceive adequate defense mechanisms. We extend the functionality of EPANET, which models hydraulic and water quality processes in pressurized pipe networks, to include a cyber layer vulnerable to repeated attacks. Simulation results on a medium-scale network show that several hydraulic actuators (valves and pumps, for example) can be easily attacked, causing both service disruption - i.e., water spillage and loss of pressure - and structural damages - e.g., pipes burst. Our work highlights the need for adequate countermeasures, such as attacks detection and reactive control systems.

  11. Does topological information matter for power grid vulnerability?

    PubMed

    Ouyang, Min; Yang, Kun

    2014-12-01

    Power grids, which are playing an important role in supporting the economy of a region as well as the life of its citizens, could be attacked by terrorists or enemies to damage the region. Depending on different levels of power grid information collected by the terrorists, their attack strategies might be different. This paper groups power grid information into four levels: no information, purely topological information (PTI), topological information with generator and load nodes (GLNI), and full information (including component physical properties and flow parameters information), and then identifies possible attack strategies for each information level. Analyzing and comparing power grid vulnerability under these attack strategies from both terrorists' and utility companies' point of view give rise to an approach to quantify the relative values of these three types of information, including PTI, GLNI, and component parameter information (CPI). This approach can provide information regarding the extent to which topological information matters for power system vulnerability decisions. Taking several test systems as examples, results show that for small attacks with p ≤ 0.1, CPI matters the most; when taking attack cost into consideration and assuming that the terrorists take the optimum cost-efficient attack intensity, then CPI has the largest cost-based information value.

  12. PKI Layer Cake: New Collision Attacks against the Global X.509 Infrastructure

    NASA Astrophysics Data System (ADS)

    Kaminsky, Dan; Patterson, Meredith L.; Sassaman, Len

    Research unveiled in December of 2008 [15] showed how MD5's long-known flaws could be actively exploited to attack the real-worldCertification Authority infrastructure. In this paper, we demonstrate two new classes of collision, which will be somewhat trickier to address than previous attacks against X.509: the applicability of MD2 preimage attacks against the primary root certificate for Verisign, and the difficulty of validating X.509 Names contained within PKCS#10 Certificate Requests.We also draw particular attention to two possibly unrecognized vectors for implementation flaws that have been problematic in the past: the ASN.1 BER decoder required to parsePKCS#10, and the potential for SQL injection fromtext contained within its requests. Finally, we explore why the implications of these attacks are broader than some have realized - first, because Client Authentication is sometimes tied to X.509, and second, because Extended Validation certificates were only intended to stop phishing attacks from names similar to trusted brands. As per the work of Adam Barth and Collin Jackson [4], EV does not prevent an attacker who can synthesize or acquire a "low assurance" certificate for a given name from acquiring the "green bar" EV experience.

  13. Security analysis and improvement of a privacy authentication scheme for telecare medical information systems.

    PubMed

    Wu, Fan; Xu, Lili

    2013-08-01

    Nowadays, patients can gain many kinds of medical service on line via Telecare Medical Information Systems(TMIS) due to the fast development of computer technology. So security of communication through network between the users and the server is very significant. Authentication plays an important part to protect information from being attacked by malicious attackers. Recently, Jiang et al. proposed a privacy enhanced scheme for TMIS using smart cards and claimed their scheme was better than Chen et al.'s. However, we have showed that Jiang et al.'s scheme has the weakness of ID uselessness and is vulnerable to off-line password guessing attack and user impersonation attack if an attacker compromises the legal user's smart card. Also, it can't resist DoS attack in two cases: after a successful impersonation attack and wrong password input in Password change phase. Then we propose an improved mutual authentication scheme used for a telecare medical information system. Remote monitoring, checking patients' past medical history record and medical consultant can be applied in the system where information transmits via Internet. Finally, our analysis indicates that the suggested scheme overcomes the disadvantages of Jiang et al.'s scheme and is practical for TMIS.

