Science.gov

Sample records for ad hominem attacks

  1. Discounting Testimony with the Argument Ad Hominem and a Bayesian Congruent Prior Model

    ERIC Educational Resources Information Center

    Bhatia, Jaydeep-Singh; Oaksford, Mike

    2015-01-01

    When directed to ignore evidence of a witness's previous bad character because of a violation of the rules of evidence, are jurors' beliefs still affected? The intuition is that they will be because in everyday argumentation, fallacies, like the ad hominem, are effective argumentative strategies. An ad hominem argument (against the person)…

  2. "13 Angry Men": Dale Bumper's "Ad Hominem" Impeachment Trial of President Clinton.

    ERIC Educational Resources Information Center

    Brovero, Adrienne F.

    2000-01-01

    Analyzes Senator Bumpers' argument in the Clinton impeachment proceedings as a bias type of "ad hominem" argument. Notes specifically Bumpers' argument that the House Managers were not fulfilling their proper roles in the proceedings. Claims Bumpers' bias position was reasonable in the argumentative context in which it took place. (NH)

  3. Discounting testimony with the argument ad hominem and a Bayesian congruent prior model.

    PubMed

    Bhatia, Jaydeep-Singh; Oaksford, Mike

    2015-09-01

    When directed to ignore evidence of a witness's previous bad character because of a violation of the rules of evidence, are jurors' beliefs still affected? The intuition is that they will be because in everyday argumentation, fallacies, like the ad hominem, are effective argumentative strategies. An ad hominem argument (against the person) undermines a conclusion by questioning the character of the proposer. This intuition divides current theories of argumentation. According to pragmadialectical theory (e.g., Van Eemeren & Grootendorst, 2004), procedural rules exactly like the rules of evidence are part of our cognitive resources for evaluating arguments. If one of these rules is violated, an argument should be treated as a fallacy and so it should not alter someone's belief in the conclusion. Some recent experiments investigating how reasonable these arguments are perceived to be seem to support this account (van Eemeren, Garssen, & Meuffels, 2009). These experiments are critiqued from the perspective of the relevance (Walton, 2009, 2010) and epistemic (Hahn & Oaksford, 2006, 2007; Oaksford & Hahn, 2004) approaches to argumentation. An experiment investigates the predictions of these approaches for a graded belief change version of van Eemeren et al.'s (2009) experiment, and the results are modeled using a Bayesian congruent prior model. These results cannot be explained by the pragmadialectical approach and show that in everyday argument people are extremely sensitive to the epistemic relevance of evidence. Moreover, it seems highly unlikely that this can be switched off in more formal contexts such as the courtroom. PMID:26147667

  4. Use of "Ad Hominem" Argument in Political Discourse: The Battalino Case from the Impeachment Trial of President Clinton.

    ERIC Educational Resources Information Center

    Walton, Douglas

    2000-01-01

    Examines argument from the televised impeachment trial of President Bill Clinton concerning the similarity of the Clinton case to the Linda Battalino case and asks if the argument does or does not represents an "ad hominem" argument. Provides an introduction to the viewpoint of informal logic and a summary of the various forms of argument at…

  5. Liars and Ghosts in the House of Congress: Frank's "Ad Hominem" Arguments in the Case against the Defense of Marriage Act.

    ERIC Educational Resources Information Center

    Clarke, Lynn E.

    2000-01-01

    Offers a critical analysis of Rep. Barney Frank's speech delivered in the House of Representatives concerning the "Defense of Marriage Act." Argues that Frank attempts to persuade colleagues by advancing two "ad hominem" arguments, one of which could potentially shift the focus from the need to defend marriages from same-sex couples towards the…

  6. Toward an experimental account of argumentation: the case of the slippery slope and the ad hominem arguments

    PubMed Central

    Lillo-Unglaube, Marco; Canales-Johnson, Andrés; Navarrete, Gorka; Bravo, Claudio Fuentes

    2014-01-01

    Argumentation is a crucial component of our lives. Although in the absence of rational debate our legal, political, and scientific systems would not be possible, there is still no integrated area of research on the psychology of argumentation. Furthermore, classical theories of argumentation are normative (i.e., the acceptability of an argument is determined by a set of norms or logical rules), which sometimes creates a dissociation between the theories and people’s behavior. We think the current challenge for psychology is to bring together the cognitive and normative accounts of argumentation. In this article, we exemplify this point by analyzing two cases of argumentative structures experimentally studied in the context of cognitive psychology. Specifically, we focus on the slippery slope argument and the ad hominem argument under the frameworks of Bayesian and pragma-dialectics approaches, respectively. We think employing more descriptive and experimental accounts of argumentation would help Psychology to bring closer the cognitive and normative accounts of argumentation with the final goal of establishing an integrated area of research on the psychology of argumentation. PMID:25566112

  7. IDMA: improving the defense against malicious attack for mobile ad hoc networks based on ARIP protocol

    NASA Astrophysics Data System (ADS)

    Peng, Chaorong; Chen, Chang Wen

    2008-04-01

    Malicious nodes are mounting increasingly sophisticated attacking operations on the Mobile Ad Hoc Networks (MANETs). This is mainly because the IP-based MANETs are vulnerable to attacks by various malicious nodes. However, the defense against malicious attack can be improved when a new layer of network architecture can be developed to separate true IP address from disclosing to the malicious nodes. In this paper, we propose a new algorithm to improve the defense against malicious attack (IDMA) that is based on a recently developed Assignment Router Identify Protocol (ARIP) for the clustering-based MANET management. In the ARIP protocol, we design the ARIP architecture based on the new Identity instead of the vulnerable IP addresses to provide the required security that is embedded seamlessly into the overall network architecture. We make full use of ARIP's special property to monitor gateway forward packets by Reply Request Route Packets (RREP) without additional intrusion detection layer. We name this new algorithm IDMA because of its inherent capability to improve the defense against malicious attacks. Through IDMA, a watching algorithm can be established so as to counterattack the malicious node in the routing path when it unusually drops up packets. We provide analysis examples for IDMA for the defense against a malicious node that disrupts the route discovery by impersonating the destination, or by responding with state of corrupted routing information, or by disseminating forged control traffic. The IDMA algorithm is able to counterattack the malicious node in the cases when the node lunch DoS attack by broadcast a large number of route requests, or make Target traffic congestion by delivering huge mount of data; or spoof the IP addresses and send forge packets with a fake ID to the same Target causing traffic congestion at that destination. We have implemented IDMA algorism using the GloMoSim simulator and have demonstrated its performance under a variety of

  8. Neural methods based on modified reputation rules for detection and identification of intrusion attacks in wireless ad hoc sensor networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2010-04-01

    Determining methods to secure the process of data fusion against attacks by compromised nodes in wireless sensor networks (WSNs) and to quantify the uncertainty that may exist in the aggregation results is a critical issue in mitigating the effects of intrusion attacks. Published research has introduced the concept of the trustworthiness (reputation) of a single sensor node. Reputation is evaluated using an information-theoretic concept, the Kullback- Leibler (KL) distance. Reputation is added to the set of security features. In data aggregation, an opinion, a metric of the degree of belief, is generated to represent the uncertainty in the aggregation result. As aggregate information is disseminated along routes to the sink node(s), its corresponding opinion is propagated and regulated by Josang's belief model. By applying subjective logic on the opinion to manage trust propagation, the uncertainty inherent in aggregation results can be quantified for use in decision making. The concepts of reputation and opinion are modified to allow their application to a class of dynamic WSNs. Using reputation as a factor in determining interim aggregate information is equivalent to implementation of a reputation-based security filter at each processing stage of data fusion, thereby improving the intrusion detection and identification results based on unsupervised techniques. In particular, the reputation-based version of the probabilistic neural network (PNN) learns the signature of normal network traffic with the random probability weights normally used in the PNN replaced by the trust-based quantified reputations of sensor data or subsequent aggregation results generated by the sequential implementation of a version of Josang's belief model. A two-stage, intrusion detection and identification algorithm is implemented to overcome the problems of large sensor data loads and resource restrictions in WSNs. Performance of the twostage algorithm is assessed in simulations of WSN

  9. Heart attack

    MedlinePlus

    ... infarction; Non-ST-elevation myocardial infarction; NSTEMI; CAD-heart attack; Coronary artery disease-heart attack ... made up of cholesterol and other cells. A heart attack may occur when: A tear in the ...

  10. Heart Attack

    MedlinePlus

    ... attack treatment works best when it's given right after symptoms occur. Prompt treatment of a heart attack can help prevent or limit damage to the heart and prevent sudden death. Call 9-1-1 Right Away A heart ...

  11. Heart attack

    MedlinePlus

    ... a heart attack take part in a cardiac rehabilitation program. ... al. eds. Braunwald's Heart Disease: A Textbook of Cardiovascular Medicine . 10th ed. Philadelphia, PA: Elsevier Saunders; 2014: ...

  12. Heart Attack

    MedlinePlus

    ... a million people in the U.S. have a heart attack. About half of them die. Many people have permanent heart damage or die because they don't get ... It's important to know the symptoms of a heart attack and call 9-1-1 if someone ...

  13. Heart Attack

    MedlinePlus

    ... lower “bad” cholesterol (also called LDL, or low-density lipoprotein) levels and may help increase “good” cholesterol (also called HDL, or high-density lipoprotein). If you have had a heart attack, ...

  14. Heart Attack

    MedlinePlus

    ... have a heart attack. About half of them die. Many people have permanent heart damage or die because they don't get help immediately. It's ... few hours causes the affected heart muscle to die. NIH: National Heart, Lung, and Blood Institute

  15. Heart Attack Risk Assessment

    MedlinePlus

    ... Pressure Tools & Resources Stroke More Heart Attack Risk Assessment Updated:May 31,2016 We're sorry, but ... Can You Recognize a Heart Attack? Quiz Risk Assessment Patient Information Sheets: Heart Attack Heart Attack Personal ...

  16. Genetic attack on neural cryptography

    SciTech Connect

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-15

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  17. When women attack.

    PubMed

    McLaughlin, Bryan; Davis, Catasha; Coppini, David; Kim, Young Mie; Knisely, Sandra; McLeod, Douglas

    2015-01-01

    The common assumption that female candidates on the campaign trail should not go on the attack, because such tactics contradict gender stereotypes, has not received consistent support. We argue that in some circumstances gender stereotypes will favor female politicians going negative. To test this proposition, this study examines how gender cues affect voter reactions to negative ads in the context of a political sex scandal, a context that should prime gender stereotypes that favor females. Using an online experiment involving a national sample of U.S. adults (N = 599), we manipulate the gender and partisan affiliation of a politician who attacks a male opponent caught in a sex scandal involving sexually suggestive texting to a female intern. Results show that in the context of a sex scandal, a female candidate going on the attack is evaluated more positively than a male. Moreover, while female participants viewed the female sponsor more favorably, sponsor gender had no effect on male participants. Partisanship also influenced candidate evaluations: the Democratic female candidate was evaluated more favorably than her Republican female counterpart. PMID:26399945

  18. Heart Attack Recovery FAQs

    MedlinePlus

    ... Pressure High Blood Pressure Tools & Resources Stroke More Heart Attack Recovery FAQs Updated:Aug 24,2016 Most people ... recovery. View an animation of a heart attack . Heart Attack Recovery Questions and Answers What treatments will I ...

  19. Heart attack first aid

    MedlinePlus

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  20. About Heart Attacks

    MedlinePlus

    ... survive. A heart attack occurs when the blood flow that brings oxygen to the heart muscle is severely reduced or ... survive. A heart attack occurs when the blood flow that brings oxygen to the heart muscle is severely reduced or ...

  1. Pericarditis - after heart attack

    MedlinePlus

    ... medlineplus.gov/ency/article/000166.htm Pericarditis - after heart attack To use the sharing features on this page, ... occur in the days or weeks following a heart attack. Causes Two types of pericarditis can occur after ...

  2. Seven Deadliest Network Attacks

    SciTech Connect

    Prowell, Stacy J; Borkin, Michael; Kraus, Robert

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

  3. Performance Evaluation of AODV with Blackhole Attack

    NASA Astrophysics Data System (ADS)

    Dara, Karuna

    2010-11-01

    A Mobile Ad Hoc Network (MANET) is a temporary network set up by a wireless mobile computers moving arbitrary in the places that have no network infrastructure. These nodes maintain connectivity in a decentralized manner. Since the nodes communicate with each other, they cooperate by forwarding data packets to other nodes in the network. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, mobile ad-hoc networks are unprotected to attacks of the malicious nodes. One of these attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. In this paper, we simulated the black hole attack in various mobile ad-hoc network scenarios using AODV routing protocol of MANET and have tried to find a effect if number of nodes are increased with increase in malicious nodes.

  4. Situational awareness of a coordinated cyber attack

    NASA Astrophysics Data System (ADS)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  5. Method for detecting sophisticated cyber attacks

    SciTech Connect

    Potok, Thomas E.

    2008-11-18

    A method of analyzing computer intrusion detection information that looks beyond known attacks and abnormal access patterns to the critical information that an intruder may want to access. Unique target identifiers and type of work performed by the networked targets is added to audit log records. Analysis using vector space modeling, dissimilarity matrix comparison, and clustering of the event records is then performed.

  6. Making MANET secured against malicious attack

    NASA Astrophysics Data System (ADS)

    Kush, Ashwani; Taneja, Sunil; Kush, Shagun

    2011-12-01

    A Mobile Adhoc Network (MANET) is characterized by mobile nodes, multihop wireless connectivity, infrastructureless environment and dynamic topology. A recent trend in Ad Hoc network routing is the reactive ondemand philosophy where routes are established only when required. Stable Routing is of major concern in Ad hoc routing. Security and Power efficiency are the major concerns in this field. This paper is an effort to use security to achieve more reliable routing. The ad hoc environment is accessible to both legitimate network users and malicious attackers. The proposed scheme is intended to incorporate security aspect on existing protocols. The study will help in making protocol more robust against attacks to achieve stable routing in routing protocols.

  7. Signs of a Heart Attack

    MedlinePlus

    ... attack Heart Health and Stroke Signs of a heart attack Related information Make the Call. Don't Miss ... to top More information on Signs of a heart attack Read more from womenshealth.gov Make the Call, ...

  8. Pericarditis - after heart attack

    MedlinePlus

    Dressler syndrome; Post-MI pericarditis; Post-cardiac injury syndrome; Postcardiotomy pericarditis ... Two types of pericarditis can occur after a heart attack . Early pericarditis: This form most occurs within ...

  9. Heart attack first aid

    MedlinePlus

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... of patients with unstable angina/non-ST-elevation myocardial infarction (updating the 2007 guideline and replacing the 2011 ...

  10. Collaborative Attack vs. Collaborative Defense

    NASA Astrophysics Data System (ADS)

    Xu, Shouhuai

    We have witnessed many attacks in the cyberspace. However, most attacks are launched by individual attackers even though an attack may involve many compromised computers. In this paper, we envision what we believe to be the next generation cyber attacks — collaborative attacks. Collaborative attacks can be launched by multiple attackers (i.e., human attackers or criminal organizations), each of which may have some specialized expertise. This is possible because cyber attacks can become very sophisticated and specialization of attack expertise naturally becomes relevant. To counter collaborative attacks, we might need collaborative defense because each “chain” in a collaborative attack may be only adequately dealt with by a different defender. In order to understand collaborative attack and collaborative defense, we present a high-level abstracted framework for evaluating the effectiveness of collaborative defense against collaborative attacks. As a first step towards realizing and instantiating the framework, we explore a characterization of collaborative attacks and collaborative defense from the relevant perspectives.

  11. A fatal elephant attack.

    PubMed

    Hejna, Petr; Zátopková, Lenka; Safr, Miroslav

    2012-01-01

    A rare case of an elephant attack is presented. A 44-year-old man working as an elephant keeper was attacked by a cow elephant when he tripped over a foot chain while the animal was being medically treated. The man fell down and was consequently repeatedly attacked with elephant tusks. The man sustained multiple stab injuries to both groin regions, a penetrating injury to the abdominal wall with traumatic prolapse of the loops of the small bowel, multiple defects of the mesentery, and incomplete laceration of the abdominal aorta with massive bleeding into the abdominal cavity. In addition to the penetrating injuries, the man sustained multiple rib fractures with contusion of both lungs and laceration of the right lobe of the liver, and comminuted fractures of the pelvic arch and left femoral body. The man died shortly after he had been received at the hospital. The cause of death was attributed to traumatic shock. PMID:22085093

  12. Value Added?

    ERIC Educational Resources Information Center

    UCLA IDEA, 2012

    2012-01-01

    Value added measures (VAM) uses changes in student test scores to determine how much "value" an individual teacher has "added" to student growth during the school year. Some policymakers, school districts, and educational advocates have applauded VAM as a straightforward measure of teacher effectiveness: the better a teacher, the better students…

  13. Fatal crocodile attack.

    PubMed

    Chattopadhyay, Saurabh; Shee, Biplab; Sukul, Biswajit

    2013-11-01

    Attacks on human beings by various animals leading to varied types of injuries and even death in some cases are not uncommon. Crocodile attacks on humans have been reported from a number of countries across the globe. Deaths in such attacks are mostly due to mechanical injuries or drowning. Bites by the crocodiles often cause the limbs to be separated from the body. The present case refers to an incident of a fatal attack by a crocodile on a 35 years old female where only the mutilated head of the female was recovered. Multiple lacerated wounds over the face and scalp along with fracture of the cranial bones was detected on autopsy. Two distinct bite marks in the form of punched in holes were noted over the parietal and frontal bones. Injuries on the head with its traumatic amputation from the body were sufficient to cause death. However, the presence of other fatal injuries on the unrecovered body parts could not be ruled out. PMID:24237838

  14. Word Attack Model.

    ERIC Educational Resources Information Center

    Follettie, Joseph F.

    A limited analysis of alternative approaches to phonemic-level word attack instruction is provided in this document. The instruction segment begins with training in letter-sound correspondences for which mastery of certain skills is assumed. Instruction ends with the decoding of novel items having a consonant-vowel-consonant construction. Contents…

  15. Transient Ischemic Attack

    MedlinePlus Videos and Cool Tools

    ... to call 9-1-1 immediately for any stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent The content in this library is for educational purposes only, and therefore is not intended to be a substitute for professional medical advice, diagnosis or treatment.

  16. Application distribution model and related security attacks in VANET

    NASA Astrophysics Data System (ADS)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  17. Facial dog attack injuries.

    PubMed

    Lin, Wei; Patil, Pavan Manohar

    2015-02-01

    The exposed position of the face makes it vulnerable to dog bite injuries. This fact combined with the short stature of children makes them a high-risk group for such attacks. In contrast to wounds inflicted by assaults and accidents, dog bite wounds are deep puncture type wounds compounded by the presence of pathologic bacteria from the saliva of the attacking dog. This, combined with the presence of crushed, devitalized tissue makes these wounds highly susceptible to infection. Key to successful management of such wounds are meticulous cleansing of the wound, careful debridement, primary repair, appropriate antibiotic therapy, and rabies and tetanus immunization where indicated. This review presents an overview of the epidemiology, presentation, management of such emergencies, and the recent advances in the care of such patients. PMID:25829713

  18. Adding Value.

    ERIC Educational Resources Information Center

    Orsini, Larry L.; Hudack, Lawrence R.; Zekan, Donald L.

    1999-01-01

    The value-added statement (VAS), relatively unknown in the United States, is used in financial reports by many European companies. Saint Bonaventure University (New York) has adapted a VAS to make it appropriate for not-for-profit universities by identifying stakeholder groups (students, faculty, administrators/support personnel, creditors, the…

  19. Improving Attack Graph Visualization through Data Reduction and Attack Grouping

    SciTech Connect

    John Homer; Ashok Varikuti; Xinming Ou; Miles A. McQueen

    2008-09-01

    Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions. This paper presents methodologies that can 1) automatically identify portions of an attack graph that do not help a user to understand the core security problems and so can be trimmed, and 2) automatically group similar attack steps as virtual nodes in a model of the network topology, to immediately increase the understandability of the data. We believe both methods are important steps toward improving visualization of attack graphs to make them more useful in configuration management for large enterprise networks. We implemented our methods using one of the existing attack-graph toolkits. Initial experimentation shows that the proposed approaches can 1) significantly reduce the complexity of attack graphs by trimming a large portion of the graph that is not needed for a user to understand the security problem, and 2) significantly increase the accessibility and understandability of the data presented in the attack graph by clearly showing, within a generated visualization of the network topology, the number and type of potential attacks to which each host is exposed.

  20. DIS in AdS

    NASA Astrophysics Data System (ADS)

    Albacete, Javier L.; Kovchegov, Yuri V.; Taliotis, Anastasios

    2009-03-01

    We calculate the total cross section for the scattering of a quark-anti-quark dipole on a large nucleus at high energy for a strongly coupled N = 4 super Yang-Mills theory using AdS/CFT correspondence. We model the nucleus by a metric of a shock wave in AdS5. We then calculate the expectation value of the Wilson loop (the dipole) by finding the extrema of the Nambu-Goto action for an open string attached to the quark and antiquark lines of the loop in the background of an AdS5 shock wave. We find two physically meaningful extremal string configurations. For both solutions we obtain the forward scattering amplitude N for the quark dipole-nucleus scattering. We study the onset of unitarity with increasing center-of-mass energy and transverse size of the dipole: we observe that for both solutions the saturation scale Qs is independent of energy/Bjorken-x and depends on the atomic number of the nucleus as Qs˜A1/3. Finally we observe that while one of the solutions we found corresponds to the pomeron intercept of αP = 2 found earlier in the literature, when extended to higher energy or larger dipole sizes it violates the black disk limit. The other solution we found respects the black disk limit and yields the pomeron intercept of αP = 1.5. We thus conjecture that the right pomeron intercept in gauge theories at strong coupling may be αP = 1.5.

  1. TCPL: A Defense against wormhole attacks in wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Kumar, K. E. Naresh; Waheed, Mohd. Abdul; Basappa, K. Kari

    2010-10-01

    Do In this paper presents recent advances in technology have made low-cost, low-power wireless sensors with efficient energy consumption. A network of such nodes can coordinate among themselves for distributed sensing and processing of certain data. For which, we propose an architecture to provide a stateless solution in sensor networks for efficient routing in wireless sensor networks. This type of architecture is known as Tree Cast. We propose a unique method of address allocation, building up multiple disjoint trees which are geographically inter-twined and rooted at the data sink. Using these trees, routing messages to and from the sink node without maintaining any routing state in the sensor nodes is possible. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many sensor network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes.

  2. TCPL: A Defense against wormhole attacks in wireless sensor networks

    SciTech Connect

    Kumar, K. E. Naresh; Waheed, Mohd. Abdul; Basappa, K. Kari

    2010-10-26

    Do In this paper presents recent advances in technology have made low-cost, low-power wireless sensors with efficient energy consumption. A network of such nodes can coordinate among themselves for distributed sensing and processing of certain data. For which, we propose an architecture to provide a stateless solution in sensor networks for efficient routing in wireless sensor networks. This type of architecture is known as Tree Cast. We propose a unique method of address allocation, building up multiple disjoint trees which are geographically inter-twined and rooted at the data sink. Using these trees, routing messages to and from the sink node without maintaining any routing state in the sensor nodes is possible. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many sensor network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes.

  3. Sulfate attack expansion mechanisms

    SciTech Connect

    Müllauer, Wolfram Beddoe, Robin E.; Heinz, Detlef

    2013-10-15

    A specially constructed stress cell was used to measure the stress generated in thin-walled Portland cement mortar cylinders caused by external sulfate attack. The effects of sulfate concentration of the storage solution and C{sub 3}A content of the cement were studied. Changes in mineralogical composition and pore size distribution were investigated by X-ray diffraction and mercury intrusion porosimetry, respectively. Damage is due to the formation of ettringite in small pores (10–50 nm) which generates stresses up to 8 MPa exceeding the tensile strength of the binder matrix. Higher sulfate concentrations and C{sub 3}A contents result in higher stresses. The results can be understood in terms of the effect of crystal surface energy and size on supersaturation and crystal growth pressure.

  4. DIS in AdS

    SciTech Connect

    Albacete, Javier L.; Kovchegov, Yuri V.; Taliotis, Anastasios

    2009-03-23

    We calculate the total cross section for the scattering of a quark-anti-quark dipole on a large nucleus at high energy for a strongly coupled N = 4 super Yang-Mills theory using AdS/CFT correspondence. We model the nucleus by a metric of a shock wave in AdS{sub 5}. We then calculate the expectation value of the Wilson loop (the dipole) by finding the extrema of the Nambu-Goto action for an open string attached to the quark and antiquark lines of the loop in the background of an AdS{sub 5} shock wave. We find two physically meaningful extremal string configurations. For both solutions we obtain the forward scattering amplitude N for the quark dipole-nucleus scattering. We study the onset of unitarity with increasing center-of-mass energy and transverse size of the dipole: we observe that for both solutions the saturation scale Q{sub s} is independent of energy/Bjorken-x and depends on the atomic number of the nucleus as Q{sub s}{approx}A{sup 1/3}. Finally we observe that while one of the solutions we found corresponds to the pomeron intercept of {alpha}{sub P} = 2 found earlier in the literature, when extended to higher energy or larger dipole sizes it violates the black disk limit. The other solution we found respects the black disk limit and yields the pomeron intercept of {alpha}{sub P} = 1.5. We thus conjecture that the right pomeron intercept in gauge theories at strong coupling may be {alpha}{sub P} = 1.5.

  5. Degree-based attacks and defense strategies in complex networks

    NASA Astrophysics Data System (ADS)

    Yehezkel, Aviv; Cohen, Reuven

    2012-12-01

    We study the stability of random scale-free networks to degree-dependent attacks. We present analytical and numerical results to compute the critical fraction pc of nodes that need to be removed for destroying the network under this attack for different attack parameters. We study the effect of different defense strategies, based on the addition of a constant number of links on network robustness. We test defense strategies based on adding links to either low degree, middegree or high degree nodes. We find using analytical results and simulations that the middegree nodes defense strategy leads to the largest improvement to the network robustness against degree-based attacks. We also test these defense strategies on an internet autonomous systems map and obtain similar results.

  6. Degree-based attacks and defense strategies in complex networks.

    PubMed

    Yehezkel, Aviv; Cohen, Reuven

    2012-12-01

    We study the stability of random scale-free networks to degree-dependent attacks. We present analytical and numerical results to compute the critical fraction p_{c} of nodes that need to be removed for destroying the network under this attack for different attack parameters. We study the effect of different defense strategies, based on the addition of a constant number of links on network robustness. We test defense strategies based on adding links to either low degree, middegree or high degree nodes. We find using analytical results and simulations that the middegree nodes defense strategy leads to the largest improvement to the network robustness against degree-based attacks. We also test these defense strategies on an internet autonomous systems map and obtain similar results. PMID:23368011

  7. Prevention of Tunneling Attack in endairA

    NASA Astrophysics Data System (ADS)

    Fanaei, Mohammad; Fanian, Ali; Berenjkoub, Mehdi

    endairA is one of the most secure on-demand ad hoc network source routing protocols which provides several defense mechanisms against so many types of attacks. In this paper, we prove the vulnerability of endairA to the tunneling attack by presenting an attack scenario against it. We also propose a new security mechanism to defend it against the tunneling attack by the utilization of the delay between receiving and sending its control packets computed locally by all intermediate nodes. Our proposed security mechanism can detect probable tunnels in the route as well as approximate locations of the adversarial nodes. It needs no time synchronization between mobile nodes of the network. It also does not change the number of control packets involved in endairA and only modifies the RREP messages slightly.

  8. Bubbling AdS3

    NASA Astrophysics Data System (ADS)

    Martelli, Dario; Morales, Jose F.

    2005-02-01

    In the light of the recent Lin, Lunin, Maldacena (LLM) results, we investigate 1/2-BPS geometries in minimal (and next to minimal) supergravity in D = 6 dimensions. In the case of minimal supergravity, solutions are given by fibrations of a two-torus T2 specified by two harmonic functions. For a rectangular torus the two functions are related by a non-linear equation with rare solutions: AdS3 × S3, the pp-wave and the multi-center string. ``Bubbling'', i.e. superpositions of droplets, is accommodated by allowing the complex structure of the T2 to vary over the base. The analysis is repeated in the presence of a tensor multiplet and similar conclusions are reached, with generic solutions describing D1D5 (or their dual fundamental string-momentum) systems. In this framework, the profile of the dual fundamental string-momentum system is identified with the boundaries of the droplets in a two-dimensional plane.

  9. Thrombolytic drugs for heart attack

    MedlinePlus

    ... attack URL of this page: //medlineplus.gov/ency/article/007488.htm Thrombolytic drugs for heart attack To use the sharing features on this page, ... the management of patients with non-ST-elevation acute coronary syndromes: a report ... myocardial infarction: a report of the American College of Cardiology ...

  10. WILD PIG ATTACKS ON HUMANS

    SciTech Connect

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  11. Impact modeling and prediction of attacks on cyber targets

    NASA Astrophysics Data System (ADS)

    Khalili, Aram; Michalk, Brian; Alford, Lee; Henney, Chris; Gilbert, Logan

    2010-04-01

    In most organizations, IT (information technology) infrastructure exists to support the organization's mission. The threat of cyber attacks poses risks to this mission. Current network security research focuses on the threat of cyber attacks to the organization's IT infrastructure; however, the risks to the overall mission are rarely analyzed or formalized. This connection of IT infrastructure to the organization's mission is often neglected or carried out ad-hoc. Our work bridges this gap and introduces analyses and formalisms to help organizations understand the mission risks they face from cyber attacks. Modeling an organization's mission vulnerability to cyber attacks requires a description of the IT infrastructure (network model), the organization mission (business model), and how the mission relies on IT resources (correlation model). With this information, proper analysis can show which cyber resources are of tactical importance in a cyber attack, i.e., controlling them enables a large range of cyber attacks. Such analysis also reveals which IT resources contribute most to the organization's mission, i.e., lack of control over them gravely affects the mission. These results can then be used to formulate IT security strategies and explore their trade-offs, which leads to better incident response. This paper presents our methodology for encoding IT infrastructure, organization mission and correlations, our analysis framework, as well as initial experimental results and conclusions.

  12. Attack vulnerability of complex networks

    NASA Astrophysics Data System (ADS)

    Holme, Petter; Kim, Beom Jun; Yoon, Chang No; Han, Seung Kee

    2002-05-01

    We study the response of complex networks subject to attacks on vertices and edges. Several existing complex network models as well as real-world networks of scientific collaborations and Internet traffic are numerically investigated, and the network performance is quantitatively measured by the average inverse geodesic length and the size of the largest connected subgraph. For each case of attacks on vertices and edges, four different attacking strategies are used: removals by the descending order of the degree and the betweenness centrality, calculated for either the initial network or the current network during the removal procedure. It is found that the removals by the recalculated degrees and betweenness centralities are often more harmful than the attack strategies based on the initial network, suggesting that the network structure changes as important vertices or edges are removed. Furthermore, the correlation between the betweenness centrality and the degree in complex networks is studied.