  14. Localization-Free Detection of Replica Node Attacks in Wireless Sensor Networks Using Similarity Estimation with Group Deployment Knowledge

    PubMed Central

    Ding, Chao; Yang, Lijun; Wu, Meng

    2017-01-01

    Due to the unattended nature and poor security guarantee of the wireless sensor networks (WSNs), adversaries can easily make replicas of compromised nodes, and place them throughout the network to launch various types of attacks. Such an attack is dangerous because it enables the adversaries to control large numbers of nodes and extend the damage of attacks to most of the network with quite limited cost. To stop the node replica attack, we propose a location similarity-based detection scheme using deployment knowledge. Compared with prior solutions, our scheme provides extra functionalities that prevent replicas from generating false location claims without deploying resource-consuming localization techniques on the resource-constraint sensor nodes. We evaluate the security performance of our proposal under different attack strategies through heuristic analysis, and show that our scheme achieves secure and robust replica detection by increasing the cost of node replication. Additionally, we evaluate the impact of network environment on the proposed scheme through theoretic analysis and simulation experiments, and indicate that our scheme achieves effectiveness and efficiency with substantially lower communication, computational, and storage overhead than prior works under different situations and attack strategies. PMID:28098846

  15. Human behaviour can trigger large carnivore attacks in developed countries

    PubMed Central

    Penteriani, Vincenzo; Delgado, María del Mar; Pinchera, Francesco; Naves, Javier; Fernández-Gil, Alberto; Kojola, Ilpo; Härkönen, Sauli; Norberg, Harri; Frank, Jens; Fedriani, José María; Sahlén, Veronica; Støen, Ole-Gunnar; Swenson, Jon E.; Wabakken, Petter; Pellegrini, Mario; Herrero, Stephen; López-Bao, José Vicente

    2016-01-01

    The media and scientific literature are increasingly reporting an escalation of large carnivore attacks on humans in North America and Europe. Although rare compared to human fatalities by other wildlife, the media often overplay large carnivore attacks on humans, causing increased fear and negative attitudes towards coexisting with and conserving these species. Although large carnivore populations are generally increasing in developed countries, increased numbers are not solely responsible for the observed rise in the number of attacks by large carnivores. Here we show that an increasing number of people are involved in outdoor activities and, when doing so, some people engage in risk-enhancing behaviour that can increase the probability of a risky encounter and a potential attack. About half of the well-documented reported attacks have involved risk-enhancing human behaviours, the most common of which is leaving children unattended. Our study provides unique insight into the causes, and as a result the prevention, of large carnivore attacks on people. Prevention and information that can encourage appropriate human behaviour when sharing the landscape with large carnivores are of paramount importance to reduce both potentially fatal human-carnivore encounters and their consequences to large carnivores. PMID:26838467

  16. Human behaviour can trigger large carnivore attacks in developed countries.

    PubMed

    Penteriani, Vincenzo; Delgado, María del Mar; Pinchera, Francesco; Naves, Javier; Fernández-Gil, Alberto; Kojola, Ilpo; Härkönen, Sauli; Norberg, Harri; Frank, Jens; Fedriani, José María; Sahlén, Veronica; Støen, Ole-Gunnar; Swenson, Jon E; Wabakken, Petter; Pellegrini, Mario; Herrero, Stephen; López-Bao, José Vicente

    2016-02-03

    The media and scientific literature are increasingly reporting an escalation of large carnivore attacks on humans in North America and Europe. Although rare compared to human fatalities by other wildlife, the media often overplay large carnivore attacks on humans, causing increased fear and negative attitudes towards coexisting with and conserving these species. Although large carnivore populations are generally increasing in developed countries, increased numbers are not solely responsible for the observed rise in the number of attacks by large carnivores. Here we show that an increasing number of people are involved in outdoor activities and, when doing so, some people engage in risk-enhancing behaviour that can increase the probability of a risky encounter and a potential attack. About half of the well-documented reported attacks have involved risk-enhancing human behaviours, the most common of which is leaving children unattended. Our study provides unique insight into the causes, and as a result the prevention, of large carnivore attacks on people. Prevention and information that can encourage appropriate human behaviour when sharing the landscape with large carnivores are of paramount importance to reduce both potentially fatal human-carnivore encounters and their consequences to large carnivores.

  17. Measurement of the Static Stability and Control and the Damping Derivatives of a 0.13-Scale Model of the Convair XFY-1 Airplane, TED No. NACA DE 368

    NASA Technical Reports Server (NTRS)

    Johnson, Joseph L.