  13. Additive attacks on speaker recognition

    NASA Astrophysics Data System (ADS)

    Farrokh Baroughi, Alireza; Craver, Scott

    2014-02-01

    Speaker recognition is used to identify a speaker's voice from among a group of known speakers. A common method of speaker recognition is a classification based on cepstral coefficients of the speaker's voice, using a Gaussian mixture model (GMM) to model each speaker. In this paper we try to fool a speaker recognition system using additive noise such that an intruder is recognized as a target user. Our attack uses a mixture selected from a target user's GMM model, inverting the cepstral transformation to produce noise samples. In our 5 speaker data base, we achieve an attack success rate of 50% with a noise signal at 10dB SNR, and 95% by increasing noise power to 0dB SNR. The importance of this attack is its simplicity and flexibility: it can be employed in real time with no processing of an attacker's voice, and little computation is needed at the moment of detection, allowing the attack to be performed by a small portable device. For any target user, knowing that user's model or voice sample is sufficient to compute the attack signal, and it is enough that the intruder plays it while he/she is uttering to be classiffed as the victim.

  14. An effective Denial of Service Attack Detection Method in Wireless Mesh Networks

    NASA Astrophysics Data System (ADS)

    Luan, Liangyu; Fu, Yingfang; Xiao, Peng

    In order to detect the DoS attack (Denial-of-Service attack) when wireless mesh networks adopt AODV routing protocol of Ad Hoc networks. Such technologies as an end-to-end authentication, utilization rate of cache memory, two pre-assumed threshold value and distributed voting are used in this paper to detect DoS attacker, which is on the basic of hierarchical topology structure in wireless mesh networks. Through performance analysis in theory and simulations experiment, the scheme would improve the flexibility and accuracy of DoS attack detection, and would obviously improve its security in wireless mesh networks.

  15. Eyespots divert attacks by fish.

    PubMed

    Kjernsmo, Karin; Merilaita, Sami

    2013-09-01

    Eyespots (colour patterns consisting of concentric rings) are found in a wide range of animal taxa and are often assumed to have an anti-predator function. Previous experiments have found strong evidence for an intimidating effect of eyespots against passerine birds. Some eyespots have been suggested to increase prey survival by diverting attacks towards less vital body parts or a direction that would facilitate escape. While eyespots in aquatic environments are widespread, their function is extremely understudied. Therefore, we investigated the protective function of eyespots against attacking fish. We used artificial prey and predator-naive three-spined sticklebacks (Gasterosteus aculeatus) as predators to test both the diversion (deflection) and the intimidation hypothesis. Interestingly, our results showed that eyespots smaller than the fish' own eye very effectively draw the attacks of the fish towards them. Furthermore, our experiment also showed that this was not due to the conspicuousness of the eyespot, because attack latency did not differ between prey items with and without eyespots. We found little support for an intimidating effect by larger eyespots. Even though also other markings might misdirect attacks, we can conclude that the misdirecting function may have played an important role in the evolution of eyespots in aquatic environments. PMID:23864602

  16. Analytical Characterization of Internet Security Attacks

    ERIC Educational Resources Information Center

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  17. Capturing the uncertainty in adversary attack simulations.

    SciTech Connect

    Darby, John L.; Brooks, Traci N.; Berry, Robert Bruce

    2008-09-01

    This work provides a comprehensive uncertainty technique to evaluate uncertainty, resulting in a more realistic evaluation of PI, thereby requiring fewer resources to address scenarios and allowing resources to be used across more scenarios. For a given set of dversary resources, two types of uncertainty are associated with PI for a scenario: (1) aleatory (random) uncertainty for detection probabilities and time delays and (2) epistemic (state of knowledge) uncertainty for the adversary resources applied during an attack. Adversary esources consist of attributes (such as equipment and training) and knowledge about the security system; to date, most evaluations have assumed an adversary with very high resources, adding to the conservatism in the evaluation of PI. The aleatory uncertainty in PI is ddressed by assigning probability distributions to detection probabilities and time delays. A numerical sampling technique is used to evaluate PI, addressing the repeated variable dependence in the equation for PI.

  18. Polarised black holes in AdS

    NASA Astrophysics Data System (ADS)

    Costa, Miguel S.; Greenspan, Lauren; Oliveira, Miguel; Penedones, João; Santos, Jorge E.

    2016-06-01

    We consider solutions in Einstein-Maxwell theory with a negative cosmological constant that asymptote to global AdS 4 with conformal boundary {S}2× {{{R}}}t. At the sphere at infinity we turn on a space-dependent electrostatic potential, which does not destroy the asymptotic AdS behaviour. For simplicity we focus on the case of a dipolar electrostatic potential. We find two new geometries: (i) an AdS soliton that includes the full backreaction of the electric field on the AdS geometry; (ii) a polarised neutral black hole that is deformed by the electric field, accumulating opposite charges in each hemisphere. For both geometries we study boundary data such as the charge density and the stress tensor. For the black hole we also study the horizon charge density and area, and further verify a Smarr formula. Then we consider this system at finite temperature and compute the Gibbs free energy for both AdS soliton and black hole phases. The corresponding phase diagram generalizes the Hawking-Page phase transition. The AdS soliton dominates the low temperature phase and the black hole the high temperature phase, with a critical temperature that decreases as the external electric field increases. Finally, we consider the simple case of a free charged scalar field on {S}2× {{{R}}}t with conformal coupling. For a field in the SU(N ) adjoint representation we compare the phase diagram with the above gravitational system.

  19. Evaluation of Word Attack Skills.

    ERIC Educational Resources Information Center

    Follettie, Joseph F.

    A framework for more apt and sensitive evaluation of generalized word attack skill--the heart of oral reading skill--is presented. The paper envisions the design and development of oral reading instruction as bounded by a fully-specified evaluation scheme. (Author)

  20. Detection of complex cyber attacks

    NASA Astrophysics Data System (ADS)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  1. 57 Word Attack Skill Games.

    ERIC Educational Resources Information Center

    Mara, Patricia; Sorenson, Juanita

    These 57 game cards were developed to help teachers build their resource files for word-attack skills. Cards are keyed to skills suggested by the Wisconsin Design for Reading Skill Development and are color-coded according to their appropriateness for children in kindergarten through grade three. The front of each card gives the name of the skill,…

  2. Attack Vulnerability of Network Controllability.

    PubMed

    Lu, Zhe-Ming; Li, Xin-Feng

    2016-01-01

    Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison. It is found that the node-based strategies are often more harmful to the network controllability than the edge-based ones, and so are the recalculated strategies than their counterparts. The Barabási-Albert scale-free model, which has a highly biased structure, proves to be the most vulnerable of the tested model networks. In contrast, the Erdős-Rényi random model, which lacks structural bias, exhibits much better robustness to both node-based and edge-based attacks. We also survey the control robustness of 25 real-world networks, and the numerical results show that most real networks are control robust to random node failures, which has not been observed in the model networks. And the recalculated betweenness-based strategy is the most efficient way to harm the controllability of real-world networks. Besides, we find that the edge degree is not a good quantity to measure the importance of an edge in terms of network controllability. PMID:27588941

  3. Generic attack approaches for industrial control systems.

    SciTech Connect

    Duggan, David P.

    2006-01-01

    This report suggests a generic set of attack approaches that are expected to be used against Industrial Control Systems that have been built according to a specific reference model for control systems. The posed attack approaches are ordered by the most desirable, based upon the goal of an attacker. Each attack approach is then graded by the category of adversary that would be capable of utilizing that attack approach. The goal of this report is to identify necessary levels of security required to prevent certain types of attacks against Industrial Control Systems.

  4. Intermittent hypoendorphinaemia in migraine attack.

    PubMed

    Baldi, E; Salmon, S; Anselmi, B; Spillantini, M G; Cappelli, G; Brocchi, A; Sicuteri, F

    1982-06-01

    Beta-endorphin (RIA method, previous chromatographic extraction) was evaluated in plasma of migraine sufferers in free periods and during attacks. Decreased levels of the endogenous opioid peptide were found in plasma sampled during the attacks but not in free periods. Even chronic headache sufferers exhibited significantly lowered levels of beta-endorphin, when compared with control subjects with a negative personal and family history of head pains. The mechanism of the hypoendorphinaemia is unknown: lowered levels of the neuropeptide, which controls nociception, vegetative functions and hedonia, could be important in a syndrome such as migraine, characterized by pain, dysautonomia and anhedonia. The impairment of monoaminergic synapses ("empty neuron" condition) constantly present in sufferers from serious headaches, could be due to the fact that opioid neuropeptides, because of a receptoral or metabolic impairment, poorly modulate the respective monoaminergic neurons, resulting in imbalance of synaptic neurotransmission. PMID:6290072

  5. Diabetes - preventing heart attack and stroke

    MedlinePlus

    ... with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure ... and cholesterol levels are very important for preventing heart attacks and strokes. See your doctor who treats your ...

  6. After Heart Attack, New Threat: Heart Failure

    MedlinePlus

    ... of heart attack known as STEMI (ST elevation myocardial infarction). "Patients with ischemic heart disease are at the ... failure]. This includes those who have had a myocardial infarction, also called heart attack," Gho said. "Research studying ...

  7. Half of Heart Attacks Might Be 'Silent'

    MedlinePlus

    ... gov/medlineplus/news/fullstory_158855.html Half of Heart Attacks Might Be 'Silent' Without typical symptoms, many miss ... HealthDay News) -- As many as half of all heart attacks may be "silent" -- without the typical crushing chest ...

  8. Diabetes Ups Risk of Heart Attack Death

    MedlinePlus

    ... 159557.html Diabetes Ups Risk of Heart Attack Death Study points to need for better coordinated care, ... people with diabetes have a higher risk of death after a heart attack. "We knew that following ...

  9. Heart Attacks Striking Younger, Fatter Americans

    MedlinePlus

    ... nlm.nih.gov/medlineplus/news/fullstory_157946.html Heart Attacks Striking Younger, Fatter Americans: Study Doctors, patients need ... 24, 2016 THURSDAY, March 24, 2016 (HealthDay News) -- Heart attack victims in the United States are becoming younger ...

  10. Diabetes Ups Risk of Heart Attack Death

    MedlinePlus

    ... news/fullstory_159557.html Diabetes Ups Risk of Heart Attack Death Study points to need for better coordinated ... are much more likely to die after a heart attack than people without the blood sugar condition, a ...

  11. Being active after a heart attack (image)

    MedlinePlus

    ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ...

  12. Fat May Not Hike Heart Attack Risk

    MedlinePlus

    ... news/fullstory_160179.html Fat May Not Hike Heart Attack Risk: Study But it does raise diabetes risk, ... that obesity may not increase the risk of heart attack or premature death. Their study of identical twins ...

  13. Diabetes - preventing heart attack and stroke

    MedlinePlus

    ... medlineplus.gov/ency/patientinstructions/000080.htm Diabetes - preventing heart attack and stroke To use the sharing features on ... with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure ...

  14. Half of Heart Attacks Might Be 'Silent'

    MedlinePlus

    ... medlineplus.gov/news/fullstory_158855.html Half of Heart Attacks Might Be 'Silent' Without typical symptoms, many miss ... HealthDay News) -- As many as half of all heart attacks may be "silent" -- without the typical crushing chest ...

  15. On Mitigating Distributed Denial of Service Attacks

    ERIC Educational Resources Information Center

    Gao, Zhiqiang

    2006-01-01

    Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…

  16. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    ERIC Educational Resources Information Center

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  17. Smeared antibranes polarise in AdS

    NASA Astrophysics Data System (ADS)

    Gautason, Fridrik Freyr; Truijen, Brecht; Van Riet, Thomas

    2015-07-01

    In the recent literature it has been questioned whether the local backreaction of antibranes in flux throats can induce a perturbative brane-flux decay. Most evidence for this can be gathered for D6 branes and D p branes smeared over 6 - p compact directions, in line with the absence of finite temperature solutions for these cases. The solutions in the literature have flat worldvolume geometries and non-compact transversal spaces. In this paper we consider what happens when the worldvolume is AdS and the transversal space is compact. We show that in these circumstances brane polarisation smoothens out the flux singularity, which is an indication that brane-flux decay is prevented. This is consistent with the fact that the cosmological constant would be less negative after brane-flux decay. Our results extend recent results on AdS7 solutions from D6 branes to AdS p+1 solutions from D p branes. We show that supersymmetry of the AdS solutions depend on p non-trivially.

  18. AdS orbifolds and Penrose limits

    SciTech Connect

    Alishahiha, Mohsen; Sheikh-Jabbari, Mohammad M.; Tatar, Radu

    2002-12-09

    In this paper we study the Penrose limit of AdS{sub 5} orbifolds. The orbifold can be either in the pure spatial directions or space and time directions. For the AdS{sub 5}/{Lambda} x S{sup 5} spatial orbifold we observe that after the Penrose limit we obtain the same result as the Penrose limit of AdS{sub 5} x S{sup 5}/{Lambda}. We identify the corresponding BMN operators in terms of operators of the gauge theory on R x S{sup 3}/{Lambda}. The semi-classical description of rotating strings in these backgrounds have also been studied. For the spatial AdS orbifold we show that in the quadratic order the obtained action for the fluctuations is the same as that in S{sup 5} orbifold, however, the higher loop correction can distinguish between two cases.

  19. Lightweight Distance Bounding Protocol against Relay Attacks

    NASA Astrophysics Data System (ADS)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  20. Forebody tangential blowing for control at high angles of attack

    NASA Technical Reports Server (NTRS)

    Kroo, I.; Rock, S.; Roberts, L.

    1991-01-01

    A feasibility study to determine if the use of tangential leading edge blowing over the forebody could produce effective and practical control of the F-18 HARV aircraft at high angles of attack was conducted. A simplified model of the F-18 configuration using a vortex-lattice model was developed to obtain a better understanding of basic aerodynamic coupling effects and the influence of forebody circulation on lifting surface behavior. The effect of tangential blowing was estimated using existing wind tunnel data on normal forebody blowing and analytical studies of tangential blowing over conical forebodies. Incorporation of forebody blowing into the flight control system was investigated by adding this additional yaw control and sideforce generating actuator into the existing F-18 HARV simulation model. A control law was synthesized using LQG design methods that would schedule blowing rates as a function of vehicle sideslip, angle of attack, and roll and yaw rates.

  1. Migraine attacks the Basal Ganglia

    PubMed Central

    2011-01-01

    Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month). The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human) brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF) to a matched (gender, age, age of onset and type of medication) group of patients whose migraine episodes progressed (HF). Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine. PMID:21936901

  2. Shoulder injuries from attacking motion

    NASA Astrophysics Data System (ADS)

    Yanagi, Shigeru; Nishimura, Tetsu; Itoh, Masaru; Wada, Yuhei; Watanabe, Naoki

    1997-03-01

    Sports injuries have bothered professional players. Although many medical doctors try to treat injured players, to prevent sports injuries is more important. Hence, it is required to clear a kinematic mechanism of the sport injuries. A shoulder of volleyball attacker or baseball pitcher is often inured by playing motion. The injuries are mainly caused at the end of long head tendon, which is located in the upper side of scapula. Generally, a muscle and tendon have enough strength against tensile force, however, it seems that they are sometimes defeated by the lateral force. It is imagined that the effect of the lateral force has a possibility of injuring the tendon. If we find the influence of the lateral force on the injured portion, the mechanism of injuries must be cleared. In our research, volleyball attacking motion is taken by high speed video cameras. We analyze the motion as links system and obtain an acceleration of an arm and a shoulder from video image data. The generated force at a shoulder joint is calculated and resolved into the lateral and longitudinal forces. Our final goal is to discuss a possibility that the lateral force causes the injuries.

  3. Percolation of localized attack on complex networks

    NASA Astrophysics Data System (ADS)

    Shao, Shuai; Huang, Xuqing; Stanley, H. Eugene; Havlin, Shlomo

    2015-02-01

    The robustness of complex networks against node failure and malicious attack has been of interest for decades, while most of the research has focused on random attack or hub-targeted attack. In many real-world scenarios, however, attacks are neither random nor hub-targeted, but localized, where a group of neighboring nodes in a network are attacked and fail. In this paper we develop a percolation framework to analytically and numerically study the robustness of complex networks against such localized attack. In particular, we investigate this robustness in Erdős-Rényi networks, random-regular networks, and scale-free networks. Our results provide insight into how to better protect networks, enhance cybersecurity, and facilitate the design of more robust infrastructures.

  4. Impact of imperfect information on network attack

    NASA Astrophysics Data System (ADS)

    Melchionna, Andrew; Caloca, Jesus; Squires, Shane; Antonsen, Thomas M.; Ott, Edward; Girvan, Michelle

    2015-03-01

    This paper explores the effectiveness of network attack when the attacker has imperfect information about the network. For Erdős-Rényi networks, we observe that dynamical importance and betweenness centrality-based attacks are surprisingly robust to the presence of a moderate amount of imperfect information and are more effective compared with simpler degree-based attacks even at moderate levels of network information error. In contrast, for scale-free networks the effectiveness of attack is much less degraded by a moderate level of information error. Furthermore, in the Erdős-Rényi case the effectiveness of network attack is much more degraded by missing links as compared with the same number of false links.

  5. Impact of imperfect information on network attack.

    PubMed

    Melchionna, Andrew; Caloca, Jesus; Squires, Shane; Antonsen, Thomas M; Ott, Edward; Girvan, Michelle

    2015-03-01

    This paper explores the effectiveness of network attack when the attacker has imperfect information about the network. For Erdős-Rényi networks, we observe that dynamical importance and betweenness centrality-based attacks are surprisingly robust to the presence of a moderate amount of imperfect information and are more effective compared with simpler degree-based attacks even at moderate levels of network information error. In contrast, for scale-free networks the effectiveness of attack is much less degraded by a moderate level of information error. Furthermore, in the Erdős-Rényi case the effectiveness of network attack is much more degraded by missing links as compared with the same number of false links. PMID:25871157

  6. The AdS particle [rapid communication

    NASA Astrophysics Data System (ADS)

    Ghosh, Subir

    2005-09-01

    In this Letter we have considered a relativistic Nambu-Goto model for a particle in AdS metric. With appropriate gauge choice to fix the reparameterization invariance, we recover the previously discussed [S. Ghosh, P. Pal, Phys. Lett. B 618 (2005) 243, arxiv:hep-th/0502192] "exotic oscillator". The Snyder algebra and subsequently the κ-Minkowski spacetime are also derived. Lastly we comment on the impossibility of constructing a non-commutative spacetime in the context of open string where only a curved target space is introduced.

  7. Detecting Denial of Service Attacks in Tor

    NASA Astrophysics Data System (ADS)

    Danner, Norman; Krizanc, Danny; Liberatore, Marc

    Tor is currently one of the more popular systems for anonymizing near real-time communications on the Internet. Recently, Borisov et al. proposed a denial of service based attack on Tor (and related systems) that significantly increases the probability of compromising the anonymity provided. In this paper, we propose an algorithm for detecting such attacks and examine the effectiveness of the obvious approach to evading such detection. We implement a simplified version of the detection algorithm and study whether the attack may be in progress on the current Tor network. Our preliminary measurements indicate that the attack was probably not implemented during the period we observed the network.

  8. Probing crunching AdS cosmologies

    NASA Astrophysics Data System (ADS)

    Kumar, S. Prem; Vaganov, Vladislav

    2016-02-01

    Holographic gravity duals of deformations of CFTs formulated on de Sitter spacetime contain FRW geometries behind a horizon, with cosmological big crunch singularities. Using a specific analytically tractable solution within a particular single scalar truncation of {N}=8 supergravity on AdS4, we first probe such crunching cosmologies with spacelike radial geodesics that compute spatially antipodal correlators of large dimension boundary operators. At late times, the geodesics lie on the FRW slice of maximal expansion behind the horizon. The late time two-point functions factorise, and when transformed to the Einstein static universe, they exhibit a temporal non-analyticity determined by the maximal value of the scale factor ã max. Radial geodesics connecting antipodal points necessarily have de Sitter energy Ɛ ≲ ã max, while geodesics with Ɛ > ã max terminate at the crunch, the two categories of geodesics being separated by the maximal expansion slice. The spacelike crunch singularity is curved "outward" in the Penrose diagram for the deformed AdS backgrounds, and thus geodesic limits of the antipodal correlators do not directly probe the crunch. Beyond the geodesic limit, we point out that the scalar wave equation, analytically continued into the FRW patch, has a potential which is singular at the crunch along with complex WKB turning points in the vicinity of the FRW crunch. We then argue that the frequency space Green's function has a branch point determined by ã max which corresponds to the lowest quasinormal frequency.

  9. DMP: Detouring Using Multiple Paths against Jamming Attack for Ubiquitous Networking System

    PubMed Central

    Kim, Mihui; Chae, Kijoon

    2010-01-01

    To successfully realize the ubiquitous network environment including home automation or industrial control systems, it is important to be able to resist a jamming attack. This has recently been considered as an extremely threatening attack because it can collapse the entire network, despite the existence of basic security protocols such as encryption and authentication. In this paper, we present a method of jamming attack tolerant routing using multiple paths based on zones. The proposed scheme divides the network into zones, and manages the candidate forward nodes of neighbor zones. After detecting an attack, detour nodes decide zones for rerouting, and detour packets destined for victim nodes through forward nodes in the decided zones. Simulation results show that our scheme increases the PDR (Packet Delivery Ratio) and decreases the delay significantly in comparison with rerouting by a general routing protocol on sensor networks, AODV (Ad hoc On Demand Distance Vector), and a conventional JAM (Jammed Area Mapping) service with one reroute. PMID:22319316

  10. DMP: detouring using multiple paths against jamming attack for ubiquitous networking system.

    PubMed

    Kim, Mihui; Chae, Kijoon

    2010-01-01

    To successfully realize the ubiquitous network environment including home automation or industrial control systems, it is important to be able to resist a jamming attack. This has recently been considered as an extremely threatening attack because it can collapse the entire network, despite the existence of basic security protocols such as encryption and authentication. In this paper, we present a method of jamming attack tolerant routing using multiple paths based on zones. The proposed scheme divides the network into zones, and manages the candidate forward nodes of neighbor zones. After detecting an attack, detour nodes decide zones for rerouting, and detour packets destined for victim nodes through forward nodes in the decided zones. Simulation results show that our scheme increases the PDR (Packet Delivery Ratio) and decreases the delay significantly in comparison with rerouting by a general routing protocol on sensor networks, AODV (Ad hoc On Demand Distance Vector), and a conventional JAM (Jammed Area Mapping) service with one reroute. PMID:22319316

  11. Malicious attacks on media authentication schemes based on invertible watermarks

    NASA Astrophysics Data System (ADS)

    Katzenbeisser, Stefan; Dittmann, Jana

    2004-06-01

    The increasing availability and distribution of multimedia technology has made the manipulation of digital images, videos or audio files easy. While this enables numerous new applications, a certain loss of trust in digital media can be observed. In general, there is no guarantee that a digital image "does not lie", i.e., that the image content was not altered. To counteract this risk, fragile watermarks were proposed to protect the integrity of digital multimedia objects. In high security applications, it is necessary to be able to reconstruct the original object out of the watermarked version. This can be achieved by the use of invertible watermarks. While traditional watermarking schemes introduce some small non-invertible distortion in the digital content, invertible watermarks can be completely removed from a watermarked work. In the past, the security of proposed image authentication schemes based on invertible watermarks was only analyzed using ad-hoc methods and neglected the possibility of malicious attacks, which aim at engineering a fake mark so that the attacked object appears to be genuine. In this paper, we characterize and analyze possible malicious attacks against watermark-based image authentication systems and explore the theoretical limits of previous constructions with respect to their security.

  12. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    PubMed

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack. PMID:24755753

  13. The cost of attack in competing networks.

    PubMed

    Podobnik, B; Horvatic, D; Lipic, T; Perc, M; Buldú, J M; Stanley, H E

    2015-11-01

    Real-world attacks can be interpreted as the result of competitive interactions between networks, ranging from predator-prey networks to networks of countries under economic sanctions. Although the purpose of an attack is to damage a target network, it also curtails the ability of the attacker, which must choose the duration and magnitude of an attack to avoid negative impacts on its own functioning. Nevertheless, despite the large number of studies on interconnected networks, the consequences of initiating an attack have never been studied. Here, we address this issue by introducing a model of network competition where a resilient network is willing to partially weaken its own resilience in order to more severely damage a less resilient competitor. The attacking network can take over the competitor's nodes after their long inactivity. However, owing to a feedback mechanism the takeovers weaken the resilience of the attacking network. We define a conservation law that relates the feedback mechanism to the resilience dynamics for two competing networks. Within this formalism, we determine the cost and optimal duration of an attack, allowing a network to evaluate the risk of initiating hostilities. PMID:26490628

  14. Preventive attack in the 1990s

    SciTech Connect

    Prebeck, S.R.

    1993-05-28

    The decline of the Soviet Union upset the world`s balance of power and opened the door to third world proliferation since the superpowers no longer have tight control over their client-states. This increase in proliferation raised the issue of how the United States (US) should respond to a third world nation that is acquiring nuclear weapons. Should the United States depend on preventive attacks to stop the proliferation of nuclear weapons. This is not a new issue. Proliferation and preventive war have both been issues since the end of World War II. The United States considered a preventive attack against the Soviet Union in the postwar years. The Soviet Union considered preventive attacks against the People`s Republic of China in 1969. Israel conducted a preventive attack in 1981 against the Osiraq nuclear reactor in Iraq. Preventive attacks are politically untenable and are not militarily possible. Without perfect political conditions, it is unacceptable for the only remaining superpower to attack a second-rate power. It is militarily impossible for the United States to guarantee the removal of all nuclear weapons in a single preventive attack. This study concludes that the United States should not depend on preventive attacks to stop proliferation of nuclear weapons.

  15. 47 CFR 76.1612 - Personal attack.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Personal attack. 76.1612 Section 76.1612 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE Notices § 76.1612 Personal attack. (a) When, during origination cablecasting...

  16. AdS3: the NHEK generation

    NASA Astrophysics Data System (ADS)

    Bena, Iosif; Heurtier, Lucien; Puhm, Andrea

    2016-05-01

    It was argued in [1] that the five-dimensional near-horizon extremal Kerr (NHEK) geometry can be embedded in String Theory as the infrared region of an infinite family of non-supersymmetric geometries that have D1, D5, momentum and KK monopole charges. We show that there exists a method to embed these geometries into asymptotically- {AdS}_3× {S}^3/{{Z}}_N solutions, and hence to obtain infinite families of flows whose infrared is NHEK. This indicates that the CFT dual to the NHEK geometry is the IR fixed point of a Renormalization Group flow from a known local UV CFT and opens the door to its explicit construction.

  17. Combating Memory Corruption Attacks On Scada Devices

    NASA Astrophysics Data System (ADS)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  18. Shadows, currents, and AdS fields

    SciTech Connect

    Metsaev, R. R.

    2008-11-15

    Conformal totally symmetric arbitrary spin currents and shadow fields in flat space-time of dimension greater than or equal to four are studied. A gauge invariant formulation for such currents and shadow fields is developed. Gauge symmetries are realized by involving the Stueckelberg fields. A realization of global conformal boost symmetries is obtained. Gauge invariant differential constraints for currents and shadow fields are obtained. AdS/CFT correspondence for currents and shadow fields and the respective normalizable and non-normalizable solutions of massless totally symmetric arbitrary spin AdS fields are studied. The bulk fields are considered in a modified de Donder gauge that leads to decoupled equations of motion. We demonstrate that leftover on shell gauge symmetries of bulk fields correspond to gauge symmetries of boundary currents and shadow fields, while the modified de Donder gauge conditions for bulk fields correspond to differential constraints for boundary conformal currents and shadow fields. Breaking conformal symmetries, we find interrelations between the gauge invariant formulation of the currents and shadow fields, and the gauge invariant formulation of massive fields.

  19. Symptoms of transient ischemic attack.

    PubMed

    Kim, Jong S

    2014-01-01

    Transient ischemic attack (TIA) is a cerebrovascular disease with temporary (<24 h) neurological symptoms. The symptoms of TIA patients are largely similar to those of ischemic stroke patients and include unilateral limb weakness, speech disturbances, sensory symptoms, visual disturbances, and gait difficulties. As these symptoms are transient, they are frequently evaluated based on patients' subjective reports, which are less precise than those of patients with stroke whose longer-lasting symptoms and signs can be reliably assessed by physicians. Some symptoms, such as monocular blindness, are much more common in TIA than in stroke, and limb shaking occurs almost exclusively in TIA patients. On the other hand, symptoms like hemivisual field defects or limb ataxia are underappreciated in TIA patients. These transient neurological symptoms are not necessarily caused by cerebrovascular diseases, but can be produced by a variety of non-vascular diseases. Careful history taking, examination, and appropriate imaging tests are needed to differentiate these TIA mimics from TIA. Each TIA symptom has a different specificity and sensitivity, and there has been an effort to assess the outcome of the patients through the use of specific clinical features. On top of this, recent developments in imaging techniques have greatly enhanced our ability to predict the outcomes of TIA patients. Perception or recognition of TIA symptoms may differ according to the race, sex, education, and specialty of physicians. Appropriate education of both the general population and physicians with regard to TIA symptoms is important as TIAs need emergent evaluation and treatment. PMID:24157558

  20. A Latex Metabolite Benefits Plant Fitness under Root Herbivore Attack.

    PubMed

    Huber, Meret; Epping, Janina; Schulze Gronover, Christian; Fricke, Julia; Aziz, Zohra; Brillatz, Théo; Swyers, Michael; Köllner, Tobias G; Vogel, Heiko; Hammerbacher, Almuth; Triebwasser-Freese, Daniella; Robert, Christelle A M; Verhoeven, Koen; Preite, Veronica; Gershenzon, Jonathan; Erb, Matthias

    2016-01-01

    Plants produce large amounts of secondary metabolites in their shoots and roots and store them in specialized secretory structures. Although secondary metabolites and their secretory structures are commonly assumed to have a defensive function, evidence that they benefit plant fitness under herbivore attack is scarce, especially below ground. Here, we tested whether latex secondary metabolites produced by the common dandelion (Taraxacum officinale agg.) decrease the performance of its major native insect root herbivore, the larvae of the common cockchafer (Melolontha melolontha), and benefit plant vegetative and reproductive fitness under M. melolontha attack. Across 17 T. officinale genotypes screened by gas and liquid chromatography, latex concentrations of the sesquiterpene lactone taraxinic acid β-D-glucopyranosyl ester (TA-G) were negatively associated with M. melolontha larval growth. Adding purified TA-G to artificial diet at ecologically relevant concentrations reduced larval feeding. Silencing the germacrene A synthase ToGAS1, an enzyme that was identified to catalyze the first committed step of TA-G biosynthesis, resulted in a 90% reduction of TA-G levels and a pronounced increase in M. melolontha feeding. Transgenic, TA-G-deficient lines were preferred by M. melolontha and suffered three times more root biomass reduction than control lines. In a common garden experiment involving over 2,000 T. officinale individuals belonging to 17 different genotypes, high TA-G concentrations were associated with the maintenance of high vegetative and reproductive fitness under M. melolontha attack. Taken together, our study demonstrates that a latex secondary metabolite benefits plants under herbivore attack, a result that provides a mechanistic framework for root herbivore driven natural selection and evolution of plant defenses below ground. PMID:26731567

  1. A Latex Metabolite Benefits Plant Fitness under Root Herbivore Attack

    PubMed Central

    Huber, Meret; Epping, Janina; Schulze Gronover, Christian; Fricke, Julia; Aziz, Zohra; Brillatz, Théo; Swyers, Michael; Köllner, Tobias G.; Vogel, Heiko; Hammerbacher, Almuth; Triebwasser-Freese, Daniella; Robert, Christelle A. M.; Verhoeven, Koen; Preite, Veronica; Gershenzon, Jonathan; Erb, Matthias

    2016-01-01

    Plants produce large amounts of secondary metabolites in their shoots and roots and store them in specialized secretory structures. Although secondary metabolites and their secretory structures are commonly assumed to have a defensive function, evidence that they benefit plant fitness under herbivore attack is scarce, especially below ground. Here, we tested whether latex secondary metabolites produced by the common dandelion (Taraxacum officinale agg.) decrease the performance of its major native insect root herbivore, the larvae of the common cockchafer (Melolontha melolontha), and benefit plant vegetative and reproductive fitness under M. melolontha attack. Across 17 T. officinale genotypes screened by gas and liquid chromatography, latex concentrations of the sesquiterpene lactone taraxinic acid β-D-glucopyranosyl ester (TA-G) were negatively associated with M. melolontha larval growth. Adding purified TA-G to artificial diet at ecologically relevant concentrations reduced larval feeding. Silencing the germacrene A synthase ToGAS1, an enzyme that was identified to catalyze the first committed step of TA-G biosynthesis, resulted in a 90% reduction of TA-G levels and a pronounced increase in M. melolontha feeding. Transgenic, TA-G-deficient lines were preferred by M. melolontha and suffered three times more root biomass reduction than control lines. In a common garden experiment involving over 2,000 T. officinale individuals belonging to 17 different genotypes, high TA-G concentrations were associated with the maintenance of high vegetative and reproductive fitness under M. melolontha attack. Taken together, our study demonstrates that a latex secondary metabolite benefits plants under herbivore attack, a result that provides a mechanistic framework for root herbivore driven natural selection and evolution of plant defenses below ground. PMID:26731567

  2. Terrorist Attacks Escalate in Frequency and Fatalities Preceding Highly Lethal Attacks

    PubMed Central

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G.; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates–both in the number of people killed per attack and in the frequency of attacks–leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack. PMID:24755753

  3. Hill-Climbing Attacks and Robust Online Signature Verification Algorithm against Hill-Climbing Attacks

    NASA Astrophysics Data System (ADS)

    Muramatsu, Daigo

    Attacks using hill-climbing methods have been reported as a vulnerability of biometric authentication systems. In this paper, we propose a robust online signature verification algorithm against such attacks. Specifically, the attack considered in this paper is a hill-climbing forged data attack. Artificial forgeries are generated offline by using the hill-climbing method, and the forgeries are input to a target system to be attacked. In this paper, we analyze the menace of hill-climbing forged data attacks using six types of hill-climbing forged data and propose a robust algorithm by incorporating the hill-climbing method into an online signature verification algorithm. Experiments to evaluate the proposed system were performed using a public online signature database. The proposed algorithm showed improved performance against this kind of attack.

  4. Adaptive cyber-attack modeling system

    NASA Astrophysics Data System (ADS)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  5. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    SciTech Connect

    Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

    2011-10-01

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

  6. Effect of migraine attacks on paracetamol absorption.

    PubMed Central

    Tokola, R A; Neuvonen, P J

    1984-01-01

    The absorption of effervescent paracetamol (1000 mg) was investigated in nine female patients during a migraine attack and in the same patients when headache free. Migraine attack decreased (P less than 0.05) the areas under the serum paracetamol concentration-time curves (AUC) of 0-2 h, 0-4 h and 0-6 h and the peak serum concentration. The severity of nausea correlated significantly with the decrease in the AUC values. Our results support findings of delayed gastric emptying in migraine attacks. Both a delay and an impairment of drug absorption may follow. PMID:6529526

  7. On the Routing Protocol Influence on the Resilience of Wireless Sensor Networks to Jamming Attacks

    PubMed Central

    Del-Valle-Soto, Carolina; Mex-Perera, Carlos; Monroy, Raul; Nolazco-Flores, Juan Arturo

    2015-01-01

    In this work, we compare a recently proposed routing protocol, the multi-parent hierarchical (MPH) protocol, with two well-known protocols, the ad hoc on-demand distance vector (AODV) and dynamic source routing (DSR). For this purpose, we have developed a simulator, which faithfully reifies the workings of a given protocol, considering a fixed, reconfigurable ad hoc network given by the number and location of participants, and general network conditions. We consider a scenario that can be found in a large number of wireless sensor network applications, a single sink node that collects all of the information generated by the sensors. The metrics used to compare the protocols were the number of packet retransmissions, carrier sense multiple access (CSMA) inner loop retries, the number of nodes answering the queries from the coordinator (sink) node and the energy consumption. We tested the network under ordinary (without attacks) conditions (and combinations thereof) and when it is subject to different types of jamming attacks (in particular, random and reactive jamming attacks), considering several positions for the jammer. Our results report that MPH has a greater ability to tolerate such attacks than DSR and AODV, since it minimizes and encapsulates the network segment under attack. The self-configuring capabilities of MPH derived from a combination of a proactive routes update, on a periodic-time basis, and a reactive behavior provide higher resilience while offering a better performance (overhead and energy consumption) than AODV and DSR, as shown in our simulation results. PMID:25825979

  8. ADS pilot program Plan

    NASA Technical Reports Server (NTRS)

    Clauson, J.; Heuser, J.

    1981-01-01

    The Applications Data Service (ADS) is a system based on an electronic data communications network which will permit scientists to share the data stored in data bases at universities and at government and private installations. It is designed to allow users to readily locate and access high quality, timely data from multiple sources. The ADS Pilot program objectives and the current plans for accomplishing those objectives are described.

  9. Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version.

    PubMed

    Babu, M Rajesh; Dian, S Moses; Chelladurai, Siva; Palaniappan, Mathiyalagan

    2015-01-01

    The world is moving towards a new realm of computing such as Internet of Things. The Internet of Things, however, envisions connecting almost all objects within the world to the Internet by recognizing them as smart objects. In doing so, the existing networks which include wired, wireless, and ad hoc networks should be utilized. Moreover, apart from other networks, the ad hoc network is full of security challenges. For instance, the MANET (mobile ad hoc network) is susceptible to various attacks in which the black hole attacks and its versions do serious damage to the entire MANET infrastructure. The severity of this attack increases, when the compromised MANET nodes work in cooperation with each other to make a cooperative black hole attack. Therefore this paper proposes an alleviation procedure which consists of timely mandate procedure, hole detection algorithm, and sensitive guard procedure to detect the maliciously behaving nodes. It has been observed that the proposed procedure is cost-effective and ensures QoS guarantee by assuring resource availability thus making the MANET appropriate for Internet of Things. PMID:26495430

  10. Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version

    PubMed Central

    Babu, M. Rajesh; Dian, S. Moses; Chelladurai, Siva; Palaniappan, Mathiyalagan

    2015-01-01

    The world is moving towards a new realm of computing such as Internet of Things. The Internet of Things, however, envisions connecting almost all objects within the world to the Internet by recognizing them as smart objects. In doing so, the existing networks which include wired, wireless, and ad hoc networks should be utilized. Moreover, apart from other networks, the ad hoc network is full of security challenges. For instance, the MANET (mobile ad hoc network) is susceptible to various attacks in which the black hole attacks and its versions do serious damage to the entire MANET infrastructure. The severity of this attack increases, when the compromised MANET nodes work in cooperation with each other to make a cooperative black hole attack. Therefore this paper proposes an alleviation procedure which consists of timely mandate procedure, hole detection algorithm, and sensitive guard procedure to detect the maliciously behaving nodes. It has been observed that the proposed procedure is cost-effective and ensures QoS guarantee by assuring resource availability thus making the MANET appropriate for Internet of Things. PMID:26495430

  11. Identifying and Analyzing Web Server Attacks

    SciTech Connect

    Seifert, Christian; Endicott-Popovsky, Barbara E.; Frincke, Deborah A.; Komisarczuk, Peter; Muschevici, Radu; Welch, Ian D.

    2008-08-29

    Abstract: Client honeypots can be used to identify malicious web servers that attack web browsers and push malware to client machines. Merely recording network traffic is insufficient to perform comprehensive forensic analyses of such attacks. Custom tools are required to access and analyze network protocol data. Moreover, specialized methods are required to perform a behavioral analysis of an attack, which helps determine exactly what transpired on the attacked system. This paper proposes a record/replay mechanism that enables forensic investigators to extract application data from recorded network streams and allows applications to interact with this data in order to conduct behavioral analyses. Implementations for the HTTP and DNS protocols are presented and their utility in network forensic investigations is demonstrated.

  12. Recovery of infrastructure networks after localised attacks.

    PubMed

    Hu, Fuyu; Yeung, Chi Ho; Yang, Saini; Wang, Weiping; Zeng, An

    2016-01-01

    The stability of infrastructure network is always a critical issue studied by researchers in different fields. A lot of works have been devoted to reveal the robustness of the infrastructure networks against random and malicious attacks. However, real attack scenarios such as earthquakes and typhoons are instead localised attacks which are investigated only recently. Unlike previous studies, we examine in this paper the resilience of infrastructure networks by focusing on the recovery process from localised attacks. We introduce various preferential repair strategies and found that they facilitate and improve network recovery compared to that of random repairs, especially when population size is uneven at different locations. Moreover, our strategic repair methods show similar effectiveness as the greedy repair. The validations are conducted on simulated networks, and on real networks with real disasters. Our method is meaningful in practice as it can largely enhance network resilience and contribute to network risk reduction. PMID:27075559

  13. Women's Heart Disease: Heart Attack Symptoms

    MedlinePlus

    ... this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter 2014 Table ... NHLBI has uncovered some of the causes of heart diseases and conditions, as well as ways to prevent ...

  14. On localization attacks against cloud infrastructure

    NASA Astrophysics Data System (ADS)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  15. Heart attack - what to ask your doctor

    MedlinePlus

    A heart attack occurs when blood flow to a part of your heart is blocked for a period of time ... muscle is damaged. It is also called a myocardial infarction (MI). Angina is pain or pressure in the ...

  16. Dengue Virus May Bolster Zika's Attack

    MedlinePlus

    ... news/fullstory_159534.html Dengue Virus May Bolster Zika's Attack Prior exposure to this other mosquito-borne ... dengue fever virus may increase the severity of Zika virus, a new study says. Early stage laboratory ...

  17. Heart attack - what to ask your doctor

    MedlinePlus

    ... muscle is damaged. It is also called a myocardial infarction (MI). Watch this video about: Coronary artery disease ... help you take care of yourself after a heart attack. Questions What are the signs and symptoms that ...

  18. Recovery of infrastructure networks after localised attacks

    PubMed Central

    Hu, Fuyu; Yeung, Chi Ho; Yang, Saini; Wang, Weiping; Zeng, An

    2016-01-01

    The stability of infrastructure network is always a critical issue studied by researchers in different fields. A lot of works have been devoted to reveal the robustness of the infrastructure networks against random and malicious attacks. However, real attack scenarios such as earthquakes and typhoons are instead localised attacks which are investigated only recently. Unlike previous studies, we examine in this paper the resilience of infrastructure networks by focusing on the recovery process from localised attacks. We introduce various preferential repair strategies and found that they facilitate and improve network recovery compared to that of random repairs, especially when population size is uneven at different locations. Moreover, our strategic repair methods show similar effectiveness as the greedy repair. The validations are conducted on simulated networks, and on real networks with real disasters. Our method is meaningful in practice as it can largely enhance network resilience and contribute to network risk reduction. PMID:27075559

  19. Recovery of infrastructure networks after localised attacks

    NASA Astrophysics Data System (ADS)

    Hu, Fuyu; Yeung, Chi Ho; Yang, Saini; Wang, Weiping; Zeng, An

    2016-04-01

    The stability of infrastructure network is always a critical issue studied by researchers in different fields. A lot of works have been devoted to reveal the robustness of the infrastructure networks against random and malicious attacks. However, real attack scenarios such as earthquakes and typhoons are instead localised attacks which are investigated only recently. Unlike previous studies, we examine in this paper the resilience of infrastructure networks by focusing on the recovery process from localised attacks. We introduce various preferential repair strategies and found that they facilitate and improve network recovery compared to that of random repairs, especially when population size is uneven at different locations. Moreover, our strategic repair methods show similar effectiveness as the greedy repair. The validations are conducted on simulated networks, and on real networks with real disasters. Our method is meaningful in practice as it can largely enhance network resilience and contribute to network risk reduction.

  20. Cyber Security Audit and Attack Detection Toolkit

    SciTech Connect

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  1. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    NASA Astrophysics Data System (ADS)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  2. Spread spectrum watermarking: malicious attacks and counterattacks

    NASA Astrophysics Data System (ADS)

    Hartung, Frank H.; Su, Jonathan K.; Girod, Bernd

    1999-04-01

    Most watermarking methods for images and video have been proposed are based on ideas from spread spectrum radio communications, namely additive embedding of a (signal adaptive or non-adaptive) pseudo-noise watermark pattern, and watermark recovery by correlation. Even methods that are not presented as spread spectrum methods often build on these principles. Recently, some skepticism about the robustness of spread spectrum watermarks has arisen, specifically with the general availability of watermark attack software which claim to render most watermarks undetectable. In fact, spread spectrum watermarks and watermark detectors in their simplest form are vulnerable to a variety of attacks. However, with appropriate modifications to the embedding and extraction methods, spread spectrum methods can be made much more resistant against such attacks. In this paper, we review proposed attacks on spread spectrum watermarks are systematically. Further, modifications for watermark embedding and extraction are presented to avoid and counterattack these attacks. Important ingredients are, for example, to adapt the power spectrum of the watermark to the host signal power spectrum, and to employ an intelligent watermark detector with a block-wise multi-dimensional sliding correlator, which can recover the watermark even in the presence of geometric attacks.

  3. Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack

    NASA Astrophysics Data System (ADS)

    Huang, Jing-Zheng; Weedbrook, Christian; Yin, Zhen-Qiang; Wang, Shuang; Li, Hong-Wei; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2013-06-01

    The security proofs of continuous-variable quantum key distribution are based on the assumptions that the eavesdropper can neither act on the local oscillator nor control Bob's beam splitter. These assumptions may be invalid in practice due to potential imperfections in the implementations of such protocols. In this paper, we consider the problem of transmitting the local oscillator in a public channel and propose a wavelength attack which allows the eavesdropper to control the intensity transmission of Bob's beam splitter by switching the wavelength of the input light. Specifically we target continuous-variable quantum key distribution systems that use the heterodyne detection protocol using either direct or reverse reconciliation. Our attack is proved to be feasible and renders all of the final keys shared between the legitimate parties insecure, even if they have monitored the intensity of the local oscillator. To prevent our attack on commercial systems, a simple wavelength filter should be randomly added before performing monitoring detection.

  4. Individual triptan selection in migraine attack therapy.

    PubMed

    Belvís, Robert; Pagonabarraga, Javier; Kulisevsky, Jaime

    2009-01-01

    About 6% of men and 18% of women suffer migraine attacks. Migraine can induce a great impact in the quality of life of the patient and the costs of medical care and lost productivity can be also high. There are two therapeutic approaches in the treatment of migraine: preventive therapy and acute treatment of migraine attack. Immediate treatment with selective serotonin [5-HT1B/1T] receptor agonists (so-called triptans) is the first-line option in the acute treatment of moderate-severe migraine attacks. The introduction in early nineties of triptans was a revolution in migraine therapy and evidences about their efficacy are at present irrefutable. At the moment, there are seven marketed molecules: sumatriptan, rizatriptan, zolmitriptan, eletriptan, naratriptan, almotriptan and frovatriptan. Obviously, every molecule has different pharmacokinetic and pharmacodinamic properties and, moreover, some triptans have several formulations: tablets, dissolvable tablets, nasal and injections. The prescription of one of these seven triptans for a specified patient is based in the drug profile: efficacy, safety, pharmacokinetics and pharmacodynamics. Despite there are a lot of published studies using triptans, no clinical trial has analyzed all the molecules at the same time. Other data to take account in the final prescription are clinical characteristics of the migraine attack and patient characteristics: labour aspects, style of life and the patient medical history. We present a state-of-the-art of the triptan selection in treatment of moderate-severe migraine attacks. PMID:19149716

  5. Innovations Without Added Costs

    ERIC Educational Resources Information Center

    Cereghino, Edward

    1974-01-01

    There is no question that we are in a tight money market, and schools are among the first institutions to feel the squeeze. Therefore, when a plan is offered that provides for innovations without added costs, its something worth noting. (Editor)

  6. What Value "Value Added"?

    ERIC Educational Resources Information Center

    Richards, Andrew

    2015-01-01

    Two quantitative measures of school performance are currently used, the average points score (APS) at Key Stage 2 and value-added (VA), which measures the rate of academic improvement between Key Stage 1 and 2. These figures are used by parents and the Office for Standards in Education to make judgements and comparisons. However, simple…

  7. Coronary Artery Dissection: Not Just a Heart Attack

    MedlinePlus

    ... Stroke More Coronary Artery Dissection: Not Just a Heart Attack Updated:May 24,2016 Sometimes a heart attack ... Disease Go Red For Women Types of aneurysms Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) • ...

  8. A Game Theoretic Approach to Cyber Attack Prediction

    SciTech Connect

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  9. Brain imaging in transient ischemic attack--redefining TIA.

    PubMed

    Pavlovic, Aleksandra M; Barras, Christen D; Hand, Peter J; Tress, Brian M; Desmond, Patricia M; Davis, Stephen M

    2010-09-01

    Transient ischemic attack (TIA) has recently been redefined to incorporate the latest clinical and neuroimaging information that has shed new light on TIA pathophysiology. Patients suffering from TIA are at a substantial risk of subsequent stroke, but quantifying this risk is difficult as TIA patients are a heterogeneous population and there are multiple TIA mimics. Clinical scores for prediction of stroke risk are principally based on patient history and potentially understate actual risk. Magnetic resonance imaging (MRI), in particular diffusion-weighted imaging (DWI) performed in the first days following TIA, reveals relevant focal ischemic abnormalities in 21-68% of patients. These lesions predict stroke recurrence, functional dependence and subsequent vascular events. Adding imaging information to clinical scores improves prediction of stroke risk following TIA. Alongside clinical judgement, use of MRI has the potential to change the management of TIA patients and is the imaging modality of choice for this condition. PMID:20605469

  10. Introducing ADS Labs

    NASA Astrophysics Data System (ADS)

    Accomazzi, Alberto; Henneken, E.; Grant, C. S.; Kurtz, M. J.; Di Milia, G.; Luker, J.; Thompson, D. M.; Bohlen, E.; Murray, S. S.

    2011-05-01

    ADS Labs is a platform that ADS is introducing in order to test and receive feedback from the community on new technologies and prototype services. Currently, ADS Labs features a new interface for abstract searches, faceted filtering of results, visualization of co-authorship networks, article-level recommendations, and a full-text search service. The streamlined abstract search interface provides a simple, one-box search with options for ranking results based on a paper relevancy, freshness, number of citations, and downloads. In addition, it provides advanced rankings based on collaborative filtering techniques. The faceted filtering interface allows users to narrow search results based on a particular property or set of properties ("facets"), allowing users to manage large lists and explore the relationship between them. For any set or sub-set of records, the co-authorship network can be visualized in an interactive way, offering a view of the distribution of contributors and their inter-relationships. This provides an immediate way to detect groups and collaborations involved in a particular research field. For a majority of papers in Astronomy, our new interface will provide a list of related articles of potential interest. The recommendations are based on a number of factors, including text similarity, citations, and co-readership information. The new full-text search interface allows users to find all instances of particular words or phrases in the body of the articles in our full-text archive. This includes all of the scanned literature in ADS as well as a select portion of the current astronomical literature, including ApJ, ApJS, AJ, MNRAS, PASP, A&A, and soon additional content from Springer journals. Fulltext search results include a list of the matching papers as well as a list of "snippets" of text highlighting the context in which the search terms were found. ADS Labs is available at http://adslabs.org

  11. Attacks on public telephone networks: technologies and challenges

    NASA Astrophysics Data System (ADS)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  12. Characterization of attacks on public telephone networks

    NASA Astrophysics Data System (ADS)

    Lorenz, Gary V.; Manes, Gavin W.; Hale, John C.; Marks, Donald; Davis, Kenneth; Shenoi, Sujeet

    2001-02-01

    The U.S. Public Telephone Network (PTN) is a massively connected distributed information systems, much like the Internet. PTN signaling, transmission and operations functions must be protected from physical and cyber attacks to ensure the reliable delivery of telecommunications services. The increasing convergence of PTNs with wireless communications systems, computer networks and the Internet itself poses serious threats to our nation's telecommunications infrastructure. Legacy technologies and advanced services encumber well-known and as of yet undiscovered vulnerabilities that render them susceptible to cyber attacks. This paper presents a taxonomy of cyber attacks on PTNs in converged environments that synthesizes exploits in computer and communications network domains. The taxonomy provides an opportunity for the systematic exploration of mitigative and preventive strategies, as well as for the identification and classification of emerging threats.

  13. Responding to chemical attack. Final report

    SciTech Connect

    Bagley, R.W.

    1991-02-11

    In view of Iraq's stated intention of using chemical weapons in the Persian Gulf War, the Coalition forces must be prepared to respond. Iraq is capable of conducting such an attack. While the use of chemical weapons may not be militarily significant, the political effect of the use and the response to it may be very significant. Responses including the use of chemical and nuclear weapons are assessed in terms of their legality, political cost, and military effectiveness and found unacceptable. Reliance on diplomatic protests and on post-war criminal sanctions are judged ineffective. A response in the form of increased conventional attack on the Iraqi chemical infrastructure is recommended because that response will preserve the present Coalition, effectively counter the chemical attack, contribute to regional stability, and enhance the reputation of the United States for lawfulness and dependability.

  14. Robustness of interdependent networks under targeted attack

    NASA Astrophysics Data System (ADS)

    Huang, Xuqing; Gao, Jianxi; Buldyrev, Sergey V.; Havlin, Shlomo; Stanley, H. Eugene

    2011-06-01

    When an initial failure of nodes occurs in interdependent networks, a cascade of failure between the networks occurs. Earlier studies focused on random initial failures. Here we study the robustness of interdependent networks under targeted attack on high or low degree nodes. We introduce a general technique which maps the targeted-attack problem in interdependent networks to the random-attack problem in a transformed pair of interdependent networks. We find that when the highly connected nodes are protected and have lower probability to fail, in contrast to single scale-free (SF) networks where the percolation threshold pc=0, coupled SF networks are significantly more vulnerable with pc significantly larger than zero. The result implies that interdependent networks are difficult to defend by strategies such as protecting the high degree nodes that have been found useful to significantly improve robustness of single networks.

  15. Robustness of interdependent networks under targeted attack

    NASA Astrophysics Data System (ADS)

    Huang, Xuqing; Gao, Jianxi; Buldyrev, Sergey; Havlin, Shlomo; Stanley, H. Eugene

    2012-02-01

    When an initial failure of nodes occurs in interdependent networks, a cascade of failure between the networks occurs. Earlier studies focused on random initial failures. Here we study the robustness of interdependent networks under targeted attack on high or low degree nodes. We introduce a general technique which maps the targeted-attack problem in interdependent networks to the random-attack problem in a transformed pair of interdependent networks. We find that when the highly connected nodes are protected and have lower probability to fail, in contrast to single scale-free (SF) networks where the percolation threshold pc=0, coupled SF networks are significantly more vulnerable with pc significantly larger than zero. The result implies that interdependent networks are difficult to defend by strategies such as protecting the high degree nodes that have been found useful to significantly improve robustness of single networks.

  16. Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    SciTech Connect

    Chatterjee, Samrat; Halappanavar, Mahantesh; Tipireddy, Ramakrishna; Oster, Matthew R.; Saha, Sudip

    2015-04-15

    Representation and propagation of uncertainty in cyber attacker payoffs is a key aspect of security games. Past research has primarily focused on representing the defender’s beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and intervals. Within cyber-settings, continuous probability distributions may still be appropriate for addressing statistical (aleatory) uncertainties where the defender may assume that the attacker’s payoffs differ over time. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attacker’s payoff generation mechanism. Such epistemic uncertainties are more suitably represented as probability boxes with intervals. In this study, we explore the mathematical treatment of such mixed payoff uncertainties.

  17. Counteracting Power Analysis Attacks by Masking

    NASA Astrophysics Data System (ADS)

    Oswald, Elisabeth; Mangard, Stefan

    The publication of power analysis attacks [12] has triggered a lot of research activities. On the one hand these activities have been dedicated toward the development of secure and efficient countermeasures. On the other hand also new and improved attacks have been developed. In fact, there has been a continuous arms race between designers of countermeasures and attackers. This chapter provides a brief overview of the state-of-the art in the arms race in the context of a countermeasure called masking. Masking is a popular countermeasure that has been extensively discussed in the scientific community. Numerous articles have been published that explain different types of masking and that analyze weaknesses of this countermeasure.

  18. Attack optimization for unequal moderate forces

    SciTech Connect

    Canavan, G.H.

    1997-06-01

    Attack allocation optimizations produce stability indices for unsymmetrical forces that indicate significant regions of both stability and instability and that have their minimum values roughly when the two sides have equal forces. This note derives combined stability indices for unsymmetrical offensive force configurations. The indices are based on optimal allocations of offensive missiles between vulnerable missiles and value based on the minimization of first strike cost, which is done analytically. Exchanges are modeled probabalistically and their results are converted into first and second strike costs through approximations to the damage to the value target sets held at risk. The stability index is the product of the ratio of first to second strike costs seen by the two sides. Optimal allocations scale directly on the opponent`s vulnerable missiles, inversely on one`s own total weapons, and only logarithmically on the attacker`s damage preference, kill probability, and relative target set. The defender`s allocation scales in a similar manner on the attacker`s parameters. First and second strike magnitudes increase roughly linearly for the side with greater forces and decrease linearly for the side with fewer. Conversely, the first and second strike magnitudes decrease for the side with greater forces and increase for the side with fewer. These trends are derived and discussed analytically. The resulting stability indices exhibit a minimum where the two sides have roughly equal forces. If one side has much larger forces than the other, his costs drop to levels low enough that he is relatively insensitive to whether he strikes first or second. These calculations are performed with the analytic attack allocation appropriate for moderate forces, so some differences could be expected for the largest of the forces considered.

  19. Discovering Collaborative Cyber Attack Patterns Using Social Network Analysis

    NASA Astrophysics Data System (ADS)

    Du, Haitao; Yang, Shanchieh Jay

    This paper investigates collaborative cyber attacks based on social network analysis. An Attack Social Graph (ASG) is defined to represent cyber attacks on the Internet. Features are extracted from ASGs to analyze collaborative patterns. We use principle component analysis to reduce the feature space, and hierarchical clustering to group attack sources that exhibit similar behavior. Experiments with real world data illustrate that our framework can effectively reduce from large dataset to clusters of attack sources exhibiting critical collaborative patterns.

  20. Airfoil Lift with Changing Angle of Attack

    NASA Technical Reports Server (NTRS)

    Reid, Elliott G

    1927-01-01

    Tests have been made in the atmospheric wind tunnel of the National Advisory Committee for Aeronautics to determine the effects of pitching oscillations upon the lift of an airfoil. It has been found that the lift of an airfoil, while pitching, is usually less than that which would exist at the same angle of attack in the stationary condition, although exceptions may occur when the lift is small or if the angle of attack is being rapidly reduced. It is also shown that the behavior of a pitching airfoil may be qualitatively explained on the basis of accepted aerodynamic theory.

  1. Counterfactual attack on counterfactual quantum key distribution

    NASA Astrophysics Data System (ADS)

    Zhang, Sheng; Wnang, Jian; Tang, Chao Jing

    2012-05-01

    It is interesting that counterfactual quantum cryptography protocols allow two remotely separated parties to share a secret key without transmitting any signal particles. Generally, these protocols, expected to provide security advantages, base their security on a translated no-cloning theorem. Therefore, they potentially exhibit unconditional security in theory. In this letter, we propose a new Trojan horse attack, by which an eavesdropper Eve can gain full information about the key without being noticed, to real implementations of a counterfactual quantum cryptography system. Most importantly, the presented attack is available even if the system has negligible imperfections. Therefore, it shows that the present realization of counterfactual quantum key distribution is vulnerable.

  2. Differential attack on mini-AES

    NASA Astrophysics Data System (ADS)

    Ajeng Gemellia, Asadini Dwi; Indarjani, Santi

    2012-05-01

    This paper presents the results of differential attack on Mini-AES algorithm. The differential trails are constructed using all combinations of propagation ratio without repetition. To give practical results, we implement the key extraction for differential characteristics which have the highest and lowest probability as a comparison. Based on total propagation ratio and complexity resulted, Mini-AES algorithms are vulnerable to differential attack. The best differential characteristic is the differential characteristic using a single active s-box with the propagation ratio of 8 / 16.