    1954-01-01

    An investigation has been conducted to determine the static stability and control and damping in roll and yaw of a 0.13-scale model of the Convair XFY-1 airplane with propellers off from 0 deg to 90 deg angle of attack. The tests showed that a slightly unstable pitch-up tendency occurred simultaneously with a break in the normal-force curve in the angle-of-attack range from about 27 deg to 36 deg. The top vertical tail contributed positive values of static directional stability and effective dihedral up to an angle of attack of about 35 deg. The bottom tail contributed positive values of static directional stability but negative values of effective dihedral throughout the angle-of-attack range. Effectiveness of the control surfaces decreased to very low values at the high angles of attack, The model had positive damping in yaw and damping in roll about the body axes over the angle-of-attack range but the damping in yaw decreased to about zero at 90 deg angle of attack.

  18. Does topological information matter for power grid vulnerability?

    NASA Astrophysics Data System (ADS)

    Ouyang, Min; Yang, Kun

    2014-12-01

    Power grids, which are playing an important role in supporting the economy of a region as well as the life of its citizens, could be attacked by terrorists or enemies to damage the region. Depending on different levels of power grid information collected by the terrorists, their attack strategies might be different. This paper groups power grid information into four levels: no information, purely topological information (PTI), topological information with generator and load nodes (GLNI), and full information (including component physical properties and flow parameters information), and then identifies possible attack strategies for each information level. Analyzing and comparing power grid vulnerability under these attack strategies from both terrorists' and utility companies' point of view give rise to an approach to quantify the relative values of these three types of information, including PTI, GLNI, and component parameter information (CPI). This approach can provide information regarding the extent to which topological information matters for power system vulnerability decisions. Taking several test systems as examples, results show that for small attacks with p ≤ 0.1, CPI matters the most; when taking attack cost into consideration and assuming that the terrorists take the optimum cost-efficient attack intensity, then CPI has the largest cost-based information value.

  19. Performance Evaluation of Localization Accuracy for a Log-Normal Shadow Fading Wireless Sensor Network under Physical Barrier Attacks.

    PubMed

    Hussein, Ahmed Abdulqader; Rahman, Tharek A; Leow, Chee Yen

    2015-12-04

    Localization is an apparent aspect of a wireless sensor network, which is the focus of much interesting research. One of the severe conditions that needs to be taken into consideration is localizing a mobile target through a dispersed sensor network in the presence of physical barrier attacks. These attacks confuse the localization process and cause location estimation errors. Range-based methods, like the received signal strength indication (RSSI), face the major influence of this kind of attack. This paper proposes a solution based on a combination of multi-frequency multi-power localization (C-MFMPL) and step function multi-frequency multi-power localization (SF-MFMPL), including the fingerprint matching technique and lateration, to provide a robust and accurate localization technique. In addition, this paper proposes a grid coloring algorithm to detect the signal hole map in the network, which refers to the attack-prone regions, in order to carry out corrective actions. The simulation results show the enhancement and robustness of RSS localization performance in the face of log normal shadow fading effects, besides the presence of physical barrier attacks, through detecting, filtering and eliminating the effect of these attacks.

  20. Localization-Free Detection of Replica Node Attacks in Wireless Sensor Networks Using Similarity Estimation with Group Deployment Knowledge.

    PubMed

    Ding, Chao; Yang, Lijun; Wu, Meng

    2017-01-15

    Due to the unattended nature and poor security guarantee of the wireless sensor networks (WSNs), adversaries can easily make replicas of compromised nodes, and place them throughout the network to launch various types of attacks. Such an attack is dangerous because it enables the adversaries to control large numbers of nodes and extend the damage of attacks to most of the network with quite limited cost. To stop the node replica attack, we propose a location similarity-based detection scheme using deployment knowledge. Compared with prior solutions, our scheme provides extra functionalities that prevent replicas from generating false location claims without deploying resource-consuming localization techniques on the resource-constraint sensor nodes. We evaluate the security performance of our proposal under different attack strategies through heuristic analysis, and show that our scheme achieves secure and robust replica detection by increasing the cost of node replication. Additionally, we evaluate the impact of network environment on the proposed scheme through theoretic analysis and simulation experiments, and indicate that our scheme achieves effectiveness and efficiency with substantially lower communication, computational, and storage overhead than prior works under different situations and attack strategies.

Top