  3. Systematic Poisoning Attacks on and Defenses for Machine Learning in Healthcare.

    PubMed

    Mozaffari-Kermani, Mehran; Sur-Kolay, Susmita; Raghunathan, Anand; Jha, Niraj K

    2015-11-01

    Machine learning is being used in a wide range of application domains to discover patterns in large datasets. Increasingly, the results of machine learning drive critical decisions in applications related to healthcare and biomedicine. Such health-related applications are often sensitive, and thus, any security breach would be catastrophic. Naturally, the integrity of the results computed by machine learning is of great importance. Recent research has shown that some machine-learning algorithms can be compromised by augmenting their training datasets with malicious data, leading to a new class of attacks called poisoning attacks. Hindrance of a diagnosis may have life-threatening consequences and could cause distrust. On the other hand, not only may a false diagnosis prompt users to distrust the machine-learning algorithm and even abandon the entire system but also such a false positive classification may cause patient distress. In this paper, we present a systematic, algorithm-independent approach for mounting poisoning attacks across a wide range of machine-learning algorithms and healthcare datasets. The proposed attack procedure generates input data, which, when added to the training set, can either cause the results of machine learning to have targeted errors (e.g., increase the likelihood of classification into a specific class), or simply introduce arbitrary errors (incorrect classification). These attacks may be applied to both fixed and evolving datasets. They can be applied even when only statistics of the training dataset are available or, in some cases, even without access to the training dataset, although at a lower efficacy. We establish the effectiveness of the proposed attacks using a suite of six machine-learning algorithms and five healthcare datasets. Finally, we present countermeasures against the proposed generic attacks that are based on tracking and detecting deviations in various accuracy metrics, and benchmark their effectiveness. PMID

  4. Work-energy level, personal characteristics, and fatal heart attack: a birth-cohort effect.

    PubMed

    Paffenbarger, R S; Hale, W E; Brand, R J; Hyde, R T

    1977-03-01

    In a 22-year followup of 3686 San Francisco longshoremen, a cohort analysis assessed job activity and six personal characteristics in relation to 395 fatal heart attacks. Four cohorts aged 35-44, 45-54, 55-64, and 65-74 in 1951 were studied annually for job shifts affecting energy output and for sudden or delayed death from heart attack by age 75. All subjects underwent multiphasic screening for heavy cigarette smoking, higher blood pressure, history of prior heart disease, obesity, abnormal glucose metabolism, and higher blood cholesterol. The first three of these characteristics added risk of fatal heart attack. The amount of risk varied in the four cohorts. Higher energy output on the job reduced risk of fatal heart attack, especially sudden death, in the two younger cohorts, where less active workers were at threefold increased risk. Lack of this effect in the two older cohorts could imply real differences in their work habits, such as being less energetic in heavy jobs or more energetic in light jobs than the younger cohorts. Or, before the study began, early deaths may have winnowed susceptibles from the two older cohorts. Combined low-energy output, heavy smoking, and higher blood pressure increased risk by as much as 20-fold. By elimination of these adverse influences, this population might have had an 88% reduction in its rate of fatal heart attack during the 22 years. PMID:848474

  5. Two Virasoro symmetries in stringy warped AdS3

    NASA Astrophysics Data System (ADS)

    Compère, Geoffrey; Guica, Monica; Rodriguez, Maria J.

    2014-12-01

    We study three-dimensional consistent truncations of type IIB supergravity which admit warped AdS3 solutions. These theories contain subsectors that have no bulk dynamics. We show that the symplectic form for these theories, when restricted to the non-dynamical subsectors, equals the symplectic form for pure Einstein gravity in AdS3. Consequently, for each consistent choice of boundary conditions in AdS3, we can define a consistent phase space in warped AdS3 with identical conserved charges. This way, we easily obtain a Virasoro × Virasoro asymptotic symmetry algebra in warped AdS3; two different types of Virasoro × Kač-Moody symmetries are also consistent alternatives.

  6. Intrusion-Tolerant Replication under Attack

    ERIC Educational Resources Information Center

    Kirsch, Jonathan

    2010-01-01

    Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…

  7. Heart Attack - Multiple Languages: MedlinePlus

    MedlinePlus

    ... List of All Topics All Heart Attack - Multiple Languages To use the sharing features on this page, please enable JavaScript. Arabic (العربية) Bosnian (Bosanski) Chinese - Simplified (简体中文) Chinese - Traditional ( ...

  8. Modified localized attack on complex network

    NASA Astrophysics Data System (ADS)

    Dong, Gaogao; Du, Ruijin; Hao, Huifang; Tian, Lixin

    2016-01-01

    Since a shell structure contains a wealth of information, it is not only very important for understanding the transport properties of the network, but also essential to identify influential spreaders in complex networks. Nodes within each shell can be classified into two categories: protected nodes and unprotected nodes. In this paper, we propose a generalization of the localized attack, modified localized attack, which means that when a randomly chosen node (root node) is under attack, protected nodes will not be removed, but unprotected nodes in the nearest shells will fail. We numerically and analytically study the system robustness under this attack by taking an Erdös-Rényi (ER) network, a regular random (RR) network and a scale-free (SF) network as examples. Moreover, a fraction of nodes belonging to giant component S and a critical threshold q c , where S approaches to zero, are given. The result implies that increasing connection density has been found to be useful to significantly improve network robustness.

  9. Responses to the September 11, 2001 Attacks.

    ERIC Educational Resources Information Center

    Anderson, Frances E.

    2001-01-01

    This editorial introduces a special section devoted to chronicling the responses of art therapists after the September 11th attacks. The section contains 10 articles from therapists in New York City, New Jersey, Long Island, Washington, DC, and California. Articles include stories of the reactions of the therapists as well as their work with…

  10. Union, States Wage Frontal Attack on NCLB

    ERIC Educational Resources Information Center

    Keller, Bess; Sack, Joetta L.

    2005-01-01

    Widespread sniping at the Bush administration's centerpiece education law escalated into a frontal attack as the nation's largest teachers' union. Several school districts sued federal officials over the measure, just a day after the Utah legislature approved a bill challenging the reach of the law. The National Education Association's suit…

  11. Adversarial Feature Selection Against Evasion Attacks.

    PubMed

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection. PMID:25910268

  12. Survival of child after lion attack

    PubMed Central

    Dabdoub, Carlos F.; Dabdoub, Carlos B.; Chavez, Mario; Molina, Felipe

    2013-01-01

    Background: Injuries to humans caused by attacks from large predators are very rare, especially in the United States, Europe, or Latin America. A few cases were reported on accidents in zoos or animal farms, being very uncommon in children. The purposes of this report include describing the case of a child who sustained an attack by a lion named “Bang-Bang”, which resulted in injuries to the head, chest, and abdomen, as well as the subsequent neurosurgical treatment and providing a review of the literature. Case Description: We report the case of an 8-year-old boy who was attacked by a lion during a circus show. The patient underwent an emergent neurosurgical procedure, including parietal craniectomy, cleaning, and extensive surgical debridement of the wounds. Despite open severe head trauma with brain damage as well as thorax and abdomen trauma, the child survived, with minimal neurological sequelae. Conclusions: Human injury resulting from encounters with nondomesticated animals is increasingly rising throughout the world. This case highlights the potentially violent and aggressive nature of wild mammals held in captivity. Unusual wild animal attacks and the complex injuries that result may pose a challenge to surgeons practicing in resource-limited settings. In this sense, the best treatment in the mentioned case is the prevention of human injuries by these animals. In addition, to attend to these infrequent cases, the authors emphasize the importance of a multidisciplinary approach to achieve the best cosmetic and functional results. PMID:23869277

  13. Rhode Island School Terrorist Attack Preparedness

    ERIC Educational Resources Information Center

    Dube, Michael W. M.

    2012-01-01

    This study examined the state of safety and terrorist attack preparedness in Rhode Island Schools as determined by Rhode Island school leader perceptions. The study is descriptive in nature as it gathers data to describe a particular event or situation. Using a researcher generated survey based on terrorist preparedness guidelines and suggestions…

  14. Shark Attack! Sinking Your Teeth into Anatomy.

    ERIC Educational Resources Information Center

    House, Herbert

    2002-01-01

    Presents a real life shark attack story and studies arm reattachment surgery to teach human anatomy. Discusses how knowledge of anatomy can be put to use in the real world and how the arm functions. Includes teaching notes and suggestions for classroom management. (YDS)

  15. CASE STUDY: DIELDRIN ATTACK IN DALYAN LAGOON

    EPA Science Inventory

    During the first two weeks of December 2005, NATO sponsored an Advanced Study Institute (ASI) in Istanbul, Turkey. Part of this ASI involved a case study of a terrorist attack, where a chemical was assumed to be dumped into Sulunger Lake in Turkey. This chapter documents the re...

  16. Association between Terror Attacks and Suicide Attempts

    ERIC Educational Resources Information Center

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the variables, with…

  17. Plant defences against herbivore and insect attack

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Plants deploy a number of defences against attack by insects and other herbivores. Direct defence is conferred by plant products and structures that deter or kill the herbivores. Chemical toxins and deterrents vary widely among plant species, and some typical toxins include alkaloids, terpenoids, st...

  18. After Heart Attack, New Threat: Heart Failure

    MedlinePlus

    ... https://medlineplus.gov/news/fullstory_159007.html After Heart Attack, New Threat: Heart Failure 1 in 4 survivors develops this serious ... TUESDAY, May 24, 2016 (HealthDay News) -- Risk of heart failure appears high within a few years of ...

  19. America under attack: the "10 commandments" of responding to mass terrorist attacks.

    PubMed

    Everly, G S; Mitchell, J T

    2001-01-01

    On September 11, 2001 terrorist attacks caused the catastrophic collapse of the twin towers of the World Trade Center in New York City. Approximately 40 minutes after the World Trade Center was attacked, a similar terrorist attack was perpetrated against the Pentagon in Washington, D.C. Although the resultant physical devastation was beyond anything this nation has ever experienced, the psychological devastation may not be known for months, or even years. This paper discusses, not only a structure for understanding the phases of terrorism, but offers 10 recommendations for responding to acts of terrorism. PMID:11642190

  20. Error and attack vulnerability of temporal networks

    NASA Astrophysics Data System (ADS)

    Trajanovski, S.; Scellato, S.; Leontiadis, I.

    2012-06-01

    The study of real-world communication systems via complex network models has greatly expanded our understanding on how information flows, even in completely decentralized architectures such as mobile wireless networks. Nonetheless, static network models cannot capture the time-varying aspects and, therefore, various temporal metrics have been introduced. In this paper, we investigate the robustness of time-varying networks under various failures and intelligent attacks. We adopt a methodology to evaluate the impact of such events on the network connectivity by employing temporal metrics in order to select and remove nodes based on how critical they are considered for the network. We also define the temporal robustness range, a new metric that quantifies the disruption caused by an attack strategy to a given temporal network. Our results show that in real-world networks, where some nodes are more dominant than others, temporal connectivity is significantly more affected by intelligent attacks than by random failures. Moreover, different intelligent attack strategies have a similar effect on the robustness: even small subsets of highly connected nodes act as a bottleneck in the temporal information flow, becoming critical weak points of the entire system. Additionally, the same nodes are the most important across a range of different importance metrics, expressing the correlation between highly connected nodes and those that trigger most of the changes in the optimal information spreading. Contrarily, we show that in randomly generated networks, where all the nodes have similar properties, random errors and intelligent attacks exhibit similar behavior. These conclusions may help us in design of more robust systems and fault-tolerant network architectures.

  1. Recovery of human remains after shark attack.

    PubMed

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim. PMID:16936505

  2. Leading Change, Adding Value.

    PubMed

    Evans, Nick

    2016-09-12

    Essential facts Leading Change, Adding Value is NHS England's new nursing and midwifery framework. It is designed to build on Compassion in Practice (CiP), which was published 3 years ago and set out the 6Cs: compassion, care, commitment, courage, competence and communication. CiP established the values at the heart of nursing and midwifery, while the new framework sets out how staff can help transform the health and care sectors to meet the aims of the NHS England's Five Year Forward View. PMID:27615573

  3. Dirac operator on fuzzy AdS2

    NASA Astrophysics Data System (ADS)

    Fakhri, Hossein; Imaanpur, Ali

    2003-03-01

    In this article we construct the chirality and Dirac operators on noncommutative AdS2. We also derive the discrete spectrum of the Dirac operator which is important in the study of the spectral triple associated to AdS2. It is shown that the degeneracy of the spectrum present in the commutative AdS2 is lifted in the noncommutative case. The way we construct the chirality operator is suggestive of how to introduce the projector operators of the corresponding projective modules on this space.

  4. An xp model on AdS2 spacetime

    NASA Astrophysics Data System (ADS)

    Molina-Vilaplana, Javier; Sierra, Germán

    2013-12-01

    In this paper we formulate the xp model on the AdS2 spacetime. We find that the spectrum of the Hamiltonian has positive and negative eigenvalues, whose absolute values are given by a harmonic oscillator spectrum, which in turn coincides with that of a massive Dirac fermion in AdS2. We extend this result to generic xp models which are shown to be equivalent to a massive Dirac fermion on spacetimes whose metric depend of the xp Hamiltonian. Finally, we construct the generators of the isometry group SO(2,1) of the AdS2 spacetime, and discuss the relation with conformal quantum mechanics.

  5. ADS Development in Japan

    NASA Astrophysics Data System (ADS)

    Kikuchi, Kenji

    2010-06-01

    Accelerator driven nuclear transmutation system has been pursued to have a clue to the solution of high-level radioactive waste management. The concept consists of super conducting linac, sub-critical reactor and the beam window. Reference model is set up to 800MW thermal power by using 1.5GeV proton beams with considerations multi-factors such as core criticality. Materials damage is simulated by high-energy particle transport codes and so on. Recent achievement on irradiation materials experiment is stated and the differences are pointed out if core burn-up is considered or not. Heat balance in tank-type ADS indicates the temperature conditions of steam generator, the beam widow and cladding materials. Lead-bismuth eutectics demonstration has been conducted. Corrosion depth rate was shown by experiments.

  6. Supersymmetric warped AdS in extended topologically massive supergravity

    NASA Astrophysics Data System (ADS)

    Deger, N. S.; Kaya, A.; Samtleben, H.; Sezgin, E.

    2014-07-01

    We determine the most general form of off-shell N=(1,1) supergravity field configurations in three dimensions by requiring that at least one off-shell Killing spinor exists. We then impose the field equations of the topologically massive off-shell supergravity and find a class of solutions whose properties crucially depend on the norm of the auxiliary vector field. These are spacelike-squashed and timelike-stretched AdS3 for the spacelike and timelike norms, respectively. At the transition point where the norm vanishes, the solution is null warped AdS3. This occurs when the coefficient of the Lorentz-Chern-Simons term is related to the AdS radius by μℓ=2. We find that the spacelike-squashed AdS3 can be modded out by a suitable discrete subgroup of the isometry group, yielding an extremal black hole solution which avoids closed timelike curves.

  7. Two fatal tiger attacks in zoos.

    PubMed

    Tantius, Britta; Wittschieber, Daniel; Schmidt, Sven; Rothschild, Markus A; Banaschak, Sibylle

    2016-01-01

    Two captive tiger attacks are presented that took place in Cologne and Münster zoos. Both attacks occurred when the handlers, intent on cleaning the enclosures, entered whilst the tigers accidently retained access to the location, and thus defended their territory against the perceived intruders. Both victims suffered fatal neck injuries from the bites. At Münster, colleagues managed to lure the tiger away from its victim to enable treatment, whilst the Cologne zoo tiger had to be shot in order to allow access to be gained. Whilst it was judged that human error led to the deaths of the experienced zookeepers, the investigation in Münster was closed as no third party was found to be at fault, whereas the Cologne zoo director was initially charged with being negligent. These charges were subsequently dismissed as safety regulations were found to be up to date. PMID:26115644

  8. Cell phone camera ballistics: attacks and countermeasures

    NASA Astrophysics Data System (ADS)

    Steinebach, Martin; Liu, Huajian; Fan, Peishuai; Katzenbeisser, Stefan

    2010-01-01

    Multimedia forensics deals with the analysis of multimedia data to gather information on its origin and authenticity. One therefore needs to distinguish classical criminal forensics (which today also uses multimedia data as evidence) and multimedia forensics where the actual case is based on a media file. One example for the latter is camera forensics where pixel error patters are used as fingerprints identifying a camera as the source of an image. Of course multimedia forensics can become a tool for criminal forensics when evidence used in a criminal investigation is likely to be manipulated. At this point an important question arises: How reliable are these algorithms? Can a judge trust their results? How easy are they to manipulate? In this work we show how camera forensics can be attacked and introduce a potential countermeasure against these attacks.

  9. Satellite Threat Warning and Attack Reporting

    SciTech Connect

    Hilland, D.; Phipps, G.; Jingle, C.; Newton, G.

    1997-12-31

    The Air Force Research Laboratory`s Satellite Threat Warning and Attack Reporting (STW/AR) program will provide technologies for advanced threat warning and reporting of radio frequency (RF) and laser threats. The STW/AR program objectives are: (a) develop cost- effective technologies to detect, identify, locate, characterize, and report attacks or interference against U.S. and Allied satellites. (b) demonstrate innovative, light-weight, low-power, laser and RF sensors. The program focuses on the demonstration of RF and laser sensors. The RF sensor effort includes the investigation of interferometric antenna arrays, multi-arm spiral and butler matrix antennas, wideband receivers, adaptive processors, and improved processing algorithms. The laser sensor effort includes the investigation of alternative detectors, broadband grating and optical designs, active pixel sensing, and improved processing algorithms.

  10. RISK DISCLOSURE AGAINST ATTACK ON CRITICAL INFRASTRUCTURES

    NASA Astrophysics Data System (ADS)

    Yoshida, Mamoru; Kobayashi, Kiyoshi

    This paper analyzes the government's defensive and disclosure strategies to reduce the damage caused by terrorists that attack critical infrastructures using subjective game theory. The government recognizes a terrorist as a hidden opponent and the government's decision making about the policies against terror attacks depends on the belief about the existence of terrorist. In addition, it is not necessarily true that the government and the terrorist play the common game and make their decisions. Considering these points, the paper formulates the model in which the government and the terrorist formulate the subjective games respectively, and they induce the strategies using the equilibriums of their subjective games. The paper concluded that the government's disclosure about the implementation of the countermeasure, rather than the disclosure of warning level related with the belief about the existence of terrorist, brings about the higher increment of the subjective payoffs of the government.

  11. Mitigation of malicious attacks on networks

    PubMed Central

    Schneider, Christian M.; Moreira, André A.; Andrade, José S.; Havlin, Shlomo; Herrmann, Hans J.

    2011-01-01

    Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How and at which cost can one restructure the network such that it will become more robust against a malicious attack? We introduce a new measure for robustness and use it to devise a method to mitigate economically and efficiently this risk. We demonstrate its efficiency on the European electricity system and on the Internet as well as on complex networks models. We show that with small changes in the network structure (low cost) the robustness of diverse networks can be improved dramatically whereas their functionality remains unchanged. Our results are useful not only for improving significantly with low cost the robustness of existing infrastructures but also for designing economically robust network systems. PMID:21368159

  12. Mitigation of malicious attacks on networks.

    PubMed

    Schneider, Christian M; Moreira, André A; Andrade, José S; Havlin, Shlomo; Herrmann, Hans J

    2011-03-01

    Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How and at which cost can one restructure the network such that it will become more robust against a malicious attack? We introduce a new measure for robustness and use it to devise a method to mitigate economically and efficiently this risk. We demonstrate its efficiency on the European electricity system and on the Internet as well as on complex networks models. We show that with small changes in the network structure (low cost) the robustness of diverse networks can be improved dramatically whereas their functionality remains unchanged. Our results are useful not only for improving significantly with low cost the robustness of existing infrastructures but also for designing economically robust network systems. PMID:21368159

  13. Gaps in Care Can Harm Patients After Heart Attack

    MedlinePlus

    ... html Gaps in Care Can Harm Patients After Heart Attack Waiting too long for first medical apppointment after ... 23, 2016 WEDNESDAY, March 23, 2016 (HealthDay News) -- Heart attack patients who wait a long period to have ...

  14. Brain Scans Give Clues to Stress-Heart Attack Link

    MedlinePlus

    ... 157945.html Brain Scans Give Clues to Stress-Heart Attack Link Fear appears to increase inflammation in the ... stress is linked to an increased risk of heart attack and stroke. Increased activity in the amygdala -- the ...

  15. Heart Attack Before 50 Ups Early Death Risk

    MedlinePlus

    ... page: https://medlineplus.gov/news/fullstory_160692.html Heart Attack Before 50 Ups Early Death Risk But healthy ... News) -- The risk of early death after a heart attack has lessened over the past 30 years among ...

  16. Sex Suffers for Younger Adults After Heart Attack

    MedlinePlus

    ... 160722.html Sex Suffers for Younger Adults After Heart Attack Lack of interest a complaint of many women ... WEDNESDAY, Aug. 31, 2016 (HealthDay News) -- After a heart attack, many younger adults experience sexual difficulties -- and women ...

  17. Heart Attack Help? There's an App for That

    MedlinePlus

    ... page: https://medlineplus.gov/news/fullstory_159504.html Heart Attack Help? There's an App for That Emergency medicine ... American Heart Association. When someone is suffering a heart attack, stroke or cardiac arrest, quick action can be ...

  18. Nonlinear optical cryptosystem resistant to standard and hybrid attacks

    NASA Astrophysics Data System (ADS)

    Sinha, Aloka

    2016-06-01

    We propose a nonlinear optical cryptosystem that is resistant to amplitude-phase retrieval attacks, known-plaintext attack and chosen-plaintext attack. A squaring operation is introduced in the encryption path, which thwarts the iterative attacks. This nonlinear operation tends to amplify the error in the estimation during an iterative attack. The decryption process requires the use of a square-root operation. Thus, in the reverse path also, the attacks encounter the nonlinear square-root operation. These two nonlinearities make the iterative attacks unstable, thereby leading to non-convergence of the mean square error (MSE). Our technique is also resistant to hybrid attacks. The technique is general and is shown to work on a variety of images of the type grayscale and binary. Numerical simulation results corroborate the effectiveness of the proposed cryptosystem.

  19. Black Heart Attack Victims More Likely to Have Ambulance Diverted

    MedlinePlus

    ... nih.gov/medlineplus/news/fullstory_157879.html Black Heart Attack Victims More Likely to Have Ambulance Diverted Study ... 2016 MONDAY, March 21, 2016 (HealthDay News) -- Black heart attack patients are more likely than whites to have ...

  20. Heart Attack - Multiple Languages: MedlinePlus

    MedlinePlus

    ... French (français) Hindi (हिन्दी) Korean (한국어) Portuguese (português) Russian (Русский) Somali (af Soomaali) Spanish (español) Tagalog ( ... 한국어 (Korean) Bilingual PDF Health Information Translations Portuguese (português) Heart Attack Ataque Cardíaco - português (Portuguese) Bilingual PDF ...

  1. Securing iris recognition systems against masquerade attacks

    NASA Astrophysics Data System (ADS)

    Galbally, Javier; Gomez-Barrero, Marta; Ross, Arun; Fierrez, Julian; Ortega-Garcia, Javier

    2013-05-01

    A novel two-stage protection scheme for automatic iris recognition systems against masquerade attacks carried out with synthetically reconstructed iris images is presented. The method uses different characteristics of real iris images to differentiate them from the synthetic ones, thereby addressing important security flaws detected in state-of-the-art commercial systems. Experiments are carried out on the publicly available Biosecure Database and demonstrate the efficacy of the proposed security enhancing approach.

  2. Cryptogenic Drop Attacks: An Affliction of Women

    PubMed Central

    Stevens, D. L.; Matthews, W. B.

    1973-01-01

    A drop attack was defined as falling without warning, not apparently due to any malfunction of the legs, not induced by change of posture or movement of the head, and not accompanied by vertigo or other cephalic sensation. All 33 patients attending a neurological clinic with a primary complaint fulfilling these criteria were women, and a further seven examples were found by questioning 200 consecutive patients at a gynaecological clinic. No affected male was found. In all but one patient, falls occurred only when walking. They were not due to wearing high-heeled shoes. The average age at onset was 44·5 years and in younger women onset was often during pregnancy. The accepted causes of drop attacks were not found with certainty in any of these patients. The sex incidence and the circumstances of the falls suggest that the cause may lie in differences between the two sexes in the mechanism of walking rather than in any central disturbance. Drop attacks in women commonly occur as an isolated symptom for many years, and although distressing have no serious prognostic implications. PMID:4689829

  3. Ruptured Globe due to a Bird Attack

    PubMed Central

    Abdulla, Haitham A.; Alkhalifa, Saad K.

    2016-01-01

    Introduction Bird attacks are in general an uncommon event. To our knowledge, this is the first reported case in Bahrain. There have been very few cases reported worldwide. Mainly, birds attack humans as retaliation to threats surrounding their environment. At certain occasions, bird attack frequency increases especially during mating season or in the presence of a threat toward their young. Methods A 31-year-old male presented with a history of left-eye trauma, loss of vision, pain and tearing for 2 hours. A left corneal penetrating laceration and traumatic cataract were diagnosed. The corneal laceration was closed surgically, the lens was aspirated and anterior vitrectomy performed. Results After 4 months of follow-up, penetrating keratoplasty and posterior chamber intraocular lens implantation were performed elsewhere. The patient's vision improved from hand motion in his left eye to 20/200 without correction. Conclusion Corneal perforation secondary to a bird injury can be treated successfully with surgical closure and broad intravenous antibiotic coverage. This rare type of ocular trauma does not require any specific additional measures. PMID:27293411

  4. Enhancing network robustness against malicious attacks.

    PubMed

    Zeng, An; Liu, Weiping

    2012-06-01

    In a recent work [Schneider et al., Proc. Natl. Acad. Sci. USA 108, 3838 (2011)], the authors proposed a simple measure for network robustness under malicious attacks on nodes. Using a greedy algorithm, they found that the optimal structure with respect to this quantity is an onion structure in which high-degree nodes form a core surrounded by rings of nodes with decreasing degree. However, in real networks the failure can also occur in links such as dysfunctional power cables and blocked airlines. Accordingly, complementary to the node-robustness measurement (R(n)), we propose a link-robustness index (R(l)). We show that solely enhancing R(n) cannot guarantee the improvement of R(l). Moreover, the structure of an R(l)-optimized network is found to be entirely different from that of an onion network. In order to design robust networks that are resistant to a more realistic attack condition, we propose a hybrid greedy algorithm that takes both the R(n) and R(l) into account. We validate the robustness of our generated networks against malicious attacks mixed with both nodes and links failure. Finally, some economical constraints for swapping the links in real networks are considered, and significant improvement in both aspects of robustness is still achieved. PMID:23005185

  5. Enhancing network robustness against malicious attacks

    NASA Astrophysics Data System (ADS)

    Zeng, An; Liu, Weiping

    2012-06-01

    In a recent work [Schneider , Proc. Natl. Acad. Sci. USAPNASA60027-842410.1073/pnas.1009440108 108, 3838 (2011)], the authors proposed a simple measure for network robustness under malicious attacks on nodes. Using a greedy algorithm, they found that the optimal structure with respect to this quantity is an onion structure in which high-degree nodes form a core surrounded by rings of nodes with decreasing degree. However, in real networks the failure can also occur in links such as dysfunctional power cables and blocked airlines. Accordingly, complementary to the node-robustness measurement (Rn), we propose a link-robustness index (Rl). We show that solely enhancing Rn cannot guarantee the improvement of Rl. Moreover, the structure of an Rl-optimized network is found to be entirely different from that of an onion network. In order to design robust networks that are resistant to a more realistic attack condition, we propose a hybrid greedy algorithm that takes both the Rn and Rl into account. We validate the robustness of our generated networks against malicious attacks mixed with both nodes and links failure. Finally, some economical constraints for swapping the links in real networks are considered, and significant improvement in both aspects of robustness is still achieved.

  6. Blue versus Red: Towards a Model of Distributed Security Attacks

    NASA Astrophysics Data System (ADS)

    Fultz, Neal; Grossklags, Jens

    We develop a two-sided multiplayer model of security in which attackers aim to deny service and defenders strategize to secure their assets. Attackers benefit from the successful compromise of target systems, however, may suffer penalties for increased attack activities. Defenders weigh the force of an attack against the cost of security. We consider security decision-making in tightly and loosely coupled networks and allow defense expenditures in protection and self-insurance technologies.

  7. Study on the principle and defense of buffer overflow attacks

    NASA Astrophysics Data System (ADS)

    Lin, Wang

    2013-03-01

    Buffer overflow attacks have been the most common form in the network attacks and become a predominant problem in the system and network security area. With specific programs, this paper describes in detail the type of buffer overflow attacks and technical principles, so we have a good understanding of them, and then gives several common preventive measures.

  8. Securing Mobile Ad Hoc Networks Using Danger Theory-Based Artificial Immune Algorithm

    PubMed Central

    2015-01-01

    A mobile ad hoc network (MANET) is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based attacks. Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network. Therefore, the objective of this paper is to investigate the capability of a danger theory-based artificial immune algorithm called the mobile dendritic cell algorithm (MDCA) to detect flooding-based attacks in MANETs. The MDCA applies the dendritic cell algorithm (DCA) to secure the MANET with additional improvements. The MDCA is tested and validated using Qualnet v7.1 simulation tool. This work also introduces a new simulation module for a flooding attack called the resource consumption attack (RCA) using Qualnet v7.1. The results highlight the high efficiency of the MDCA in detecting RCAs in MANETs. PMID:25946001

  9. Securing mobile ad hoc networks using danger theory-based artificial immune algorithm.

    PubMed

    Abdelhaq, Maha; Alsaqour, Raed; Abdelhaq, Shawkat

    2015-01-01

    A mobile ad hoc network (MANET) is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based attacks. Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network. Therefore, the objective of this paper is to investigate the capability of a danger theory-based artificial immune algorithm called the mobile dendritic cell algorithm (MDCA) to detect flooding-based attacks in MANETs. The MDCA applies the dendritic cell algorithm (DCA) to secure the MANET with additional improvements. The MDCA is tested and validated using Qualnet v7.1 simulation tool. This work also introduces a new simulation module for a flooding attack called the resource consumption attack (RCA) using Qualnet v7.1. The results highlight the high efficiency of the MDCA in detecting RCAs in MANETs. PMID:25946001

  10. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    SciTech Connect

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that determine whether a terrorist

  11. Value Added in English Schools

    ERIC Educational Resources Information Center

    Ray, Andrew; McCormack, Tanya; Evans, Helen

    2009-01-01

    Value-added indicators are now a central part of school accountability in England, and value-added information is routinely used in school improvement at both the national and the local levels. This article describes the value-added models that are being used in the academic year 2007-8 by schools, parents, school inspectors, and other…

  12. Per aspirin ad astra...

    PubMed

    Hartung, Thomas

    2009-12-01

    Taking the 110th anniversary of marketing of aspirin as starting point, the almost scary toxicological profile of aspirin is contrasted with its actual use experience. The author concludes that we are lucky that, in 1899, there was no regulatory toxicology. Adding, for the purpose of this article, a fourth R to the Three Rs, i.e. Realism, three reality-checks are carried out. The first one comes to the conclusion that the tools of toxicology are hardly adequate for the challenges ahead. The second one concludes that, specifically, the implementation of the EU REACH system is not feasible with these tools, mainly with regard to throughput. The third one challenges the belief that classical alternative methods, i.e. replacing animal test-based tools one by one, is actually leading to a new toxicology - it appears to change only patches of the patchwork, but not to overcome any inherent limitations other than ethical ones. The perspective lies in the Toxicology for the 21st Century initiatives, which aim to create a new approach from the scratch, by an evidence-based toxicology and a global "Human Toxicology Programme". PMID:20105011

  13. Supergravity at the boundary of AdS supergravity

    NASA Astrophysics Data System (ADS)

    Amsel, Aaron J.; Compère, Geoffrey

    2009-04-01

    We give a general analysis of AdS boundary conditions for spin-3/2 Rarita-Schwinger fields and investigate boundary conditions preserving supersymmetry for a graviton multiplet in AdS4. Linear Rarita-Schwinger fields in AdSd are shown to admit mixed Dirichlet-Neumann boundary conditions when their mass is in the range 0≤|m|<1/2lAdS. We also demonstrate that mixed boundary conditions are allowed for larger masses when the inner product is “renormalized” accordingly with the action. We then use the results obtained for |m|=1/lAdS to explore supersymmetric boundary conditions for N=1 AdS4 supergravity in which the metric and Rarita-Schwinger fields are fluctuating at the boundary. We classify boundary conditions that preserve boundary supersymmetry or superconformal symmetry. Under the AdS/CFT dictionary, Neumann boundary conditions in d=4 supergravity correspond to gauging the superconformal group of the three-dimensional CFT describing M2-branes, while N=1 supersymmetric mixed boundary conditions couple the CFT to N=1 superconformal topologically massive gravity.

  14. Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks

    PubMed Central

    Li, Jiguo

    2014-01-01

    Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. We show that an existing certificate-based signcryption scheme is insecure in our model. We also propose a new certificate-based signcryption scheme that achieves security against both public key replacement attacks and insider attacks. We prove in the random oracle model that the proposed scheme is chosen-ciphertext secure and existentially unforgeable. Performance analysis shows that the proposed scheme outperforms all the previous certificate-based signcryption schemes in the literature. PMID:24959606

  15. Web Forms and Untraceable DDoS Attacks

    NASA Astrophysics Data System (ADS)

    Jakobsson, Markus; Menczer, Filippo

    We analyze a Web vulnerability that allows an attacker to perform an email-based attack on selected victims, using standard scripts and agents. What differentiates the attack we describe from other, already known forms of distributed denial of service (DDoS) attacks is that an attacker does not need to infiltrate the network in any manner - as is normally required to launch a DDoS attack. Thus, we see this type of attack as a poor man's DDoS. Not only is the attack easy to mount, but it is also almost impossible to trace back to the perpetrator. Along with descriptions of our attack, we demonstrate its destructive potential with (limited and contained) experimental results. We illustrate the potential impact of our attack by describing how an attacker can disable an email account by flooding its inbox; block competition during on-line auctions; harm competitors with an on-line presence; disrupt phone service to a given victim; disconnect mobile corporate leaders from their networks; and disrupt electronic elections. Finally, we propose a set of countermeasures that are light-weight, do not require modifications to the infrastructure, and can be deployed in a gradual manner.

  16. Machine Learning Methods for Attack Detection in the Smart Grid.

    PubMed

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework. PMID:25807571

  17. Detection of hydrogen attack in base metal and weld HAZ

    SciTech Connect

    Birring, A.S.; Elliot, J.; Hsiao, C.P.

    1995-12-01

    Hydrogen attack is known to occur in C-1/2Mo steels operating at high temperature and pressure in the hydrogen environment. The attack occurs in the base metal as well as in the weld heat affected zone (HAZ) of vessels and pipes. Hydrogen attack reduces the strength and toughness of steel and, if left undetected, can lead to component failure. Failures can be avoided by timely application of reliable and sensitive nondestructive techniques. Ultrasonic techniques were developed and applied to detect hydrogen attack in both the base metal and weld HAZ attack. Ultrasonic backscatter and velocity ratio techniques were applied for detection of base metal attack. These techniques are, however, not suitable for detection of HAZ attack. Conventional shear wave examination is currently used for HAZ inspection. This method can detect large cracks but is not sensitive to detect microcracks produced by hydrogen attack. A combination of two techniques was developed for detection of HAZ attack. These techniques are: contact focused angle beam S-wave and pitch-catch L-wave. The first technique focuses the beam using an acoustic lens while the second technique uses the intersection point of the two pitch-catch beam axes to illuminate the HAZ zone. Both the focused and pitch-catch techniques were applied on samples with simulated HAZ attack. The techniques were successful in detecting simulated attack.

  18. LAN attack detection using Discrete Event Systems.

    PubMed

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed. PMID:20804980

  19. Explosive attack: Lessons learned in Seyed Al Shohada mosque attack, April 2008, Shiraz, Iran

    PubMed Central

    Paydar, Shahram; Sharifian, Maryam; Parvaz, Shahram Boland; Abbasi, Hamid Reza; Moradian, Mohamad javad; Roozbeh, Jamshid; Nikghbalian, Saman; Sagheb, Mohammad Mahdi; Ghaffarpasand, Fariborz; Salehi, Oveis; Dehghani, Javad

    2012-01-01

    Introduction: The threat of explosive attacks has become a worldwide problem. Bombing is the preferred method of attacks. These attacks result in specific physical and psychiatric trauma. In this paper, we present an epidemiologic description of the physical injuries of patients who survived the explosive attack in Seyed Al Shohada mosque April 2008 Shiraz, Iran. Materials and Methods: All medical records of the patients admitted at Shiraz Hospitals on April 2008 due to Seyed Al Shohada mosque bombing attacks, Shiraz, Iran, were reviewed. Results: A total of 202 patients were referred to the hospitals over 24 h following the terrorist attack. One hundred sixty-four patients were admitted for short periods of observation (<24 h). Thirty-eight patients needed more than 1 day of hospitalization. The mean age of the patients was 26.2 (range 2 to 51) years. One hundred thirty-five (66.8%) patients were males. Twenty-six (12.8%) were children. Burn was the most prevalent cause of admission. Five (13.5%) patients needed chest tube insertion and eight (21%) needed skin grafts due to burn. Overall, 12 patients expired (5%). Three (25%) of them were children (2 and 6, and 11 years old). Mortality rate was significantly higher among the children than adults (P value <0.05). The most important cause of death was head trauma which was seen in five (41.6%) of the expired patients followed by burn (including air way burn) in four (33%), and internal bleeding in three (25%). Patients with head trauma had significantly a higher rate of mortality than other patients (P value <0.05). Discussion: Following a bombing attack, numerous victims were brought to the emergency unit suffering from a combination of multi-organ injuries caused by the blast, penetrating injuries caused by shrapnel and other debris, and burns. It is important for a physician to be familiar with the clinical features and treatments of explosive attacks victims. Early management of patients at the scene and

  20. Asymptotically AdS spacetimes with a timelike Kasner singularity

    NASA Astrophysics Data System (ADS)

    Ren, Jie

    2016-07-01

    Exact solutions to Einstein's equations for holographic models are presented and studied. The IR geometry has a timelike cousin of the Kasner singularity, which is the less generic case of the BKL (Belinski-Khalatnikov-Lifshitz) singularity, and the UV is asymptotically AdS. This solution describes a holographic RG flow between them. The solution's appearance is an interpolation between the planar AdS black hole and the AdS soliton. The causality constraint is always satisfied. The entanglement entropy and Wilson loops are discussed. The boundary condition for the current-current correlation function and the Laplacian in the IR is examined. There is no infalling wave in the IR, but instead, there is a normalizable solution in the IR. In a special case, a hyperscaling-violating geometry is obtained after a dimensional reduction.

  1. All AdS7 solutions of type II supergravity

    NASA Astrophysics Data System (ADS)

    Apruzzi, Fabio; Fazzi, Marco; Rosa, Dario; Tomasiello, Alessandro

    2014-04-01

    In M-theory, the only AdS7 supersymmetric solutions are AdS7 × S 4 and its orbifolds. In this paper, we find and classify new supersymmetric solutions of the type AdS7 × M 3 in type II supergravity. While in IIB none exist, in IIA with Romans mass (which does not lift to M-theory) there are many new ones. We use a pure spinor approach reminiscent of generalized complex geometry. Without the need for any Ansatz, the system determines uniquely the form of the metric and fluxes, up to solving a system of ODEs. Namely, the metric on M 3 is that of an S 2 fibered over an interval; this is consistent with the Sp(1) R-symmetry of the holographically dual (1,0) theory. By including D8 brane sources, one can numerically obtain regular solutions, where topologically M 3 ≅ S 3.

  2. Worldsheet scattering in AdS3/CFT2

    NASA Astrophysics Data System (ADS)

    Sundin, Per; Wulff, Linus

    2013-07-01

    We confront the recently proposed exact S-matrices for AdS 3/ CFT 2 with direct worldsheet calculations. Utilizing the BMN and Near Flat Space (NFS) expansions for strings on AdS 3 × S 3 × S 3 × S 1 and AdS 3 × S 3 × T 4 we compute both tree-level and one-loop scattering amplitudes. Up to some minor issues we find nice agreement in the tree-level sector. At the one-loop level however we find that certain non-zero tree-level processes, which are not visible in the exact solution, contribute, via the optical theorem, and give an apparent mismatch for certain amplitudes. Furthermore we find that a proposed one-loop modification of the dressing phase correctly reproduces the worldsheet calculation while the standard Hernandez-Lopez phase does not. We also compute several massless to massless processes.

  3. Detailed ultraviolet asymptotics for AdS scalar field perturbations

    NASA Astrophysics Data System (ADS)

    Evnin, Oleg; Jai-akson, Puttarak

    2016-04-01

    We present a range of methods suitable for accurate evaluation of the leading asymptotics for integrals of products of Jacobi polynomials in limits when the degrees of some or all polynomials inside the integral become large. The structures in question have recently emerged in the context of effective descriptions of small amplitude perturbations in anti-de Sitter (AdS) spacetime. The limit of high degree polynomials corresponds in this situation to effective interactions involving extreme short-wavelength modes, whose dynamics is crucial for the turbulent instabilities that determine the ultimate fate of small AdS perturbations. We explicitly apply the relevant asymptotic techniques to the case of a self-interacting probe scalar field in AdS and extract a detailed form of the leading large degree behavior, including closed form analytic expressions for the numerical coefficients appearing in the asymptotics.

  4. New massive gravity and AdS(4) counterterms.

    PubMed

    Jatkar, Dileep P; Sinha, Aninda

    2011-04-29

    We show that the recently proposed Dirac-Born-Infeld extension of new massive gravity emerges naturally as a counterterm in four-dimensional anti-de Sitter space (AdS(4)). The resulting on-shell Euclidean action is independent of the cutoff at zero temperature. We also find that the same choice of counterterm gives the usual area law for the AdS(4) Schwarzschild black hole entropy in a cutoff-independent manner. The parameter values of the resulting counterterm action correspond to a c=0 theory in the context of the duality between AdS(3) gravity and two-dimensional conformal field theory. We rewrite this theory in terms of the gauge field that is used to recast 3D gravity as a Chern-Simons theory. PMID:21635026

  5. Bobcat attack on a cottontail rabbit

    USGS Publications Warehouse

    Biggins, D.E.; Biggins, D.M.

    2006-01-01

    We observed an attack by a bobcat (Lynx rufus) on a cottontail rabbit (Sylvilagus) that involved stealthy approach by the cat for >1 h, followed by a 12.3-s chase covering 116.0 m for the cat and 128.4 m for the rabbit. During the chase, the route of the cat from starting point to kill site was more direct than the semi-circular route of the rabbit. Stride lengths for the cat and total distance covered by the chase were longer than those previously reported for bobcats.

  6. X-29 high angle of attack

    NASA Technical Reports Server (NTRS)

    Ishmael, Stephen D.; Smith, Rogers E.; Purifoy, Dana D.; Womer, Rodney K.

    1990-01-01

    Flight test program highlights are discussed for the X-29 high angle-of-attack (AOA) aircraft. The AOA envelope extended from 10 to 66 deg; the X-29 exhibited precise pitch control, allowing AOA to be maintained within 1 deg during stabilized points as well as permitting rapid recoveries from all AOAs. Attention is given to controllability degradation above 40-deg AOA due to asymmetric yawing moments. The use of this aircraft as a fundamental research tool which complements analytical methods is powerfully justified by the obviation of scaling effects.

  7. Phases of global AdS black holes

    NASA Astrophysics Data System (ADS)

    Basu, Pallab; Krishnan, Chethan; Subramanian, P. N. Bala

    2016-06-01

    We study the phases of gravity coupled to a charged scalar and gauge field in an asymptotically Anti-de Sitter spacetime ( AdS 4) in the grand canonical ensemble. For the conformally coupled scalar, an intricate phase diagram is charted out between the four relevant solutions: global AdS, boson star, Reissner-Nordstrom black hole and the hairy black hole. The nature of the phase diagram undergoes qualitative changes as the charge of the scalar is changed, which we discuss. We also discuss the new features that arise in the extremal limit.

  8. Protecting Database Centric Web Services against SQL/XPath Injection Attacks

    NASA Astrophysics Data System (ADS)

    Laranjeiro, Nuno; Vieira, Marco; Madeira, Henrique

    Web services represent a powerful interface for back-end database systems and are increasingly being used in business critical applications. However, field studies show that a large number of web services are deployed with security flaws (e.g., having SQL Injection vulnerabilities). Although several techniques for the identification of security vulnerabilities have been proposed, developing non-vulnerable web services is still a difficult task. In fact, security-related concerns are hard to apply as they involve adding complexity to already complex code. This paper proposes an approach to secure web services against SQL and XPath Injection attacks, by transparently detecting and aborting service invocations that try to take advantage of potential vulnerabilities. Our mechanism was applied to secure several web services specified by the TPC-App benchmark, showing to be 100% effective in stopping attacks, non-intrusive and very easy to use.

  9. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Şen, Sevil; Clark, John A.; Tapiador, Juan E.

    Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.

  10. The forecaster's added value

    NASA Astrophysics Data System (ADS)

    Turco, M.; Milelli, M.

    2009-09-01

    skill scores of two competitive forecast. It is important to underline that the conclusions refer to the analysis of the Piemonte operational alert system, so they cannot be directly taken as universally true. But we think that some of the main lessons that can be derived from this study could be useful for the meteorological community. In details, the main conclusions are the following: - despite the overall improvement in global scale and the fact that the resolution of the limited area models has increased considerably over recent years, the QPF produced by the meteorological models involved in this study has not improved enough to allow its direct use, that is, the subjective HQPF continues to offer the best performance; - in the forecast process, the step where humans have the largest added value with respect to mathematical models, is the communication. In fact the human characterisation and communication of the forecast uncertainty to end users cannot be replaced by any computer code; - eventually, although there is no novelty in this study, we would like to show that the correct application of appropriated statistical techniques permits a better definition and quantification of the errors and, mostly important, allows a correct (unbiased) communication between forecasters and decision makers.

  11. Baiting Inside Attackers Using Decoy Documents

    NASA Astrophysics Data System (ADS)

    Bowen, Brian M.; Hershkop, Shlomo; Keromytis, Angelos D.; Stolfo, Salvatore J.

    The insider threat remains one of the most vexing problems in computer security. A number of approaches have been proposed to detect nefarious insider actions including user modeling and profiling techniques, policy and access enforcement techniques, and misuse detection. In this work we propose trap-based defense mechanisms and a deployment platform for addressing the problem of insiders attempting to exfiltrate and use sensitive information. The goal is to confuse and confound an adversary requiring more effort to identify real information from bogus information and provide a means of detecting when an attempt to exploit sensitive information has occurred. “Decoy Documents” are automatically generated and stored on a file system by the D3 System with the aim of enticing a malicious user. We introduce and formalize a number of properties of decoys as a guide to design trap-based defenses to increase the likelihood of detecting an insider attack. The decoy documents contain several different types of bogus credentials that when used, trigger an alert. We also embed “stealthy beacons” inside the documents that cause a signal to be emitted to a server indicating when and where the particular decoy was opened. We evaluate decoy documents on honeypots penetrated by attackers demonstrating the feasibility of the method.

  12. Spontaneous subperiosteal hematoma precipitated by anxiety attack.

    PubMed

    Swanenberg, Irene M; Rizzuti, Allison E; Shinder, Roman

    2013-12-01

    A 60-year-old woman presented with diplopia and left periorbital edema and pressure, which developed during an anxiety attack the previous day. Examination revealed left inferotemporal globe dystopia, periorbital edema, ecchymosis, and limitation in supraduction. Orbital MRI confirmed the diagnosis of a superior subperiosteal orbital hematoma. The patient's signs and symptoms rapidly resolved with administration of oral corticosteroids. The patient remains asymptomatic with complete resolution of orbital signs at 3-month follow-up. Subperiosteal orbital hematoma (SOH) is a rare condition in which blood accumulates between the bony orbit and separated periosteum, and is often due to blunt head trauma. Non-traumatic SOH (NTSOH) is exceedingly rare and usually associated with known coagulopathies or tendency to bleed. However, few cases of spontaneous NTSOH have been reported without any such predisposition and are thought to be caused by sudden elevations in intrathoracic and intracranial venous pressure such as vomiting, coughing, SCUBA diving, weight lifting and labor. We herein describe the presentation, radiography and outcome of a unique case of spontaneous NTSOH following an anxiety attack. PMID:24063522

  13. Steganography forensics method for detecting least significant bit replacement attack

    NASA Astrophysics Data System (ADS)

    Wang, Xiaofeng; Wei, Chengcheng; Han, Xiao

    2015-01-01

    We present an image forensics method to detect least significant bit replacement steganography attack. The proposed method provides fine-grained forensics features by using the hierarchical structure that combines pixels correlation and bit-planes correlation. This is achieved via bit-plane decomposition and difference matrices between the least significant bit-plane and each one of the others. Generated forensics features provide the susceptibility (changeability) that will be drastically altered when the cover image is embedded with data to form a stego image. We developed a statistical model based on the forensics features and used least square support vector machine as a classifier to distinguish stego images from cover images. Experimental results show that the proposed method provides the following advantages. (1) The detection rate is noticeably higher than that of some existing methods. (2) It has the expected stability. (3) It is robust for content-preserving manipulations, such as JPEG compression, adding noise, filtering, etc. (4) The proposed method provides satisfactory generalization capability.

  14. Use of the Panic Attack Questionnaire-IV to assess non-clinical panic attacks and limited symptom panic attacks in student and community samples.

    PubMed

    Norton, Peter J; Zvolensky, Michael J; Bonn-Miller, Marcel O; Cox, Brian J; Norton, G Ron

    2008-10-01

    Since its development in the mid-1980s, the Panic Attack Questionnaire (PAQ) has been one of the more, if not the most, commonly used self-report tools for assessing panic attacks. The usage of the instrument, however, has come amid potential concerns that instructions and descriptions may lead to an over-estimate of the prevalence of panic attacks. Furthermore, the instrument has not been revised since 1992, despite changes in DSM-IV criteria and more recent developments in the understanding of panic attacks. As a result, this paper describes a revision of the PAQ to improve the instruction and descriptive set, and to fully assess features of panic derived from recent conceptualizations. Students meeting DSM-IV panic attack criteria and those endorsing panic attacks, but not meeting criteria, showed few differences with the exception that those not meeting DSM-IV criteria typically reported a longer onset-to-peak intensity time than did Panickers. Results were cross-validated and extended using an independent Community Sample. A full descriptive phenomenology of panic attacks is described, and future directions for studying panic attacks using the PAQ are presented. PMID:18243647

  15. X-31 at High Angle of Attack

    NASA Technical Reports Server (NTRS)

    1994-01-01

    The X-31 aircraft, on a research mission from NASA's Dryden Flight Research Center, Edwards, California, is flying nearly perpendicular to the flight path while performing the Herbst maneuver. Effectively using the entire airframe as a speed brake and using the aircraft's unique thrust vectoring system to maintain control, the pilot rapidly rolls the aircraft to reverse the direction of flight, completing the maneuver with acceleration back to high speed in the opposite direction. This type of turning capability could reduce the turning time of a fighter aircraft by 30 percent. The Herbst maneuver was first conducted in an X-31 on April 29, 1993, in the No. 2 X-31 aircraft by German test pilot Karl-Heinz Lang. The X-31 Enhanced Fighter Maneuverability (EFM) demonstrator flew at the Ames- Dryden Flight Research Facility, Edwards, California (redesignated the Dryden Flight Research Center in 1994) from February 1992 until 1995 and before that at the Air Force's Plant 42 in Palmdale, California. The goal of the project was to provide design information for the next generation of highly maneuverable fighter aircraft. This program demonstrated the value of using thrust vectoring (directing engine exhaust flow) coupled with an advanced flight control system to provide controlled flight to very high angles of attack. The result was a significant advantage over most conventional fighters in close-in combat situations. The X-31 flight program focused on agile flight within the post-stall regime, producing technical data to give aircraft designers a better understanding of aerodynamics, effectiveness of flight controls and thrust vectoring, and airflow phenomena at high angles of attack. Stall is a condition of an airplane or an airfoil in which lift decreases and drag increases due to the separation of airflow. Thrust vectoring compensates for the loss of control through normal aerodynamic surfaces that occurs during a stall. Post-stall refers to flying beyond the normal

  16. X-31 at High Angle of Attack

    NASA Technical Reports Server (NTRS)

    1994-01-01

    The X-31 aircraft, on a research mission from NASA's Dryden Flight Research Center, Edwards, California, is flying nearly perpendicular to the flight path while performing the Herbst maneuver. Effectively using the entire airframe as a speed brake and using the aircrafts unique thrust vectoring system to maintain control, the pilot rapidly rolls the aircraft to reverse the direction of flight, completing the maneuver with acceleration back to high speed in the opposite direction. This type of turning capability could reduce the turning time of a fighter aircraft by 30 percent. The Herbst maneuver was first conducted in an X-31 on April 29, 1993, in the No. 2 X-31 aircraft by German test pilot Karl-Heinz Lang. The X-31 Enhanced Fighter Maneuverability (EFM) demonstrator flew at the Ames- Dryden Flight Research Facility, Edwards, California (redesignated the Dryden Flight Research Center in 1994) from February 1992 until 1995 and before that at the Air Force's Plant 42 in Palmdale, California. The goal of the project was to provide design information for the next generation of highly maneuverable fighter aircraft. This program demonstrated the value of using thrust vectoring (directing engine exhaust flow) coupled with an advanced flight control system to provide controlled flight to very high angles of attack. The result was a significant advantage over most conventional fighters in close-in combat situations. The X-31 flight program focused on agile flight within the post-stall regime, producing technical data to give aircraft designers a better understanding of aerodynamics, effectiveness of flight controls and thrust vectoring, and airflow phenomena at high angles of attack. Stall is a condition of an airplane or an airfoil in which lift decreases and drag increases due to the separation of airflow. Thrust vectoring compensates for the loss of control through normal aerodynamic surfaces that occurs during a stall. Post-stall refers to flying beyond the normal

  17. X-31 at High Angle of Attack

    NASA Technical Reports Server (NTRS)

    1994-01-01

    The X-31 aircraft on a research mission from NASA's Dryden Flight Research Center, Edwards, California, is flying nearly perpendicular to the flight path while performing the Herbst maneuver. Effectively using the entire airframe as a speed brake and using the aircrafts unique thrust vectoring system to maintain control, the pilot rapidly rolls the aircraft to reverse the direction of flight, completing the maneuver with acceleration back to high speed in the opposite direction. This type of turning capability could reduce the turning time of a fighter aircraft by 30 percent. The Herbst maneuver was first conducted in an X-31 on April 29, 1993, in the No. 2 X-31 aircraft by German test pilot Karl-Heinz Lang. The X-31 Enhanced Fighter Maneuverability (EFM) demonstrator flew at the Ames- Dryden Flight Research Facility, Edwards, California (redesignated the Dryden Flight Research Center in 1994) from February 1992 until 1995 and before that at the Air Force's Plant 42 in Palmdale, California. The goal of the project was to provide design information for the next generation of highly maneuverable fighter aircraft. This program demonstrated the value of using thrust vectoring (directing engine exhaust flow) coupled with an advanced flight control system to provide controlled flight to very high angles of attack. The result was a significant advantage over most conventional fighters in close-in combat situations. The X-31 flight program focused on agile flight within the post-stall regime, producing technical data to give aircraft designers a better understanding of aerodynamics, effectiveness of flight controls and thrust vectoring, and airflow phenomena at high angles of attack. Stall is a condition of an airplane or an airfoil in which lift decreases and drag increases due to the separation of airflow. Thrust vectoring compensates for the loss of control through normal aerodynamic surfaces that occurs during a stall. Post-stall refers to flying beyond the normal

  18. Mystery cloud of AD 536

    NASA Technical Reports Server (NTRS)

    Stothers, R. B.

    1984-01-01

    The possible cause of the densest and most persistent dry fog on record, which was observed in Europe and the Middle East during AD 536 and 537, is discussed. The fog's long duration toward the south and the high sulfuric acid signal detected in Greenland in ice cores dated around AD 540 support the theory that the fog was due to the explosion of the Rabaul volcano, the occurrence of which has been dated at about AD 540 by the radiocarbon method.

  19. AdS Branes from Partial Breaking of Superconformal Symmetries

    SciTech Connect

    Ivanov, E.A.

    2005-10-01

    It is shown how the static-gauge world-volume superfield actions of diverse superbranes on the AdS{sub d+1} superbackgrounds can be systematically derived from nonlinear realizations of the appropriate AdS supersymmetries. The latter are treated as superconformal symmetries of flat Minkowski superspaces of the bosonic dimension d. Examples include the N = 1 AdS{sub 4} supermembrane, which is associated with the 1/2 partial breaking of the OSp(1|4) supersymmetry down to the N = 1, d = 3 Poincare supersymmetry, and the T-duality related L3-brane on AdS{sub 5} and scalar 3-brane on AdS{sub 5} x S{sup 1}, which are associated with two different patterns of 1/2 breaking of the SU(2, 2|1) supersymmetry. Another (closely related) topic is the AdS/CFT equivalence transformation. It maps the world-volume actions of the codimension-one AdS{sub d+1} (super)branes onto the actions of the appropriate Minkowski (super)conformal field theories in the dimension d.

  20. AdS5 backgrounds with 24 supersymmetries

    NASA Astrophysics Data System (ADS)

    Beck, S.; Gutowski, J.; Papadopoulos, G.

    2016-06-01

    We prove a non-existence theorem for smooth AdS 5 solutions with connected, compact without boundary internal space that preserve strictly 24 supersymmetries. In particular, we show that D = 11 supergravity does not admit such solutions, and that all such solutions of IIB supergravity are locally isometric to the AdS 5 × S 5 maximally supersymmetric background. Furthermore, we prove that (massive) IIA supergravity also does not admit such solutions, provided that the homogeneity conjecture for massive IIA supergravity is valid. In the context of AdS/CFT these results imply that if gravitational duals for strictly mathcal{N}=3 superconformal theories in 4-dimensions exist, they are either singular or their internal spaces are not compact.

  1. Entanglement temperature and perturbed AdS3 geometry

    NASA Astrophysics Data System (ADS)

    Levine, G. C.; Caravan, B.

    2016-06-01

    Generalizing the first law of thermodynamics, the increase in entropy density δ S (x ) of a conformal field theory (CFT) is proportional to the increase in energy density, δ E (x ) , of a subsystem divided by a spatially dependent entanglement temperature, TE(x ) , a fixed parameter determined by the geometry of the subsystem, crossing over to thermodynamic temperature at high temperatures. In this paper we derive a generalization of the thermodynamic Clausius relation, showing that deformations of the CFT by marginal operators are associated with spatial temperature variations, δ TE(x ) , and spatial energy correlations play the role of specific heat. Using AdS/CFT duality we develop a relationship between a perturbation in the local entanglement temperature of the CFT and the perturbation of the bulk AdS metric. In two dimensions, we demonstrate a method through which direct diagonalizations of the boundary quantum theory may be used to construct geometric perturbations of AdS3 .

  2. Causal Attribution, Perceived Benefits, and Morbidity After a Heart Attack: An 8-Year Study.

    ERIC Educational Resources Information Center

    Affleck, Glenn; And Others

    1987-01-01

    Interviewed heart attack victims (N=287) seven weeks and eight years after their attack. Explored interrelations among causal attributions for the attack, survivor morbidity, and heart attack recurrence. Found that patients who cited benefits from their misfortune seven weeks after the first attack were less likely to have another attack and had…

  3. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia

    PubMed Central

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Introduction Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. Methods The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Results Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. Conclusion The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources. PMID:17274813

  4. Lorentzian AdS geometries, wormholes, and holography

    SciTech Connect

    Arias, Raul E.; Silva, Guillermo A.; Botta Cantcheff, Marcelo

    2011-03-15

    We investigate the structure of two-point functions for the quantum field theory dual to an asymptotically Lorentzian Anti de Sitter (AdS) wormhole. The bulk geometry is a solution of five-dimensional second-order Einstein-Gauss-Bonnet gravity and causally connects two asymptotically AdS spacetimes. We revisit the Gubser-Klebanov-Polyakov-Witten prescription for computing two-point correlation functions for dual quantum field theories operators O in Lorentzian signature and we propose to express the bulk fields in terms of the independent boundary values {phi}{sub 0}{sup {+-}} at each of the two asymptotic AdS regions; along the way we exhibit how the ambiguity of normalizable modes in the bulk, related to initial and final states, show up in the computations. The independent boundary values are interpreted as sources for dual operators O{sup {+-}} and we argue that, apart from the possibility of entanglement, there exists a coupling between the degrees of freedom living at each boundary. The AdS{sub 1+1} geometry is also discussed in view of its similar boundary structure. Based on the analysis, we propose a very simple geometric criterion to distinguish coupling from entanglement effects among two sets of degrees of freedom associated with each of the disconnected parts of the boundary.

  5. Self-dual warped AdS3 black holes

    NASA Astrophysics Data System (ADS)

    Chen, Bin; Ning, Bo

    2010-12-01

    We study a new class of solutions of three-dimensional topological massive gravity. These solutions can be taken as nonextremal black holes, with their extremal counterparts being discrete quotients of spacelike warped AdS3 along the U(1)L isometry. We study the thermodynamics of these black holes and show that the first law is satisfied. We also show that for consistent boundary conditions, the asymptotic symmetry generators form only one copy of the Virasoro algebra with central charge cL=(4νℓ)/(G(ν2+3)), with which the Cardy formula reproduces the black hole entropy. We compute the real-time correlators of scalar perturbations and find a perfect match with the dual conformal field theory (CFT) predictions. Our study provides a novel example of warped AdS/CFT correspondence: the self-dual warped AdS3 black hole is dual to a CFT with nonvanishing left central charge. Moreover, our investigation suggests that the quantum topological massive gravity asymptotic to the same spacelike warped AdS3 in different consistent ways may be dual to different two-dimensional CFTs.

  6. Non-harmful insertion of data mimicking computer network attacks

    DOEpatents

    Neil, Joshua Charles; Kent, Alexander; Hash, Jr, Curtis Lee

    2016-06-21

    Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.

  7. Attack polish for nickel-base alloys and stainless steels

    DOEpatents

    Steeves, Arthur F.; Buono, Donald P.

    1983-01-01

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels. The chemical attack polish comprises Fe(NO.sub.3).sub.3, concentrated CH.sub.3 COOH, concentrated H.sub.2 SO.sub.4 and H.sub.2 O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  8. Attack polish for nickel-base alloys and stainless steels

    DOEpatents

    Not Available

    1980-05-28

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels is described. The chemical attack polich comprises FeNO/sub 3/, concentrated CH/sub 3/COOH, concentrated H/sub 2/SO/sub 4/ and H/sub 2/O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  9. On the offensive against brain attack

    SciTech Connect

    Wheatcraft, D.

    1997-06-01

    The Center for Healthcare Technologies at Lawrence Livermore National Laboratory has undertaken a stroke initiative whose purpose is to provide the medical community with the tools that will allow doctors to diagnose and treat stroke as aggressively as they do heart attack. A multidisciplinary team of stroke-initiative researchers is collaborating with academic medical centers and private companies to move these tools from the research and development stage through clinical trials, regulatory approval, and manufacture so that they can benefit many thousands of people who have strokes each year. Tools the team has developed fall into four categories: microsensors for brain and clot characterization, a catheter-based system using laser energy to break up clots in the blood vessels of the brain, laser-tissue interaction models in support of laser {open_quotes}clot busting,{close_quotes} and microtools for treating the aneurysms that cause hemorrhagic stroke.

  10. Sulfate attack on concrete with mineral admixtures

    SciTech Connect

    Irassar, E.F.; Di Maio, A.; Batic, O.R.

    1996-01-01

    The sulfate resistance of concretes containing fly ash, natural pozzolan and slag is investigated in a field test in which concrete specimens were half-buried in sulfate soil for five years. Mineral admixtures were used as a partial replacement for ordinary portland cement (C{sub 3}A = 8.5%), and the progress of sulfate attack was evaluated by several methods (visual rating, loss in mass, dynamic modulus, strength, X-ray analysis). Results of this study show that mineral admixtures improved the sulfate resistance when the concrete is buried in the soil. However, concretes with high content of mineral admixtures exhibit a greater surface scaling over soil level due to the sulfate salt crystallization. In this zone, capillary suction of concrete is the main mechanism of water and salt transportation. Concrete with 20% fly ash provides an integral solution for half-buried structures.

  11. Attacks on lexical natural language steganography systems

    NASA Astrophysics Data System (ADS)

    Taskiran, Cuneyt M.; Topkara, Umut; Topkara, Mercan; Delp, Edward J.

    2006-02-01

    Text data forms the largest bulk of digital data that people encounter and exchange daily. For this reason the potential usage of text data as a covert channel for secret communication is an imminent concern. Even though information hiding into natural language text has started to attract great interest, there has been no study on attacks against these applications. In this paper we examine the robustness of lexical steganography systems.In this paper we used a universal steganalysis method based on language models and support vector machines to differentiate sentences modified by a lexical steganography algorithm from unmodified sentences. The experimental accuracy of our method on classification of steganographically modified sentences was 84.9%. On classification of isolated sentences we obtained a high recall rate whereas the precision was low.

  12. Resveratrol products resulting by free radical attack

    NASA Astrophysics Data System (ADS)

    Bader, Yvonne; Quint, R. M.; Getoff, Nikola

    2008-06-01

    Trans-resveratrol ( trans-3,4',5-trihydroxystilbene; RES), which is contained in red wine and many plants, is one of the most relevant and extensively investigated stilbenes with a broad spectrum of biological activities. Among other duties, RES has been reported to have anti-carcinogenetic activities, which could be attributed to its antioxidant properties. The degradation of RES was studied under various conditions. The products (aldehydes, carboxylic acids, etc.) generated from RES by the attack of free radicals were registered as a function of the radical concentration (absorbed radiation dose). Based on the obtained data it appears that the OH radicals are initiating the rather complicated process, which involves of the numerous consecutive reactions. A possible starting reaction mechanism is presented.

  13. An optical angle of attack sensor

    NASA Astrophysics Data System (ADS)

    McDevitt, T. Kevin; Owen, F. Kevin

    A major source of transonic and supersonic wind-tunnel test data uncertainty is due to angle of attack (alpha) measurement errors caused by unknown sting and balance deflections under load. A novel laser-based instrument has been developed to enable continuous time-dependent alpha measurements to be made without signal dropout. Detectors capable of 0.01-deg resolution over an 18-deg range and 0.03-deg resolution over a 44-deg range with time-dependent outputs of 60 Hz have been developed. This capability is sufficient to provide accurate real-time alpha information for correlation with model balance measurements during transport and fighter model testing. Proof-of-concept experiments, along with the results of recent measurements conducted at the NASA Ames 9 x 7-ft supersonic wind tunnel, are presented. Experiments were also conducted to determine the reliable range, sensitivity, and long-term stability of the instrument.

  14. Mitigation of malicious attacks on network observation

    NASA Astrophysics Data System (ADS)

    Xiao, Yan-Dong; Lao, Song-Yang; Hou, Lv-Lin; Bai, Liang

    2015-02-01

    In the modeling, controlling, and monitoring of complex networks, a fundamental problem concerns the determination and observation of the system's states by using measurements or sensors as few as possible, defined as network observation. This work aims to investigate the robustness of network observation when an approach of minimum dominating set is considered in observing a network. We first investigate the structural properties of the minimum dominating sets, e.g. how the size depends on the degree-degree correlations and how to assess the nodes' importance in the malicious attacks. Then, we introduce a new measurement of robustness for network observation, and implement a hill-climbing algorithm to improve its robustness by edge rewiring. Furthermore, we propose a novel rewiring strategy, called smart rewiring, which could speed up the increment of robustness index. In comparison with previous strategy of edge rewiring, the smart rewiring has been found to be successfully useful on real-world and synthetic networks.

  15. Techniques for Judging Intent Behind Network Based Cyber Attacks

    SciTech Connect

    Allen, J M

    2004-01-28

    This project developed a prototype system that can rapidly differentiate between undirected cyber attacks, and those that have a more specific and concerning intent behind them. The system responds to important cyber attacks in a tactically significant way as the attack is proceeding. It is also creates a prioritized list for the human analysts allowing them to focus on the threats mostly likely to be of interest. In the recent years the volume of attacks over the internet has increased exponentially, as they have become more and more automated. The result of this is that real threats are harder and harder to distinguish from the general threat. It is possible with our current systems to identify network packets that originated from thousands of IP addresses as probing a site like LLNL in a single day. Human analysis of these threats does not result in information that can be used for tactical response because most of the attacks are short and over before the human starts the analysis. Only a very small percentage of attacks can even be evaluated manually due to the volume. This project developed methods, and prototyped tools, that can identify attacks, slow the attack down and aid in the process of prioritizing detections. The project demonstrated that such methods exist, and that practical implementations exist for modern computers and networks. We call the tools created D.I.A.G. or Determining Internet Attackers Goals.

  16. Neural network classifier of attacks in IP telephony

    NASA Astrophysics Data System (ADS)

    Safarik, Jakub; Voznak, Miroslav; Mehic, Miralem; Partila, Pavol; Mikulec, Martin

    2014-05-01

    Various types of monitoring mechanism allow us to detect and monitor behavior of attackers in VoIP networks. Analysis of detected malicious traffic is crucial for further investigation and hardening the network. This analysis is typically based on statistical methods and the article brings a solution based on neural network. The proposed algorithm is used as a classifier of attacks in a distributed monitoring network of independent honeypot probes. Information about attacks on these honeypots is collected on a centralized server and then classified. This classification is based on different mechanisms. One of them is based on the multilayer perceptron neural network. The article describes inner structure of used neural network and also information about implementation of this network. The learning set for this neural network is based on real attack data collected from IP telephony honeypot called Dionaea. We prepare the learning set from real attack data after collecting, cleaning and aggregation of this information. After proper learning is the neural network capable to classify 6 types of most commonly used VoIP attacks. Using neural network classifier brings more accurate attack classification in a distributed system of honeypots. With this approach is possible to detect malicious behavior in a different part of networks, which are logically or geographically divided and use the information from one network to harden security in other networks. Centralized server for distributed set of nodes serves not only as a collector and classifier of attack data, but also as a mechanism for generating a precaution steps against attacks.

  17. Finite Energy and Bounded Attacks on Control System Sensor Signals

    SciTech Connect

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M; Laska, Jason A

    2014-01-01

    Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signal attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.

  18. Warped AdS3/dipole-CFT duality

    NASA Astrophysics Data System (ADS)

    Song, Wei; Strominger, Andrew

    2012-05-01

    String theory contains solutions with {{SL}}( {{2},{R}} ){{R}} × {{U}}{( {1} )_L} -invariant warped AdS3 (WAdS3) factors arising as continuous deformations of ordinary AdS3 factors. We propose that some of these are holographically dual to the IR limits of nonlocal dipole-deformed 2D D-brane gauge theories, referred to as "dipole CFTs". Neither the bulk nor boundary theories are currently well-understood, and consequences of the proposed duality for both sides is investigated. The bulk entropy-area law suggests that dipole CFTs have (at large N) a high-energy density of states which does not depend on the deformation parameter. Putting the boundary theory on a spatial circle leads to closed timelike curves in the bulk, suggesting a relation of the latter to dipole-type nonlocality.

  19. New boundary conditions for AdS3

    NASA Astrophysics Data System (ADS)

    Compère, Geoffrey; Song, Wei; Strominger, Andrew

    2013-05-01

    New chiral boundary conditions are found for quantum gravity with matter on AdS3. The associated asymptotic symmetry group is generated by a single right-moving U(1) Kac-Moody-Virasoro algebra with {c_R}={3ℓ}/2G . The Kac-Moody zero mode generates global left-moving translations and equals, for a BTZ black hole, the sum of the total mass and spin. The level is positive about the global vacuum and negative in the black hole sector, corresponding to ergosphere formation. Realizations arising in Chern-Simons gravity and string theory are analyzed. The new boundary conditions are shown to naturally arise for warped AdS3 in the limit that the warp parameter is taken to zero.

  20. Observing quantum gravity in asymptotically AdS space

    NASA Astrophysics Data System (ADS)

    Emelyanov, Slava

    2015-12-01

    The question is studied of whether an observer can discover quantum gravity in the semiclassical regime. It is shown that it is indeed possible to probe a certain quantum gravity effect by employing an appropriately designed detector. The effect is related to the possibility of having topologically inequivalent geometries in the path-integral approach at the same time. A conformal field theory (CFT) state which is expected to describe the eternal anti-de Sitter (AdS) black hole in the large-N limit is discussed. It is argued under certain assumptions that the black hole boundary should be merely a patch of the entire AdS boundary. This leads then to a conclusion that that CFT state is the ordinary CFT vacuum restricted to that patch. If existent, the bulk CFT operators can behave as the ordinary semiclassical quantum field theory in the large-N limit in the weak sense.

  1. Semiclassical Virasoro blocks from AdS3 gravity

    NASA Astrophysics Data System (ADS)

    Hijano, Eliot; Kraus, Per; Perlmutter, Eric; Snively, River

    2015-12-01

    We present a unified framework for the holographic computation of Virasoro conformal blocks at large central charge. In particular, we provide bulk constructions that correctly reproduce all semiclassical Virasoro blocks that are known explicitly from conformal field theory computations. The results revolve around the use of geodesic Witten diagrams, recently introduced in [1], evaluated in locally AdS3 geometries generated by backreaction of heavy operators. We also provide an alternative computation of the heavy-light semiclassical block — in which two external operators become parametrically heavy — as a certain scattering process involving higher spin gauge fields in AdS3; this approach highlights the chiral nature of Virasoro blocks. These techniques may be systematically extended to compute corrections to these blocks and to interpolate amongst the different semiclassical regimes.

  2. Alday-Maldacena Duality and AdS Plateau Problem

    NASA Astrophysics Data System (ADS)

    Morozov, A.

    A short summary of approximate approach to the study of minimal surfaces in AdS, based on solving Nambu-Goto equations iteratively. Today, after partial denunciation of the BDS conjecture, this looks like the only constructive approach to understanding the ways of its possible modification and thus to saving the Alday-Maldacena duality. Numerous open technical problems are explicitly formulated throughout the text.

  3. On information loss in AdS3/CFT2

    NASA Astrophysics Data System (ADS)

    Fitzpatrick, A. Liam; Kaplan, Jared; Li, Daliang; Wang, Junpu

    2016-05-01

    We discuss information loss from black hole physics in AdS3, focusing on two sharp signatures infecting CFT2 correlators at large central charge c: `forbidden singularities' arising from Euclidean-time periodicity due to the effective Hawking temperature, and late-time exponential decay in the Lorentzian region. We study an infinite class of examples where forbidden singularities can be resolved by non-perturbative effects at finite c, and we show that the resolution has certain universal features that also apply in the general case. Analytically continuing to the Lorentzian regime, we find that the non-perturbative effects that resolve forbidden singularities qualitatively change the behavior of correlators at times t ˜ S BH , the black hole entropy. This may resolve the exponential decay of correlators at late times in black hole backgrounds. By Borel resumming the 1 /c expansion of exact examples, we explicitly identify `information-restoring' effects from heavy states that should correspond to classical solutions in AdS3. Our results suggest a line of inquiry towards a more precise formulation of the gravitational path integral in AdS3.

  4. Supersymmetric giant graviton solutions in AdS3

    NASA Astrophysics Data System (ADS)

    Mandal, Gautam; Raju, Suvrat; Smedbäck, Mikael

    2008-02-01

    We parametrize all classical probe brane configurations that preserve four supersymmetries in (a) the extremal D1-D5 geometry, (b) the extremal D1-D5-P geometry, (c) the smooth D1-D5 solutions proposed by Lunin and Mathur, and (d) global AdS3×S3×T4/K3. These configurations consist of D1 branes, D5 branes, and bound states of D5 and D1 branes with the property that a particular Killing vector is tangent to the brane world volume at each point. We show that the supersymmetric sector of the D5-brane world volume theory may be analyzed in an effective 1+1 dimensional framework that places it on the same footing as D1 branes. In global AdS and the corresponding Lunin-Mathur solution, the solutions we describe are “bound” to the center of AdS for generic parameters and cannot escape to infinity. We show that these probes only exist on the submanifold of moduli space where the background BNS field and theta angle vanish. We quantize these probes in the near-horizon region of the extremal D1-D5 geometry and obtain the theory of long strings discussed by Seiberg and Witten.

  5. A Puzzle of Vestibular Physiology in a Meniere's Disease Acute Attack

    PubMed Central

    Martinez-Lopez, Marta; Manrique-Huarte, Raquel; Perez-Fernandez, Nicolas

    2015-01-01

    The aim of this paper is to present for the first time the functional evaluation of each of the vestibular receptors in the six semicircular canals in a patient diagnosed with Meniere's disease during an acute attack. A 54-year-old lady was diagnosed with left Meniere's disease who during her regular clinic review suffers an acute attack of vertigo, with fullness and an increase of tinnitus in her left ear. Spontaneous nystagmus and the results in the video head-impulse test (vHIT) are shown before, during, and after the attack. Nystagmus was initially left beating and a few minutes later an upbeat component was added. No skew deviation was observed. A decrease in the gain of the vestibuloocular reflex (VOR) and the presence of overt saccades were observed when the stimuli were in the plane of the left superior semicircular canal. At the end of the crisis nystagmus decreased and vestibuloocular reflex returned to almost normal. A review of the different possibilities to explain these findings points to a hypothetical utricular damage. PMID:26167320

  6. Bending AdS waves with new massive gravity

    NASA Astrophysics Data System (ADS)

    Ayón-Beato, Eloy; Giribet, Gaston; Hassaïne, Mokhtar

    2009-05-01

    We study AdS-waves in the three-dimensional new theory of massive gravity recently proposed by Bergshoeff, Hohm, and Townsend. The general configuration of this type is derived and shown to exhibit different branches, with different asymptotic behaviors. In particular, for the special fine tuning m2 = ±1/(2l2), solutions with logarithmic fall-off arise, while in the range m2 > -1/(2l2), spacetimes with Schrödinger isometry group are admitted as solutions. Spacetimes that are asymptotically AdS3, both for the Brown-Henneaux and for the weakened boundary conditions, are also identified. The metric function that characterizes the profile of the AdS-wave behaves as a massive excitation on the spacetime, with an effective mass given by meff2 = m2-1/(2l2). For the critical value m2 = -1/(2l2), the value of the effective mass precisely saturates the Breitenlohner-Freedman bound for the AdS3 space where the wave is propagating on. The analogies with the AdS-wave solutions of topologically massive gravity are also discussed. Besides, we consider the coupling of both massive deformations to Einstein gravity and find the exact configurations for the complete theory, discussing all the different branches exhaustively. One of the effects of introducing the Chern-Simons gravitational term is that of breaking the degeneracy in the effective mass of the generic modes of pure New Massive Gravity, producing a fine structure due to parity violation. Another effect is that the zoo of exact logarithmic specimens becomes considerably enlarged.

  7. ADS/CFT and QCD

    SciTech Connect

    Brodsky, Stanley J.; de Teramond, Guy F.; /Costa Rica U. /SLAC

    2007-02-21

    The AdS/CFT correspondence between string theory in AdS space and conformal .eld theories in physical spacetime leads to an analytic, semi-classical model for strongly-coupled QCD which has scale invariance and dimensional counting at short distances and color confinement at large distances. Although QCD is not conformally invariant, one can nevertheless use the mathematical representation of the conformal group in five-dimensional anti-de Sitter space to construct a first approximation to the theory. The AdS/CFT correspondence also provides insights into the inherently non-perturbative aspects of QCD, such as the orbital and radial spectra of hadrons and the form of hadronic wavefunctions. In particular, we show that there is an exact correspondence between the fifth-dimensional coordinate of AdS space z and a specific impact variable {zeta} which measures the separation of the quark and gluonic constituents within the hadron in ordinary space-time. This connection allows one to compute the analytic form of the frame-independent light-front wavefunctions, the fundamental entities which encode hadron properties and allow the computation of decay constants, form factors, and other exclusive scattering amplitudes. New relativistic lightfront equations in ordinary space-time are found which reproduce the results obtained using the 5-dimensional theory. The effective light-front equations possess remarkable algebraic structures and integrability properties. Since they are complete and orthonormal, the AdS/CFT model wavefunctions can also be used as a basis for the diagonalization of the full light-front QCD Hamiltonian, thus systematically improving the AdS/CFT approximation.

  8. Heart Attack or Sudden Cardiac Arrest: How Are They Different?

    MedlinePlus

    ... a person loses consciousness and has no pulse. Death occurs within minutes if the victim does not receive treatment. What is the link? These two distinct heart conditions are linked. Sudden cardiac arrest can occur after a heart attack, or during recovery. Heart attacks increase the risk ...

  9. Are Risk Assessments of a Terrorist Attack Coherent?

    ERIC Educational Resources Information Center

    Mandel, David R.

    2005-01-01

    Four experiments examined 3 types of violations of coherence criteria in risk assessments of a terrorist attack. First, the requirement that extensionally equivalent descriptions be assigned the same probability (i.e., additivity) was violated. Unpacking descriptions of an attack into subtypes led to an increase in assessed risk. Second,…

  10. New Attacks on Animal Researchers Provoke Anger and Worry

    ERIC Educational Resources Information Center

    Guterman, Lila

    2008-01-01

    This article reports on firebomb attacks at the homes of two animal researchers which have provoked anger and unease. The firebomb attacks, which set the home of a neuroscientist at the University of California at Santa Cruz aflame and destroyed a car parked in the driveway of another university researcher's home, have left researchers and…

  11. The Icatibant Outcome Survey: treatment of laryngeal angioedema attacks

    PubMed Central

    Aberer, Werner; Bouillet, Laurence; Caballero, Teresa; Maurer, Marcus; Fabien, Vincent; Zanichelli, Andrea

    2016-01-01

    Objective To characterize the management and outcomes of life-threatening laryngeal attacks of hereditary angioedema (HAE) treated with icatibant in the observational Icatibant Outcome Survey (NCT01034969) registry. Methods This retrospective analysis was based on data from patients with HAE type I/II who received healthcare professional-administered or self-administered icatibant to treat laryngeal attacks between September 2008 and May 2013. Results Twenty centers in seven countries contributed data. Overall, 42 patients with HAE experienced 67 icatibant-treated laryngeal attacks. Icatibant was self-administered for 62.3% of attacks (healthcare professional-administered, 37.7%). One icatibant injection was used for 87.9% of attacks, with rescue or concomitant medication used for 9.0%. The median time to treatment was 2.0 h (n=31 attacks) and the median time to resolution was 6.0 h (n=35 attacks). Conclusions This analysis describes successful use of icatibant for the treatment of laryngeal HAE attacks in a real-world setting. PMID:27116379

  12. Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment

    NASA Technical Reports Server (NTRS)

    Kebert, Alan; Barnejee, Bikramjit; Solano, Juan; Solano, Wanda

    2013-01-01

    The cloud computing environment offers malicious users the ability to spawn multiple instances of cloud nodes that are similar to virtual machines, except that they can have separate external IP addresses. In this paper we demonstrate how this ability can be exploited by an attacker to distribute his/her attack, in particular SQL injection attacks, in such a way that an intrusion detection system (IDS) could fail to identify this attack. To demonstrate this, we set up a small private cloud, established a vulnerable website in one instance, and placed an IDS within the cloud to monitor the network traffic. We found that an attacker could quite easily defeat the IDS by periodically altering its IP address. To detect such an attacker, we propose to use multi-agent plan recognition, where the multiple source IPs are considered as different agents who are mounting a collaborative attack. We show that such a formulation of this problem yields a more sophisticated approach to detecting SQL injection attacks within a cloud computing environment.

  13. Examining Willingness to Attack Critical Infrastructure Online and Offline

    ERIC Educational Resources Information Center

    Holt, Thomas J.; Kilger, Max

    2012-01-01

    The continuing adoption of technologies by the general public coupled with the expanding reliance of critical infrastructures connected through the Internet has created unique opportunities for attacks by civilians and nation-states alike. Although governments are increasingly focusing on policies to deter nation-state level attacks, it is unclear…

  14. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) LICENSES, CERTIFICATIONS, AND APPROVALS FOR NUCLEAR POWER PLANTS General Provisions § 52.10 Attacks and destructive acts. Neither an applicant for a license to manufacture, construct, and operate a...

  15. Sequential defense against random and intentional attacks in complex networks.

    PubMed

    Chen, Pin-Yu; Cheng, Shin-Ming

    2015-02-01

    Network robustness against attacks is one of the most fundamental researches in network science as it is closely associated with the reliability and functionality of various networking paradigms. However, despite the study on intrinsic topological vulnerabilities to node removals, little is known on the network robustness when network defense mechanisms are implemented, especially for networked engineering systems equipped with detection capabilities. In this paper, a sequential defense mechanism is first proposed in complex networks for attack inference and vulnerability assessment, where the data fusion center sequentially infers the presence of an attack based on the binary attack status reported from the nodes in the network. The network robustness is evaluated in terms of the ability to identify the attack prior to network disruption under two major attack schemes, i.e., random and intentional attacks. We provide a parametric plug-in model for performance evaluation on the proposed mechanism and validate its effectiveness and reliability via canonical complex network models and real-world large-scale network topology. The results show that the sequential defense mechanism greatly improves the network robustness and mitigates the possibility of network disruption by acquiring limited attack status information from a small subset of nodes in the network. PMID:25768550

  16. Sequential defense against random and intentional attacks in complex networks

    NASA Astrophysics Data System (ADS)

    Chen, Pin-Yu; Cheng, Shin-Ming

    2015-02-01

    Network robustness against attacks is one of the most fundamental researches in network science as it is closely associated with the reliability and functionality of various networking paradigms. However, despite the study on intrinsic topological vulnerabilities to node removals, little is known on the network robustness when network defense mechanisms are implemented, especially for networked engineering systems equipped with detection capabilities. In this paper, a sequential defense mechanism is first proposed in complex networks for attack inference and vulnerability assessment, where the data fusion center sequentially infers the presence of an attack based on the binary attack status reported from the nodes in the network. The network robustness is evaluated in terms of the ability to identify the attack prior to network disruption under two major attack schemes, i.e., random and intentional attacks. We provide a parametric plug-in model for performance evaluation on the proposed mechanism and validate its effectiveness and reliability via canonical complex network models and real-world large-scale network topology. The results show that the sequential defense mechanism greatly improves the network robustness and mitigates the possibility of network disruption by acquiring limited attack status information from a small subset of nodes in the network.

  17. Is There Anybody There? A Psychodynamic View of Panic Attack.

    ERIC Educational Resources Information Center

    Rizq, Rosemary

    2002-01-01

    Presents a process analysis of a psychodynamic intervention for a client with panic attacks. Discusses how a psychodynamic understanding of the complex etiology of the client's panic attacks that ultimately produced improved coping skills and a subjective sense of improvement for her. Process analysis is used to illustrate the theoretical base,…

  18. Israeli Adolescents' Coping Strategies in Relation to Terrorist Attacks

    ERIC Educational Resources Information Center

    Tatar, Moshe; Amram, Sima

    2007-01-01

    Exposure to terrorism seriously threatens the well-being of children and adolescents. Israeli citizens have witnessed massive ongoing terrorist attacks during the last few years. The present research, conducted among 330 Israeli adolescents, examined coping strategies in relation to terrorist attacks. We found that adolescents utilize more…

  19. [Banana tree pests attacking Heliconia latispatha Benth. (Heliconiaceae)].

    PubMed

    Watanabe, Maria A

    2007-01-01

    In mid-May 2005, the caterpillars Antichloris eriphia (Fabr.) (Lepidoptera: Arctiidae) and Calligo illioneus (Cramer) (Lepidoptera: Nymphalidae) which are banana tree pests, were found attacking six-month old stalks of Heliconia latispatha Benth., planted near a banana tree plantation in Jaguariuna, SP, Brazil. The attack by C. illioneus is observed by the first time in Brazil. PMID:17607468

  20. Effectiveness of the Call in Beach Volleyball Attacking Play

    PubMed Central

    Künzell, Stefan; Schweikart, Florian; Köhn, Daniel; Schläppi-Lienhard, Olivia

    2014-01-01

    In beach volleyball the setter has the opportunity to give her or his hitter a “call”. The call intends that the setter suggests to her or his partner where to place the attack in the opponent’s court. The effectiveness of a call is still unknown. We investigated the women’s and men’s Swiss National Beach Volleyball Championships in 2011 and analyzed 2185 attacks. We found large differences between female and male players. While men called in only 38.4% of attacks, women used calls in 85.5% of attacks. If the male players followed a given call, 63% of the attacks were successful. The success rate of attacks without any call was 55.8% and 47.6% when the call was ignored. These differences were not significant (χ2(2) = 4.55, p = 0.103). In women’s beach volleyball, the rate of successful attacks was 61.5% when a call was followed, 35% for attacks without a call, and 42.6% when a call was ignored. The differences were highly significant (χ2(2) = 23.42, p < 0.0005). Taking into account the findings of the present study, we suggested that the call was effective in women’s beach volleyball, while its effect in men’s game was unclear. Considering the quality of calls we indicate that there is a significant potential to increase the effectiveness of a call. PMID:25713679

  1. Effectiveness of the call in beach volleyball attacking play.

    PubMed

    Künzell, Stefan; Schweikart, Florian; Köhn, Daniel; Schläppi-Lienhard, Olivia

    2014-12-01

    In beach volleyball the setter has the opportunity to give her or his hitter a "call". The call intends that the setter suggests to her or his partner where to place the attack in the opponent's court. The effectiveness of a call is still unknown. We investigated the women's and men's Swiss National Beach Volleyball Championships in 2011 and analyzed 2185 attacks. We found large differences between female and male players. While men called in only 38.4% of attacks, women used calls in 85.5% of attacks. If the male players followed a given call, 63% of the attacks were successful. The success rate of attacks without any call was 55.8% and 47.6% when the call was ignored. These differences were not significant (χ(2)(2) = 4.55, p = 0.103). In women's beach volleyball, the rate of successful attacks was 61.5% when a call was followed, 35% for attacks without a call, and 42.6% when a call was ignored. The differences were highly significant (χ(2)(2) = 23.42, p < 0.0005). Taking into account the findings of the present study, we suggested that the call was effective in women's beach volleyball, while its effect in men's game was unclear. Considering the quality of calls we indicate that there is a significant potential to increase the effectiveness of a call. PMID:25713679

  2. "Dateline NBC"'s Persuasive Attack on Wal-Mart.

    ERIC Educational Resources Information Center

    Benoit, William L.; Dorries, Bruce

    1996-01-01

    Develops a typology of persuasive attack strategies. Identifies two key components of persuasive attack: responsibility and offensiveness. Describes several strategies for intensifying each of these elements. Applies this analysis to "Dateline NBC"'s allegations that Wal-Mart's "Buy American" campaign was deceptive. Concludes that "Dateline NBC'"s…

  3. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) LICENSES, CERTIFICATIONS, AND APPROVALS FOR NUCLEAR POWER PLANTS General Provisions § 52.10 Attacks and destructive acts. Neither an applicant for a license to...

  4. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) LICENSES, CERTIFICATIONS, AND APPROVALS FOR NUCLEAR POWER PLANTS General Provisions § 52.10 Attacks and destructive acts. Neither an applicant for a license to...

  5. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) LICENSES, CERTIFICATIONS, AND APPROVALS FOR NUCLEAR POWER PLANTS General Provisions § 52.10 Attacks and destructive acts. Neither an applicant for a license to...

  6. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) LICENSES, CERTIFICATIONS, AND APPROVALS FOR NUCLEAR POWER PLANTS General Provisions § 52.10 Attacks and destructive acts. Neither an applicant for a license to...

  7. Hereditary Angioedema Attacks: Local Swelling at Multiple Sites.

    PubMed

    Hofman, Zonne L M; Relan, Anurag; Hack, C Erik

    2016-02-01

    Hereditary angioedema (HAE) patients experience recurrent local swelling in various parts of the body including painful swelling of the intestine and life-threatening laryngeal oedema. Most HAE literature is about attacks located in one anatomical site, though it is mentioned that HAE attacks may also involve multiple anatomical sites simultaneously. A detailed description of such multi-location attacks is currently lacking. This study investigated the occurrence, severity and clinical course of HAE attacks with multiple anatomical locations. HAE patients included in a clinical database of recombinant human C1-inhibitor (rhC1INH) studies were evaluated. Visual analog scale scores filled out by the patients for various symptoms at various locations and investigator symptoms scores during the attack were analysed. Data of 219 eligible attacks in 119 patients was analysed. Thirty-three patients (28%) had symptoms at multiple locations in anatomically unrelated regions at the same time during their first attack. Up to five simultaneously affected locations were reported. The observation that severe HAE attacks often affect multiple sites in the body suggests that HAE symptoms result from a systemic rather than from a local process as is currently believed. PMID:25527240

  8. Studies on sulfate attack: Mechanisms, test methods, and modeling

    NASA Astrophysics Data System (ADS)

    Santhanam, Manu

    The objective of this research study was to investigate various issues pertaining to the mechanism, testing methods, and modeling of sulfate attack in concrete. The study was divided into the following segments: (1) effect of gypsum formation on the expansion of mortars, (2) attack by the magnesium ion, (3) sulfate attack in the presence of chloride ions---differentiating seawater and groundwater attack, (4) use of admixtures to mitigate sulfate attack---entrained air, sodium citrate, silica fume, and metakaolin, (5) effects of temperature and concentration of the attack solution, (6) development of new test methods using concrete specimens, and (7) modeling of the sulfate attack phenomenon. Mortar specimens using portland cement (PC) and tricalcium silicate (C 3S), with or without mineral admixtures, were prepared and immersed in different sulfate solutions. In addition to this, portland cement concrete specimens were also prepared and subjected to complete and partial immersion in sulfate solutions. Physical measurements, chemical analyses and microstructural studies were performed periodically on the specimens. Gypsum formation was seen to cause expansion of the C3S mortar specimens. Statistical analyses of the data also indicated that the quantity of gypsum was the most significant factor controlling the expansion of mortar bars. The attack by magnesium ion was found to drive the reaction towards the formation of brucite. Decalcification of the C-S-H and its subsequent conversion to the non-cementitious M-S-H was identified as the mechanism of destruction in magnesium sulfate attack. Mineral admixtures were beneficial in combating sodium sulfate attack, while reducing the resistance to magnesium sulfate attack. Air entrainment did not change the measured physical properties, but reduced the visible distress of the mortars. Sodium citrate caused a substantial reduction in the rate of damage of the mortars due to its retarding effect. Temperature and

  9. Optimal attack strategy of complex networks based on tabu search

    NASA Astrophysics Data System (ADS)

    Deng, Ye; Wu, Jun; Tan, Yue-jin

    2016-01-01

    The problem of network disintegration has broad applications and recently has received growing attention, such as network confrontation and disintegration of harmful networks. This paper presents an optimized attack strategy model for complex networks and introduces the tabu search into the network disintegration problem to identify the optimal attack strategy, which is a heuristic optimization algorithm and rarely applied to the study of network robustness. The efficiency of the proposed solution was verified by comparing it with other attack strategies used in various model networks and real-world network. Numerical experiments suggest that our solution can improve the effect of network disintegration and that the "best" choice for node failure attacks can be identified through global searches. Our understanding of the optimal attack strategy may also shed light on a new property of the nodes within network disintegration and deserves additional study.

  10. The Application of Baum-Welch Algorithm in Multistep Attack

    PubMed Central

    Zhang, Yanxue; Zhao, Dongmei; Liu, Jinxing

    2014-01-01

    The biggest difficulty of hidden Markov model applied to multistep attack is the determination of observations. Now the research of the determination of observations is still lacking, and it shows a certain degree of subjectivity. In this regard, we integrate the attack intentions and hidden Markov model (HMM) and support a method to forecasting multistep attack based on hidden Markov model. Firstly, we train the existing hidden Markov model(s) by the Baum-Welch algorithm of HMM. Then we recognize the alert belonging to attack scenarios with the Forward algorithm of HMM. Finally, we forecast the next possible attack sequence with the Viterbi algorithm of HMM. The results of simulation experiments show that the hidden Markov models which have been trained are better than the untrained in recognition and prediction. PMID:24991642

  11. Simulated predator attacks on flocks: a comparison of tactics.

    PubMed

    Demšar, Jure; Lebar Bajec, Iztok

    2014-01-01

    It is not exactly known why birds aggregate in coordinated flocks. The most common hypothesis proposes that the reason is protection from predators. Most of the currently developed examples of individual-based predator-prey models assume predators are attracted to the center of a highly coordinated flock. This proposed attraction of a predator to a flock would appear to be contradictory to an alternate hypothesis that flocks evolved as a protection against predation. In an attempt to resolve this apparent conflict, in this article we use a fuzzy individual-based model to study three attack tactics (attack center, attack nearest, attack isolated) and analyze the success of predation on two types of prey (social and individualistic). Our simulations revealed that social flocking (as opposed to individualistic behavior) is the optimal anti-predatory response to predators attacking mainly isolated individuals. PMID:24730766

  12. DDoS Attack Detection Algorithms Based on Entropy Computing

    NASA Astrophysics Data System (ADS)

    Li, Liying; Zhou, Jianying; Xiao, Ning

    Distributed Denial of Service (DDoS) attack poses a severe threat to the Internet. It is difficult to find the exact signature of attacking. Moreover, it is hard to distinguish the difference of an unusual high volume of traffic which is caused by the attack or occurs when a huge number of users occasionally access the target machine at the same time. The entropy detection method is an effective method to detect the DDoS attack. It is mainly used to calculate the distribution randomness of some attributes in the network packets' headers. In this paper, we focus on the detection technology of DDoS attack. We improve the previous entropy detection algorithm, and propose two enhanced detection methods based on cumulative entropy and time, respectively. Experiment results show that these methods could lead to more accurate and effective DDoS detection.

  13. A Taxonomy of Attacks on the DNP3 Protocol

    NASA Astrophysics Data System (ADS)

    East, Samuel; Butts, Jonathan; Papa, Mauricio; Shenoi, Sujeet

    Distributed Network Protocol (DNP3) is the predominant SCADA protocol in the energy sector - more than 75% of North American electric utilities currently use DNP3 for industrial control applications. This paper presents a taxonomy of attacks on the protocol. The attacks are classified based on targets (control center, outstation devices and network/communication paths) and threat categories (interception, interruption, modification and fabrication). To facilitate risk analysis and mitigation strategies, the attacks are associated with the specific DNP3 protocol layers they exploit. Also, the operational impact of the attacks is categorized in terms of three key SCADA objectives: process confi- dentiality, process awareness and process control. The attack taxonomy clarifies the nature and scope of the threats to DNP3 systems, and can provide insights into the relative costs and benefits of implementing mitigation strategies.

  14. Attacks on Bluetooth Security Architecture and Its Countermeasures

    NASA Astrophysics Data System (ADS)

    Iqbal, Mian Muhammad Waseem; Kausar, Firdous; Wahla, Muhammad Arif

    WPANs compliment the traditional IEEE 802.11 wireless networks by facilitating the clients with flexibility in network topologies, higher mobility and relaxed configuration/hardware requirements. Bluetooth, a WPAN technology, is an open standard for short-range radio frequency (RF) communication. However, it is also susceptible to typical security threats found in wireless LANs. This paper discuses some of the attack scenarios against the bluetooth network such as hostile intrusion, active Man-in-the-Middle (MITM) attack using unit key and various forms of denial of service (DoS) attacks. These threats and attacks compromise the confidentiality and availability of bluetooth data and services. This paper proposes an improved security architecture for bluetooth device which provides protection against the above mentioned attacks.

  15. Expected losses, insurability, and benefits from reducing vulnerability to attacks.

    SciTech Connect

    Nozick, Linda Karen; Carlson, Rolf Erik; Turnquist, Mark Alan

    2004-03-01

    A model of malicious attacks against an infrastructure system is developed that uses a network representation of the system structure together with a Hidden Markov Model of an attack at a node of that system and a Markov Decision Process model of attacker strategy across the system as a whole. We use information systems as an illustration, but the analytic structure developed can also apply to attacks against physical facilities or other systems that provide services to customers. This structure provides an explicit mechanism to evaluate expected losses from malicious attacks, and to evaluate changes in those losses that would result from system hardening. Thus, we provide a basis for evaluating the benefits of system hardening. The model also allows investigation of the potential for the purchase of an insurance contract to cover the potential losses when safeguards are breached and the system fails.

  16. Ultraviolet asymptotics and singular dynamics of AdS perturbations

    NASA Astrophysics Data System (ADS)

    Craps, Ben; Evnin, Oleg; Vanhoof, Joris

    2015-10-01

    Important insights into the dynamics of spherically symmetric AdS-scalar field perturbations can be obtained by considering a simplified time-averaged theory accurately describing perturbations of amplitude ɛ on time-scales of order 1/ ɛ 2. The coefficients of the time-averaged equations are complicated expressions in terms of the AdS scalar field mode functions, which are in turn related to the Jacobi polynomials. We analyze the behavior of these coefficients for high frequency modes. The resulting asymptotics can be useful for understanding the properties of the finite-time singularity in solutions of the time-averaged theory recently reported in the literature. We highlight, in particular, the gauge dependence of this asymptotics, with respect to the two most commonly used gauges. The harsher growth of the coefficients at large frequencies in higher-dimensional AdS suggests strengthening of turbulent instabilities in higher dimensions. In the course of our derivations, we arrive at recursive relations for the coefficients of the time-averaged theory that are likely to be useful for evaluating them more efficiently in numerical simulations.

  17. Secure Adaptive Topology Control for Wireless Ad-Hoc Sensor Networks

    PubMed Central

    Hsueh, Ching-Tsung; Li, Yu-Wei; Wen, Chih-Yu; Ouyang, Yen-Chieh

    2010-01-01

    This paper presents a secure decentralized clustering algorithm for wireless ad-hoc sensor networks. The algorithm operates without a centralized controller, operates asynchronously, and does not require that the location of the sensors be known a priori. Based on the cluster-based topology, secure hierarchical communication protocols and dynamic quarantine strategies are introduced to defend against spam attacks, since this type of attacks can exhaust the energy of sensor nodes and will shorten the lifetime of a sensor network drastically. By adjusting the threshold of infected percentage of the cluster coverage, our scheme can dynamically coordinate the proportion of the quarantine region and adaptively achieve the cluster control and the neighborhood control of attacks. Simulation results show that the proposed approach is feasible and cost effective for wireless sensor networks. PMID:22205866

  18. Prodromes and predictors of migraine attack.

    PubMed

    Rossi, Paolo; Ambrosini, Anna; Buzzi, M Gabriella

    2005-01-01

    Premonitory symptoms of migraine include a wide and heterogeneous collection of cognitive, psychic and physical changes preceding and forewarning of an attack by a few hours to 2-3 days. To date, premonitory symptoms have received little attention in the literature, being treated more as a curiosity than as a primary feature of migraine. This paper provides an extensive critical review of this neglected area of migraine research in the light of the recent advances in our understanding of the pathogenetic mechanisms of migraine. Epidemiological and clinical studies that have investigated the premonitory symptoms of migraine lack scientific rigour, producing conflicting results, whilst genetic and pathophysiological investigations are still in their very early stages. There is evidence supporting the idea that premonitory symptoms could be used as a phenotypical marker to identify subgroups of migraineurs which could show correlations with specific clinical expressions of the disease, genotypes, or responses to treatments. Future studies are needed to clarify the clinical, pathophysiological and therapeutic significance of premonitory symptoms. PMID:16483459

  19. Marine transducing bacteriophage attacking a luminous bacterium.

    PubMed

    Keynan, A; Nealson, K; Sideropoulos, H; Hastings, J W

    1974-08-01

    The isolation and partial characterization of a marine bacteriophage attacking a strain of luminous bacteria is described, including some physical, biological, and genetic properties. It is a DNA phage of density of 1.52 with a long flexible tail and an apparently icosohedral head. With respect to stability in suspension, it has a rather specific requirement for the sodium ion in high concentration; it is further stabilized by the addition of calcium and magnesium ions. These same ions are likewise all required for both good plating efficiency and plaque uniformity. Although it goes through a typical lytic growth cycle (about 45 min), with a burst size of 100, and no stable lysogens have been isolated, it is nevertheless a transducing phage specifically for the tryptophan region, transducing several, but not all, independently isolated Trp(-) auxotrophs to protrophy. No other auxotrophs of a variety of amino acids were transduced by this phage to prototrophy. Phage infection does not change the normal expression of the luminescent system, and light remains at near normal levels until cell lysis occurs. PMID:16789143

  20. Pirate attacks affect Indian Ocean climate research

    NASA Astrophysics Data System (ADS)

    Smith, Shawn R.; Bourassa, Mark A.; Long, Michael

    2011-07-01

    Pirate attacks in the Gulf of Aden and the Indian Ocean off the coast of Somalia nearly doubled from 111 in 2008 to 217 in 2009 [International Maritime Bureau, 2009, International Maritime Bureau, 2010]. Consequently, merchant vessel traffic in the area around Somalia significantly decreased. Many of these merchant vessels carry instruments that record wind and other weather conditions near the ocean surface, and alterations in ship tracks have resulted in a hole sized at about 2.5 million square kilometers in the marine weather-observing network off the coast of Somalia. The data void exists in the formation region of the Somali low-level jet, a wind pattern that is one of the main drivers of the Indian summer monsoon. Further, a stable, multidecadal record has been interrupted, and consequently, long-term analyses of the jet derived from surface wind data are now showing artificial anomalies that will affect efforts by scientists to identify interannual to decadal variations in the climate of the northwestern Indian Ocean.

  1. Node Survival in Networks under Correlated Attacks

    PubMed Central

    Hao, Yan; Armbruster, Dieter; Hütt, Marc-Thorsten

    2015-01-01

    We study the interplay between correlations, dynamics, and networks for repeated attacks on a socio-economic network. As a model system we consider an insurance scheme against disasters that randomly hit nodes, where a node in need receives support from its network neighbors. The model is motivated by gift giving among the Maasai called Osotua. Survival of nodes under different disaster scenarios (uncorrelated, spatially, temporally and spatio-temporally correlated) and for different network architectures are studied with agent-based numerical simulations. We find that the survival rate of a node depends dramatically on the type of correlation of the disasters: Spatially and spatio-temporally correlated disasters increase the survival rate; purely temporally correlated disasters decrease it. The type of correlation also leads to strong inequality among the surviving nodes. We introduce the concept of disaster masking to explain some of the results of our simulations. We also analyze the subsets of the networks that were activated to provide support after fifty years of random disasters. They show qualitative differences for the different disaster scenarios measured by path length, degree, clustering coefficient, and number of cycles. PMID:25932635

  2. Node Survival in Networks under Correlated Attacks.

    PubMed

    Hao, Yan; Armbruster, Dieter; Hütt, Marc-Thorsten

    2015-01-01

    We study the interplay between correlations, dynamics, and networks for repeated attacks on a socio-economic network. As a model system we consider an insurance scheme against disasters that randomly hit nodes, where a node in need receives support from its network neighbors. The model is motivated by gift giving among the Maasai called Osotua. Survival of nodes under different disaster scenarios (uncorrelated, spatially, temporally and spatio-temporally correlated) and for different network architectures are studied with agent-based numerical simulations. We find that the survival rate of a node depends dramatically on the type of correlation of the disasters: Spatially and spatio-temporally correlated disasters increase the survival rate; purely temporally correlated disasters decrease it. The type of correlation also leads to strong inequality among the surviving nodes. We introduce the concept of disaster masking to explain some of the results of our simulations. We also analyze the subsets of the networks that were activated to provide support after fifty years of random disasters. They show qualitative differences for the different disaster scenarios measured by path length, degree, clustering coefficient, and number of cycles. PMID:25932635

  3. Assessment and treatment of nocturnal panic attacks.

    PubMed

    Craske, Michelle G; Tsao, Jennie C I

    2005-06-01

    Nocturnal panic (NP), waking from sleep in a state of panic, is a common occurrence among patients with panic disorder, with 44-71% reporting at least one such attack. NP is a non-REM event that is distinct from sleep terrors, sleep apnea, nightmares or dream-induced arousals. This review outlines recent advances in the characterization of NP, as well as current approaches to the assessment and treatment of NP. In contrast to earlier work, more recent studies suggest that patients with NP do not differ from patients without NP on sleep architecture, sleep physiology, self-reported sleep quality and severity of panic disorder. However, more precise measurement of physiological precipitants and features is warranted. Assessment of NP focuses on ruling out other explanations for NP, with differential diagnosis based on interviews, sleep polysomnography and ambulatory recording of sleep. Psychological treatment (cognitive-behavioral therapy) targets misappraisals of anxiety sensations, hyperventilatory response, and conditioned reactions to internal, physical cues. Recent evidence supports the efficacy of this approach, however, controlled studies on pharmacological agents in the treatment of NP are lacking. Research is needed to examine the effects of combined cognitive-behavioral therapy and medications, compared to medication alone in the treatment of NP. PMID:15893248

  4. Metrics for Assessment of Smart Grid Data Integrity Attacks

    SciTech Connect

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  5. Pre-Attack Symptomatology and Temperament as Predictors of Children's Responses to the September 11 Terrorist Attacks

    ERIC Educational Resources Information Center

    Lengua, Liliana J.; Long, Anna C.; Smith, Kimberlee I.; Meltzoff, Andrew N.

    2005-01-01

    Background: The aims of this study were to assess the psychological response of children following the September 11, 2001 terrorist attacks in New York and Washington, DC and to examine prospective predictors of children's post-attack responses. Method: Children's responses were assessed in a community sample of children in Seattle, Washington,…

  6. New Features in ADS Labs

    NASA Astrophysics Data System (ADS)

    Accomazzi, Alberto; Kurtz, M. J.; Henneken, E. A.; Grant, C. S.; Thompson, D.; Di Milia, G.; Luker, J.; Murray, S. S.

    2013-01-01

    The NASA Astrophysics Data System (ADS) has been working hard on updating its services and interfaces to better support our community's research needs. ADS Labs is a new interface built on the old tried-and-true ADS Abstract Databases, so all of ADS's content is available through it. In this presentation we highlight the new features that have been developed in ADS Labs over the last year: new recommendations, metrics, a citation tool and enhanced fulltext search. ADS Labs has long been providing article-level recommendations based on keyword similarity, co-readership and co-citation analysis of its corpus. We have now introduced personal recommendations, which provide a list of articles to be considered based on a individual user's readership history. A new metrics interface provides a summary of the basic impact indicators for a list of records. These include the total and normalized number of papers, citations, reads, and downloads. Also included are some of the popular indices such as the h, g and i10 index. The citation helper tool allows one to submit a set of records and obtain a list of top 10 papers which cite and/or are cited by papers in the original list (but which are not in it). The process closely resembles the network approach of establishing "friends of friends" via an analysis of the citation network. The full-text search service now covers more than 2.5 million documents, including all the major astronomy journals, as well as physics journals published by Springer, Elsevier, the American Physical Society, the American Geophysical Union, and all of the arXiv eprints. The full-text search interface interface allows users and librarians to dig deep and find words or phrases in the body of the indexed articles. ADS Labs is available at http://adslabs.org

  7. StirMark Benchmark: audio watermarking attacks based on lossy compression

    NASA Astrophysics Data System (ADS)

    Steinebach, Martin; Lang, Andreas; Dittmann, Jana

    2002-04-01

    StirMark Benchmark is a well-known evaluation tool for watermarking robustness. Additional attacks are added to it continuously. To enable application based evaluation, in our paper we address attacks against audio watermarks based on lossy audio compression algorithms to be included in the test environment. We discuss the effect of different lossy compression algorithms like MPEG-2 audio Layer 3, Ogg or VQF on a selection of audio test data. Our focus is on changes regarding the basic characteristics of the audio data like spectrum or average power and on removal of embedded watermarks. Furthermore we compare results of different watermarking algorithms and show that lossy compression is still a challenge for most of them. There are two strategies for adding evaluation of robustness against lossy compression to StirMark Benchmark: (a) use of existing free compression algorithms (b) implementation of a generic lossy compression simulation. We discuss how such a model can be implemented based on the results of our tests. This method is less complex, as no real psycho acoustic model has to be applied. Our model can be used for audio watermarking evaluation of numerous application fields. As an example, we describe its importance for e-commerce applications with watermarking security.

  8. The AdS central charge in string theory

    NASA Astrophysics Data System (ADS)

    Troost, Jan

    2011-11-01

    We evaluate the vacuum expectation value of the central charge operator in string theory in an AdS3 vacuum. Our calculation provides a rare non-zero one-point function on a spherical worldsheet. The evaluation involves the regularization both of a worldsheet ultraviolet divergence (associated to the infinite volume of the conformal Killing group), and a space-time infrared divergence (corresponding to the infinite volume of space-time). The two divergences conspire to give a finite result, which is the classical general relativity value for the central charge, corrected in bosonic string theory by an infinite series of tree level higher derivative terms.

  9. Small black holes in global AdS spacetime

    NASA Astrophysics Data System (ADS)

    Jokela, Niko; Pönni, Arttu; Vuorinen, Aleksi

    2016-04-01

    We study the properties of two-point functions and quasinormal modes in a strongly coupled field theory holographically dual to a small black hole in global anti-de Sitter spacetime. Our results are seen to smoothly interpolate between known limits corresponding to large black holes and thermal AdS space, demonstrating that the Son-Starinets prescription works even when there is no black hole in the spacetime. Omitting issues related to the internal space, the results can be given a field theory interpretation in terms of the microcanonical ensemble, which provides access to energy densities forbidden in the canonical description.

  10. Entanglement entropy and duality in AdS4

    NASA Astrophysics Data System (ADS)

    Bakas, Ioannis; Pastras, Georgios

    2015-07-01

    Small variations of the entanglement entropy δS and the expectation value of the modular Hamiltonian δE are computed holographically for circular entangling curves in the boundary of AdS4, using gravitational perturbations with general boundary conditions in spherical coordinates. Agreement with the first law of thermodynamics, δS = δE, requires that the line element of the entangling curve remains constant. In this context, we also find a manifestation of electric-magnetic duality for the entanglement entropy and the corresponding modular Hamiltonian, following from the holographic energy-momentum/Cotton tensor duality.

  11. Fake gaps in AdS3/CFT2

    NASA Astrophysics Data System (ADS)

    Belin, Alexandre; Castro, Alejandra; Hung, Ling-Yan

    2015-11-01

    We discuss properties of interpolating geometries in three dimensional gravity in the presence of a chiral anomaly. This anomaly, which introduces an unbalance between left and right central charges, is protected under RG flows. For this simple reason it is impossible to gap a system with such an anomaly. Our goal is to discuss how holography captures this basic and robust feature. We demonstrate the absence of a mass gap by analysing the linearized spectrum and holographic entanglement entropy of these backgrounds in the context of AdS3/CFT2.

  12. Pure Spinors in AdS and Lie Algebra Cohomology

    NASA Astrophysics Data System (ADS)

    Mikhailov, Andrei

    2014-10-01

    We show that the BRST cohomology of the massless sector of the Type IIB superstring on AdS5 × S 5 can be described as the relative cohomology of an infinite-dimensional Lie superalgebra. We explain how the vertex operators of ghost number 1, which correspond to conserved currents, are described in this language. We also give some algebraic description of the ghost number 2 vertices, which appears to be new. We use this algebraic description to clarify the structure of the zero mode sector of the ghost number two states in flat space, and initiate the study of the vertices of the higher ghost number.

  13. Internal structure of charged AdS black holes

    NASA Astrophysics Data System (ADS)

    Bhattacharjee, Srijit; Sarkar, Sudipta; Virmani, Amitabh

    2016-06-01

    When an electrically charged black hole is perturbed, its inner horizon becomes a singularity, often referred to as the Poisson-Israel mass inflation singularity. Ori constructed a model of this phenomenon for asymptotically flat black holes, in which the metric can be determined explicitly in the mass inflation region. In this paper we implement the Ori model for charged AdS black holes. We find that the mass function inflates faster than the flat space case as the inner horizon is approached. Nevertheless, the mass inflation singularity is still a weak singularity: Although spacetime curvature becomes infinite, tidal distortions remain finite on physical objects attempting to cross it.

  14. Predator versus Prey: Locust Looming-Detector Neuron and Behavioural Responses to Stimuli Representing Attacking Bird Predators

    PubMed Central

    Santer, Roger D.; Rind, F. Claire; Simmons, Peter J.

    2012-01-01

    Many arthropods possess escape-triggering neural mechanisms that help them evade predators. These mechanisms are important neuroethological models, but they are rarely investigated using predator-like stimuli because there is often insufficient information on real predator attacks. Locusts possess uniquely identifiable visual neurons (the descending contralateral movement detectors, DCMDs) that are well-studied looming motion detectors. The DCMDs trigger ‘glides’ in flying locusts, which are hypothesised to be appropriate last-ditch responses to the looms of avian predators. To date it has not been possible to study glides in response to stimuli simulating bird attacks because such attacks have not been characterised. We analyse video of wild black kites attacking flying locusts, and estimate kite attack speeds of 10.8±1.4 m/s. We estimate that the loom of a kite’s thorax towards a locust at these speeds should be characterised by a relatively low ratio of half size to speed (l/|v|) in the range 4–17 ms. Peak DCMD spike rate and gliding response occurrence are known to increase as l/|v| decreases for simple looming shapes. Using simulated looming discs, we investigate these trends and show that both DCMD and behavioural responses are strong to stimuli with kite-like l/|v| ratios. Adding wings to looming discs to produce a more realistic stimulus shape did not disrupt the overall relationships of DCMD and gliding occurrence to stimulus l/|v|. However, adding wings to looming discs did slightly reduce high frequency DCMD spike rates in the final stages of object approach, and slightly delay glide initiation. Looming discs with or without wings triggered glides closer to the time of collision as l/|v| declined, and relatively infrequently before collision at very low l/|v|. However, the performance of this system is in line with expectations for a last-ditch escape response. PMID:23209660

  15. Introducing ADS 2.0

    NASA Astrophysics Data System (ADS)

    Accomazzi, Alberto; Kurtz, M. J.; Henneken, E. A.; Grant, C. S.; Thompson, D.; Luker, J.; Chyla, R.; Murray, S. S.

    2014-01-01

    In the spring of 1993, the Smithsonian/NASA Astrophysics Data System (ADS) first launched its bibliographic search system. It was known then as the ADS Abstract Service, a component of the larger Astrophysics Data System effort which had developed an interoperable data system now seen as a precursor of the Virtual Observatory. As a result of the massive technological and sociological changes in the field of scholarly communication, the ADS is now completing the most ambitious technological upgrade in its twenty-year history. Code-named ADS 2.0, the new system features: an IT platform built on web and digital library standards; a new, extensible, industrial strength search engine; a public API with various access control capabilities; a set of applications supporting search, export, visualization, analysis; a collaborative, open source development model; and enhanced indexing of content which includes the full-text of astronomy and physics publications. The changes in the ADS platform affect all aspects of the system and its operations, including: the process through which data and metadata are harvested, curated and indexed; the interface and paradigm used for searching the database; and the follow-up analysis capabilities available to the users. This poster describes the choices behind the technical overhaul of the system, the technology stack used, and the opportunities which the upgrade is providing us with, namely gains in productivity and enhancements in our system capabilities.

  16. Transient ischemic attack as a medical emergency.

    PubMed

    Okada, Yasushi

    2014-01-01

    Since transient ischemic attack (TIA) is regarded as a medical emergency with high risk for early stroke recurrence, the underlying mechanisms should be immediately clarified to conclude a definitive diagnosis and provide early treatment. Early risk stratification using ABCD(2) scores can predict the risk of ischemic stroke occurring after TIA. Carotid ultrasonography (US) can evaluate the degree of stenosis, plaque properties and flow velocity of ICA lesions. High-risk mobile plaques can be classified by carotid US, and aortogenic sources of emboli can be detected by transesophageal echocardiography. Cardiac monitoring and blood findings are thought to play a key role in a diagnosis of cardioembolic TIA. Diffusion-weighted imaging (DWI)-MRI and MR angiography are also indispensable to understand the mechanism of TIA and cerebral circulation. To prevent subsequent stroke arising from TIA, antiplatelet and anticoagulant therapies should be started immediately along with comprehensive management of life-style, hypertension, diabetes mellitus, dyslipidemia and other atherosclerotic diseases. Carotid endarterectomy and endovascular intervention are critical for treating symptomatic patients with significant stenosis of ICA. A novel concept of acute cerebrovascular syndrome (ACVS) has recently been advocated to increase awareness of TIA among citizens, patients and medical professionals. TIA should be recognized as the last opportunity to avoid irreversible ischemic stroke and its sequelae. The clinical relevance of the new concept of ACVS is advocated by early recurrence after TIA, analysis of high-risk TIA, treatment strategies and the optimal management of TIA. Raising TIA awareness should also proceed across many population sectors. PMID:24157554

  17. Critical gravity on AdS2 spacetimes

    NASA Astrophysics Data System (ADS)

    Myung, Yun Soo; Kim, Yong-Wan; Park, Young-Jai

    2011-09-01

    We study the critical gravity in two-dimensional anti-de Sitter (AdS2) spacetimes, which was obtained from the cosmological topologically massive gravity (TMGΛ) in three dimensions by using the Kaluza-Klein dimensional reduction. We perform the perturbation analysis around AdS2, which may correspond to the near-horizon geometry of the extremal Banados, Teitelboim, and Zanelli (BTZ) black hole obtained from the TMGΛ with identification upon uplifting three dimensions. A massive propagating scalar mode δF satisfies the second-order differential equation away from the critical point of K=l, whose solution is given by the Bessel functions. On the other hand, δF satisfies the fourth-order equation at the critical point. We exactly solve the fourth-order equation, and compare it with the log gravity in two dimensions. Consequently, the critical gravity in two dimensions could not be described by a massless scalar δFml and its logarithmic partner δFlog⁡4th.

  18. Conserved charges in timelike warped AdS3 spaces

    NASA Astrophysics Data System (ADS)

    Donnay, L.; Fernández-Melgarejo, J. J.; Giribet, G.; Goya, A.; Lavia, E.

    2015-06-01

    We consider the timelike version of warped anti-de Sitter space (WAdS), which corresponds to the three-dimensional section of the Gödel solution of four-dimensional cosmological Einstein equations. This geometry presents closed timelike curves (CTCs), which are inherited from its four-dimensional embedding. In three dimensions, this type of solution can be supported without matter provided the graviton acquires mass. Here, among the different ways to consistently give mass to the graviton in three dimensions, we consider the parity-even model known as new massive gravity (NMG). In the bulk of timelike WAdS3 space, we introduce defects that, from the three-dimensional point of view, represent spinning massive particlelike objects. For this type of source, we investigate the definition of quasilocal gravitational energy as seen from infinity, far beyond the region where the CTCs appear. We also consider the covariant formalism applied to NMG to compute the mass and the angular momentum of spinning particlelike defects and compare the result with the one obtained by means of the quasilocal stress tensor. We apply these methods to special limits in which the WAdS3 solutions coincide with locally AdS3 and locally AdS2×R spaces. Finally, we make some comments about the asymptotic symmetry algebra of asymptotically WAdS3 spaces in NMG.

  19. Primordial fluctuations from complex AdS saddle points

    NASA Astrophysics Data System (ADS)

    Hertog, Thomas; van der Woerd, Ellen

    2016-02-01

    One proposal for dS/CFT is that the Hartle-Hawking (HH) wave function in the large volume limit is equal to the partition function of a Euclidean CFT deformed by various operators. All saddle points defining the semiclassical HH wave function in cosmology have a representation in which their interior geometry is part of a Euclidean AdS domain wall with complex matter fields. We compute the wave functions of scalar and tensor perturbations around homogeneous isotropic complex saddle points, turning on single scalar field matter only. We compare their predictions for the spectra of CMB perturbations with those of a different dS/CFT proposal based on the analytic continuation of inflationary universes to real asymptotically AdS domain walls. We find the predictions of both bulk calculations agree to first order in the slow roll parameters, but there is a difference at higher order which, we argue, is a signature of the HH state of the fluctuations.

  20. Influence of coagulation factor x on in vitro and in vivo gene delivery by adenovirus (Ad) 5, Ad35, and chimeric Ad5/Ad35 vectors.

    PubMed

    Greig, Jenny A; Buckley, Suzanne Mk; Waddington, Simon N; Parker, Alan L; Bhella, David; Pink, Rebecca; Rahim, Ahad A; Morita, Takashi; Nicklin, Stuart A; McVey, John H; Baker, Andrew H

    2009-10-01

    The binding of coagulation factor X (FX) to the hexon of adenovirus (Ad) 5 is pivotal for hepatocyte transduction. However, vectors based on Ad35, a subspecies B Ad, are in development for cancer gene therapy, as Ad35 utilizes CD46 (which is upregulated in many cancers) for transduction. We investigated whether interaction of Ad35 with FX influenced vector tropism using Ad5, Ad35, and Ad5/Ad35 chimeras: Ad5/fiber(f)35, Ad5/penton(p)35/f35, and Ad35/f5. Surface plasmon resonance (SPR) revealed that Ad35 and Ad35/f5 bound FX with approximately tenfold lower affinities than Ad5 hexon-containing viruses, and electron cryomicroscopy (cryo-EM) demonstrated a direct Ad35 hexon:FX interaction. The presence of physiological levels of FX significantly inhibited transduction of vectors containing Ad35 fibers (Ad5/f35, Ad5/p35/f35, and Ad35) in CD46-positive cells. Vectors were intravenously administered to CD46 transgenic mice in the presence and absence of FX-binding protein (X-bp), resulting in reduced liver accumulation for all vectors. Moreover, Ad5/f35 and Ad5/p35/f35 efficiently accumulated in the lung, whereas Ad5 demonstrated poor lung targeting. Additionally, X-bp significantly reduced lung genome accumulation for Ad5/f35 and Ad5/p35/f35, whereas Ad35 was significantly enhanced. In summary, vectors based on the full Ad35 serotype will be useful vectors for selective gene transfer via CD46 due to a weaker FX interaction compared to Ad5. PMID:19603000

  1. Presentation attack detection for face recognition using light field camera.

    PubMed

    Raghavendra, R; Raja, Kiran B; Busch, Christoph

    2015-03-01

    The vulnerability of face recognition systems isa growing concern that has drawn the interest from both academic and research communities. Despite the availability of a broad range of face presentation attack detection (PAD)(or countermeasure or antispoofing) schemes, there exists no superior PAD technique due to evolution of sophisticated presentation attacks (or spoof attacks). In this paper, we present a new perspective for face presentation attack detection by introducing light field camera (LFC). Since the use of a LFC can record the direction of each incoming ray in addition to the intensity, it exhibits an unique characteristic of rendering multiple depth(or focus) images in a single capture. Thus, we present a novel approach that involves exploring the variation of the focus between multiple depth (or focus) images rendered by the LFC that in turn can be used to reveal the presentation attacks. To this extent, we first collect a new face artefact database using LFC that comprises of 80 subjects. Face artefacts are generated by simulating two widely used attacks, such as photo print and electronic screen attack. Extensive experiments carried out on the light field face artefact database have revealed the outstanding performance of the proposed PAD scheme when benchmarked with various well established state-of-the-art schemes. PMID:25622320

  2. Possible precipitation of migraine attacks with prophylactic treatment.

    PubMed

    Donnet, A; Vuillaume De Diego, E; Lanteri-Minet, M

    2009-01-01

    The initiation of a prophylactic treatment in a migraine sufferer depends upon the stratification of the patient's frequency of attacks and the disability they cause, as well as the patient's acute consumption and comorbid diseases. We report on 14 patients who were among a group of 618 migraine sufferers who received a new preventative treatment. These 14 patients developed an increase in the frequency of their migraine attacks that was possibly induced by this new prophylactic treatment. The clinical description of the migraine attacks remained the same but the frequency of the attacks of migraine without aura was dramatically increased. This is, to our knowledge, the first description of a possible precipitation of attacks of migraine without aura with a prophylactic treatment. There is no link with a specific class of prophylactic treatment. We hypothesize that the migraine sufferers who experienced aggravation after the new prophylactic drug had been introduced had a paradoxical decrease in the induction threshold for cortical spreading depression (CSD). Mechanisms of such a decrease are unknown and are probably multifactorial, but changes in serotonin neurotransmission have been experimentally demonstrated to modify cortical excitability and favour CSD. The aggravation was described only for attacks without aura. However, with only 14 patients, it is not possible to predict whether suffering from that the type of migraine is a factor that predisposes a patient to aggravation. While additional cases are necessary, physicians should be aware of the possibility that prophylactic treatment may exacerbate migraine attacks. PMID:18948696

  3. Preventing sexual attacks in healthcare facilities: risk management considerations.

    PubMed

    Banja, John D

    2014-01-01

    Reports or allegations of sexual attacks in healthcare facilities are extremely upsetting and sometimes not given the attention they deserve. In June 2011, the United States Government Accountability Office (GAO) issued a remarkable report on sexual attacks occurring in Veterans Affairs (VA) health facilities that not only raised awareness of the magnitude of the problem but that detailed numerous system weaknesses in VA facilities that might have enabled such attacks. This article discusses some of the GAO's findings as well as other instances of sexual attacks, such as occurred in the criminal prosecution of Paul Serdula, a former health professional who might have sexually assaulted hundreds of women. Some of Serdula's victims have subsequently sued in civil court, charging Serdula's employers with lack of supervision and raising the possibility of serial sexual attacks such as his evolving into large-scale patient safety disasters. This article will review certain ethical and legal considerations bearing on the liability of healthcare facilities in which sexual attacks are alleged to have occurred. Following a discussion of how two courts have used the legal construct of "foreseeability" in determining a healthcare facility's liability when an employee is charged with sexual assault, the article will conclude with a host of patient safety recommendations aimed at discouraging or deterring the occurrence of sexual attacks. PMID:24549696

  4. Optimal response to attacks on the open science grids.

    SciTech Connect

    Altunay, M.; Leyffer, S.; Linderoth, J. T.; Xie, Z.

    2011-01-01

    Cybersecurity is a growing concern, especially in open grids, where attack propagation is easy because of prevalent collaborations among thousands of users and hundreds of institutions. The collaboration rules that typically govern large science experiments as well as social networks of scientists span across the institutional security boundaries. A common concern is that the increased openness may allow malicious attackers to spread more readily around the grid. We consider how to optimally respond to attacks in open grid environments. To show how and why attacks spread more readily around the grid, we first discuss how collaborations manifest themselves in the grids and form the collaboration network graph, and how this collaboration network graph affects the security threat levels of grid participants. We present two mixed-integer program (MIP) models to find the optimal response to attacks in open grid environments, and also calculate the threat level associated with each grid participant. Given an attack scenario, our optimal response model aims to minimize the threat levels at unaffected participants while maximizing the uninterrupted scientific production (continuing collaborations). By adopting some of the collaboration rules (e.g., suspending a collaboration or shutting down a site), the model finds optimal response to subvert an attack scenario.

  5. Risk factors for hypertensive attack during pheochromocytoma resection

    PubMed Central

    Kwon, Se Yun; Lee, Kyung Seop; Lee, Jun Nyung; Ha, Yun-Sok; Choi, Seock Hwan; Kim, Hyun Tae; Kim, Tae-Hwan; Yoo, Eun Sang

    2016-01-01

    Purpose We aimed to retrospectively evaluate the risk factors for hypertensive attack during adrenalectomy in patients with pheochromocytoma. Despite the development of newer surgical and anesthetic techniques for the management of pheochromocytoma, intraoperative hypertensive attack continues to present a challenge. Materials and Methods Data from 53 patients diagnosed with pheochromocytoma at Kyungpook National Uriversity Medical Center between January 2000 and June 2012 were retrospectively analyzed. The subjects were divided into 2 groups depending on the presence or absence of hypertensive attack at the time of surgery. Patient demographic characteristics and preoperative evaluations were assessed for their prognostic relevance with respect to hypertensive attack. A univariate analysis was conducted, and a multivariate logistic regression analysis was also performed. Results In the univariate analysis, systolic blood pressure at presentation, preoperative hormonal status (including epinephrine, norepinephrine, vanillylmandelic acid, and metanephrine levels in a 24-hour urine sample), tumor size, and postoperative systolic blood pressure were significantly associated with the development of hypertensive attack. In the multivariate analysis, preoperative epinephrine level and tumor size were independent factors that predicted hypertensive attack. The highest odds ratio for tumor size (2.169) was obtained at a cutoff value of 4.25 cm and the highest odds ratio for preoperative epinephrine (1.020) was obtained at a cutoff value of 166.3 µg/d. Conclusions In this study, a large tumor size and an elevated preoperative urinary epinephrine level were risk factors for intraoperative hypertensive attack in patients with pheochromocytoma. PMID:27194549

  6. Smoking Behavior and Alcohol Consumption in Individuals With Panic Attacks

    PubMed Central

    Mathew, Amanda R.; Norton, Peter J.; Zvolensky, Michael J.; Buckner, Julia D.; Smits, Jasper A. J.

    2011-01-01

    Individuals with anxiety often report greater smoking and drinking behaviors relative to those without a history of anxiety. In particular, smoking and alcohol use have been directly implicated among individuals experiencing panic attacks, diagnosed with panic disorder, or high on panic-relevant risk factors such as anxiety sensitivity. Less is known, however, about specific features of panic that may differentiate among those who do or do not use cigarettes or alcohol. The purpose of the current study was to replicate previous research findings of an association between panic symptomatology, cigarette smoking, and alcohol consumption, as well as extend findings by examining whether specific symptoms of panic attacks differentiated among those who do or do not use cigarettes or alcohol. Participants (n = 489) completed the Panic Attack Questionnaire-IV, a highly detailed assessment of panic attacks and symptoms, as well as self-report measures of smoking history and alcohol use. Consistent with previous research, participants who reported a history of panic attacks (n = 107) were significantly more likely to report current daily or lifetime daily cigarette smoking, and significantly greater hazardous or harmful alcohol use than participants with no panic history (n = 382). Although smoking and hazardous alcohol use were highly associated regardless of panic status, participants with panic attacks showed elevated hazardous alcohol use after controlling for daily or lifetime smoking. Surprisingly, although participants who reported having had at least one panic attack were more likely to smoke, panic attack symptoms, intensity, or frequency did not differentiate panickers who did or did not smoke. Furthermore, panic-related variables were not shown to differentially relate to problematic drinking among panickers. Implications for understanding the complex relationship between panic attacks and smoking and drinking behaviors are discussed. PMID:21915160

  7. Adding value to your work.

    PubMed

    Chambers, D W

    1998-01-01

    Dentists and many staff enjoy characteristics of work associated with high levels of satisfaction and performance. Although value can be added to oral health care professionals' jobs through enlargement, enrichment, rotations, and autonomous work groups, there are limits to these techniques. Controlling work performance by means of rewards is risky. Probably the most effective means of adding value to jobs is through the Quality of Work Life approach, concentrating on job design and placement to make work meaningful and autonomous and to provide feedback. PMID:9697373

  8. The Use of Rockets as Military Weapons at the Siege of Kai Fung Foo in 1232 A.D

    NASA Technical Reports Server (NTRS)

    2004-01-01

    One of the earliest recorded instances of the use of rockets was as military weapons against the Mongols by the Chinese at the siege of Kai Fung Foo in 1232 A.D. An arrow with a tube of gunpowder produced an arrow of flying fire. The Mongol attackers fled in terror, even though the rockets were inaccurate and relatively harmless.

  9. Towards A Taxonomy Of Attacks Against Energy Control Systems

    NASA Astrophysics Data System (ADS)

    Fleury, Terry; Khurana, Himanshu; Welch, Von

    Control systems in the energy sector (e.g., supervisory control and data acquisition (SCADA) systems) involve a hierarchy of sensing, monitoring and control devices connected to centralized control stations or centers. The incorporation of commercial off-the-shelf technologies in energy control systems makes them vulnerable to cyber attacks. A taxonomy of cyber attacks against control systems can assist the energy sector in managing the cyber threat. This paper takes the first step towards a taxonomy by presenting a comprehensive model of attacks, vulnerabilities and damage related to control systems. The model is populated based on a survey of the technical literature from industry, academia and national laboratories.

  10. A Cyber-Attack Detection Model Based on Multivariate Analyses

    NASA Astrophysics Data System (ADS)

    Sakai, Yuto; Rinsaka, Koichiro; Dohi, Tadashi

    In the present paper, we propose a novel cyber-attack detection model based on two multivariate-analysis methods to the audit data observed on a host machine. The statistical techniques used here are the well-known Hayashi's quantification method IV and cluster analysis method. We quantify the observed qualitative audit event sequence via the quantification method IV, and collect similar audit event sequence in the same groups based on the cluster analysis. It is shown in simulation experiments that our model can improve the cyber-attack detection accuracy in some realistic cases where both normal and attack activities are intermingled.

  11. Total, Added, and Free Sugars: Are Restrictive Guidelines Science-Based or Achievable?

    PubMed Central

    Erickson, Jennifer; Slavin, Joanne

    2015-01-01

    Sugar consumption, especially added sugars, is under attack. Various government and health authorities have suggested new sugar recommendations and guidelines as low as 5% of total calories from free sugars. Definitions for total sugars, free sugars, and added sugars are not standardized, nor are there accepted nutrient databases for this information. Our objective was to measure total sugars and added sugars in sample meal plans created by the United States Department of Agriculture (USDA) and the Academy of Nutrition and Dietetics (AND). Utilizing the Nutrition Data System for Research (NDSR) nutritional database, results found that plans created by the USDA and AND averaged 5.1% and 3.1% calories from added sugar, 8.7% and 3.1% from free sugar, and 23.3% and 21.1% as total sugars respectively. Compliance with proposed added sugar recommendations would require strict dietary compliance and may not be sustainable for many Americans. Without an accepted definition and equation for calculating added sugar, added sugar recommendations are arbitrary and may reduce intakes of nutrient-rich, recommended foods, such as yogurt, whole grains, and tart fruits including cranberries, cherries, and grapefruit. Added sugars are one part of excess calorie intake; however, compliance with low added sugar recommendations may not be achievable for the general public. PMID:25884659

  12. Total, added, and free sugars: are restrictive guidelines science-based or achievable?

    PubMed

    Erickson, Jennifer; Slavin, Joanne

    2015-04-01

    Sugar consumption, especially added sugars, is under attack. Various government and health authorities have suggested new sugar recommendations and guidelines as low as 5% of total calories from free sugars. Definitions for total sugars, free sugars, and added sugars are not standardized, nor are there accepted nutrient databases for this information. Our objective was to measure total sugars and added sugars in sample meal plans created by the United States Department of Agriculture (USDA) and the Academy of Nutrition and Dietetics (AND). Utilizing the Nutrition Data System for Research (NDSR) nutritional database, results found that plans created by the USDA and AND averaged 5.1% and 3.1% calories from added sugar, 8.7% and 3.1% from free sugar, and 23.3% and 21.1% as total sugars respectively. Compliance with proposed added sugar recommendations would require strict dietary compliance and may not be sustainable for many Americans. Without an accepted definition and equation for calculating added sugar, added sugar recommendations are arbitrary and may reduce intakes of nutrient-rich, recommended foods, such as yogurt, whole grains, and tart fruits including cranberries, cherries, and grapefruit. Added sugars are one part of excess calorie intake; however, compliance with low added sugar recommendations may not be achievable for the general public. PMID:25884659

  13. Comparison of X-31 Flight and Ground-Based Yawing Moment Asymmetries at High Angles of Attack

    NASA Technical Reports Server (NTRS)

    Cobleigh, Brent R.; Croom, Mark A.

    2001-01-01

    Significant yawing moment asymmetries were encountered during the high-angle-of-attack envelope expansion of the two X-31 aircraft. These asymmetries caused position saturations of the thrust-vectoring vanes and trailing-edge flaps during some stability-axis rolling maneuvers at high angles of attack. The two test aircraft had different asymmetry characteristics, and ship two has asymmetries that vary as a function of Reynolds number. Several aerodynamic modifications have been made to the X-31 forebody with the goal of minimizing the asymmetry. These modifications include adding transition strips on the forebody and noseboom, using two different length strakes, and increasing nose bluntness. Ultimately, a combination of forebody strakes, nose blunting, and noseboom transition strips reduced the yawing moment asymmetry enough to fully expand the high-angle-of-attack envelope. Analysis of the X-31 flight data is reviewed and compared to wind-tunnel and water-tunnel measurements. Several lessons learned are outlined regarding high-angle-of-attack configuration design and ground testing.

  14. Higher-derivative superparticle in AdS3 space

    NASA Astrophysics Data System (ADS)

    Kozyrev, Nikolay; Krivonos, Sergey; Lechtenfeld, Olaf

    2016-03-01

    Employing the coset approach we construct component actions for a superparticle moving in AdS3 with N =(2 ,0 ), D =3 supersymmetry partially broken to N =2 , d =1 . These actions may contain higher time-derivative terms, which are chosen to possess the same (super)symmetries as the free superparticle. In terms of the nonlinear-realization superfields, the component actions always take a simpler form when written in terms of covariant Cartan forms. We also consider in detail the reduction to the nonrelativistic case and construct the corresponding action of a Newton-Hooke superparticle and its higher-derivative generalizations. The structure of these higher time-derivative generalizations is completely fixed by invariance under the supersymmetric Newton-Hooke algebra extended by two central charges.

  15. Aspects of warped AdS3/CFT2 correspondence

    NASA Astrophysics Data System (ADS)

    Chen, Bin; Zhang, Jia-Ju; Zhang, Jian-Dong; Zhong, De-Liang

    2013-04-01

    In this paper we apply the thermodynamics method to investigate the holographic pictures for the BTZ black hole, the spacelike and the null warped black holes in three-dimensional topologically massive gravity (TMG) and new massive gravity (NMG). Even though there are higher derivative terms in these theories, the thermodynamics method is still effective. It gives consistent results with the ones obtained by using asymptotical symmetry group (ASG) analysis. In doing the ASG analysis we develop a brute-force realization of the Barnich-Brandt-Compere formalism with Mathematica code, which also allows us to calculate the masses and the angular momenta of the black holes. In particular, we propose the warped AdS3/CFT2 correspondence in the new massive gravity, which states that quantum gravity in the warped spacetime could holographically dual to a two-dimensional CFT with {c_R}={c_L}=24 /{Gm{β^2√{{2( {21-4{β^2}} )}}}}.

  16. Thermodynamics of charged Lovelock: AdS black holes

    NASA Astrophysics Data System (ADS)

    Prasobh, C. B.; Suresh, Jishnu; Kuriakose, V. C.

    2016-04-01

    We investigate the thermodynamic behavior of maximally symmetric charged, asymptotically AdS black hole solutions of Lovelock gravity. We explore the thermodynamic stability of such solutions by the ordinary method of calculating the specific heat of the black holes and investigating its divergences which signal second-order phase transitions between black hole states. We then utilize the methods of thermodynamic geometry of black hole spacetimes in order to explain the origin of these points of divergence. We calculate the curvature scalar corresponding to a Legendre-invariant thermodynamic metric of these spacetimes and find that the divergences in the black hole specific heat correspond to singularities in the thermodynamic phase space. We also calculate the area spectrum for large black holes in the model by applying the Bohr-Sommerfeld quantization to the adiabatic invariant calculated for the spacetime.

  17. Vortex hair on AdS black holes

    NASA Astrophysics Data System (ADS)

    Gregory, Ruth; Gustainis, Peter C.; Kubizňák, David; Mann, Robert B.; Wills, Danielle

    2014-11-01

    We analyse vortex hair for charged rotating asymptotically AdS black holes in the abelian Higgs model. We give analytical and numerical arguments to show how the vortex interacts with the horizon of the black hole, and how the solution extends to the boundary. The solution is very close to the corresponding asymptotically flat vortex, once one transforms to a frame that is non-rotating at the boundary. We show that there is a Meissner effect for extremal black holes, with the vortex flux being expelled from sufficiently small black holes. The phase transition is shown to be first order in the presence of rotation, but second order without rotation. We comment on applications to holography.

  18. An investigation of AdS2 backreaction and holography

    NASA Astrophysics Data System (ADS)

    Engelsöy, Julius; Mertens, Thomas G.; Verlinde, Herman

    2016-07-01

    We investigate a dilaton gravity model in AdS2 proposed by Almheiri and Polchinski [1] and develop a 1d effective description in terms of a dynamical boundary time with a Schwarzian derivative action. We show that the effective model is equivalent to a 1d version of Liouville theory, and investigate its dynamics and symmetries via a standard canonical framework. We include the coupling to arbitrary conformal matter and analyze the effective action in the presence of possible sources. We compute commutators of local operators at large time separation, and match the result with the time shift due to a gravitational shockwave interaction. We study a black hole evaporation process and comment on the role of entropy in this model.

  19. Systematics of Coupling Flows in AdS Backgrounds

    SciTech Connect

    Goldberger, Walter D.; Rothstein, Ira Z.

    2003-03-18

    We give an effective field theory derivation, based on the running of Planck brane gauge correlators, of the large logarithms that arise in the predictions for low energy gauge couplings in compactified AdS}_5 backgrounds, including the one-loop effects of bulk scalars, fermions, and gauge bosons. In contrast to the case of charged scalars coupled to Abelian gauge fields that has been considered previously in the literature, the one-loop corrections are not dominated by a single 4D Kaluza-Klein mode. Nevertheless, in the case of gauge field loops, the amplitudes can be reorganized into a leading logarithmic contribution that is identical to the running in 4D non-Abelian gauge theory, and a term which is not logarithmically enhanced and is analogous to a two-loop effect in 4D. In a warped GUT model broken by the Higgs mechanism in the bulk,we show that the matching scale that appears in the large logarithms induced by the non-Abelian gauge fields is m_{XY}^2/k where m_{XY} is the bulk mass of the XY bosons and k is the AdS curvature. This is in contrast to the UV scale in the logarithmic contributions of scalars, which is simply the bulk mass m. Our results are summarized in a set of simple rules that can be applied to compute the leading logarithmic predictions for coupling constant relations within a given warped GUT model. We present results for both bulk Higgs and boundary breaking of the GUT gauge

  20. After-gate attack on a quantum cryptosystem

    NASA Astrophysics Data System (ADS)

    Wiechers, C.; Lydersen, L.; Wittmann, C.; Elser, D.; Skaar, J.; Marquardt, Ch; Makarov, V.; Leuchs, G.

    2011-01-01

    We present a method to control the detection events in quantum key distribution systems that use gated single-photon detectors. We employ bright pulses as faked states, timed to arrive at the avalanche photodiodes outside the activation time. The attack can remain unnoticed, since the faked states do not increase the error rate per se. This allows for an intercept-resend attack, where an eavesdropper transfers her detection events to the legitimate receiver without causing any errors. As a side effect, afterpulses, originating from accumulated charge carriers in the detectors, increase the error rate. We have experimentally tested detectors of the system id3110 (Clavis2) from ID Quantique. We identify the parameter regime in which the attack is feasible despite the side effect. Furthermore, we outline how simple modifications in the implementation can make the device immune to this attack.

  1. The coalescence of intrahost HIV lineages under symmetric CTL attack.

    PubMed

    Leviyang, Sivan

    2012-08-01

    Cytotoxic T lymphocytes (CTLs) are immune system cells that are thought to play an important role in controlling HIV infection. We develop a stochastic ODE model of HIV-CTL interaction that extends current deterministic ODE models. Based on this stochastic model, we consider the effect of CTL attack on intrahost HIV lineages assuming that CTLs attack several epitopes with equal strength. In this setting, we introduce a limiting version of our stochastic ODE under which we show that the coalescence of HIV lineages can be described through Poisson-Dirichlet distributions. Through numerical experiments, we show that our results under the limiting stochastic ODE accurately reflect HIV lineages under CTL attack when the HIV population size is on the low end of its hypothesized range. Current techniques of HIV lineage construction depend on the Kingman coalescent. Our results give an explicit connection between CTL attack and HIV lineages. PMID:22644341

  2. Health Before a Stroke Is Big Predictor of Second Attack

    MedlinePlus

    ... fullstory_159881.html Health Before a Stroke Is Big Predictor of Second Attack Getting hypertension, cholesterol under ... the researchers explained. The findings weren't a big surprise to the study authors. "We found in ...

  3. Polysomnographic findings in nights preceding a migraine attack.

    PubMed

    Göder, R; Fritzer, G; Kapsokalyvas, A; Kropp, P; Niederberger, U; Strenge, H; Gerber, W D; Aldenhoff, J B

    2001-02-01

    Sleep recordings were performed in eight patients to analyse sleep alterations preceding migraine attacks. Polysomnographic recordings from nights before an attack were compared with nights without following migraine. We analysed standard sleep parameters and electroencephalogram (EEG) power spectra. The main findings preceding migraine attacks were a significant decrease in the number of arousals, a decrease in rapid eye movement (REM) density, a significant decrease of beta power in the slow wave sleep, and a decrease of alpha power during the first REM period. The results suggest a decrease in cortical activation during sleep preceding migraine attacks. According to the models of sleep regulation, alterations in the function of aminergic or cholinergic brainstem nuclei have to be discussed. PMID:11298661

  4. The countermeasures against the blinding attack in quantum key distribution

    NASA Astrophysics Data System (ADS)

    Wang, Jindong; Wang, Hong; Qin, Xiaojuan; Wei, Zhengjun; Zhang, Zhiming

    2016-01-01

    It has been shown that the single photon detectors (SPDs) based on the avalanche photodiode (APD) can be blinded and controlled by the bright light and short trigger pulses. Eavesdropper can get the full information without causing additional quantum bit error rate. Hence, in order to guarantee the security of the quantum key distribution (QKD) systems, some countermeasures, by changing the characteristic of the SPD or monitoring the parameters of the detector, are presented by some research groups. In this paper, we provide a new and effective countermeasure against the blinding attack based on improving the optical scheme of the decoding unit in the QKD system rather than only considering the characteristic of the SPD. In our proposal we use a coupler with asymmetric splitting ratio to distinguish the detection characteristic of the SPD with blinding attack from that without blinding attack. The detailed analysis shows that the proposed scheme is feasible to defense the blinding attack.

  5. VTAC: virtual terrain assisted impact assessment for cyber attacks

    NASA Astrophysics Data System (ADS)

    Argauer, Brian J.; Yang, Shanchieh J.

    2008-03-01

    Overwhelming intrusion alerts have made timely response to network security breaches a difficult task. Correlating alerts to produce a higher level view of intrusion state of a network, thus, becomes an essential element in network defense. This work proposes to analyze correlated or grouped alerts and determine their 'impact' to services and users of the network. A network is modeled as 'virtual terrain' where cyber attacks maneuver. Overlaying correlated attack tracks on virtual terrain exhibits the vulnerabilities exploited by each track and the relationships between them and different network entities. The proposed impact assessment algorithm utilizes the graph-based virtual terrain model and combines assessments of damages caused by the attacks. The combined impact scores allow to identify severely damaged network services and affected users. Several scenarios are examined to demonstrate the uses of the proposed Virtual Terrain Assisted Impact Assessment for Cyber Attacks (VTAC).

  6. An unusual case of predation: dog pack or cougar attack?

    PubMed

    Fonseca, Gabriel M; Palacios, Rocío

    2013-01-01

    Injuries produced by animals are capable of leaving severe patterns and in some cases may result in the death of the attacked individual. Law enforcement authorities may come to erroneous conclusions about the source of the bites based on their awareness of animals present and similarities of the injuries to the untrained eye, with dreadful consequences. Expertise of a carnivore biologist and an odontologist that indentifies the particularities of bite marks may be useful for identifying the attacking species. We present the investigation of a fatal dog pack attack involving a 43-year-old man in Bell Ville (Argentina) where the evidence provided by a forensic dentist and a biologist was categorical for establishing the animal species involved. Because of the unusual characteristics of the wounds and the initial hypothesis made by local authorities of a cougar attack, habits and specific patterns of both dog pack and cougar predation on humans are discussed. PMID:22971181

  7. Panic attacks and interoceptive acuity for cardiac sensations.

    PubMed

    Asmundson, G J; Sandler, L S; Wilson, K G; Norton, G R

    1993-02-01

    It has been suggested that perception of visceral changes, and cognitive reactions to such changes, may be important for triggering panic attacks. It remains to be determined, however, whether people with panic attacks are actually characterized by enhanced perceptual acuity for interoceptive stimuli. The purpose of this study was to explore the relationship between panic attacks and awareness for cardiac sensations using an objective heartbeat discrimination procedure. Twenty panickers and 20 nonpanickers were given 60 trials of the Whitehead heartbeat discrimination procedure. Thirty trials were given during rest and 30 following hyperventilation. Results indicated that panic attacks were not related to enhanced interoceptive acuity for cardiac sensations, either at rest or following hyperventilation. These results are discussed in terms of their relevance to cognitive models of panic. PMID:8442744

  8. Countermeasures Against Blinding Attack on Superconducting Nanowire Detectors for QKD

    NASA Astrophysics Data System (ADS)

    Elezov, M. S.; Ozhegov, R. V.; Kurochkin, Y. V.; Goltsman, G. N.; Makarov, V. S.

    2015-09-01

    Nowadays, the superconducting single-photon detectors (SSPDs) are used in Quantum Key Distribution (QKD) instead of single-photon avalanche photodiodes. Recently bright-light control of the SSPD has been demonstrated. This attack employed a "backdoor" in the detector biasing technique. We developed the autoreset system which returns the SSPD to superconducting state when it is latched. We investigate latched state of the SSPD and define limit conditions for effective blinding attack. Peculiarity of the blinding attack is a long nonsingle photon response of the SSPD. It is much longer than usual single photon response. Besides, we need follow up response duration of the SSPD. These countermeasures allow us to prevent blind attack on SSPDs for Quantum Key Distribution.

  9. Media exposure to bioterrorism: stress and the anthrax attacks.

    PubMed

    Dougall, Angela Liegey; Hayward, Michele C; Baum, Andrew

    2005-01-01

    This study examined media exposure and adjustment to anthrax bioterrorism attacks and the terrorist attacks on 9/11 in a sample of 300 people who lived distant from the attacks. Measures of direct and indirect exposure to terrorism, perceived risk of anthrax exposure, psychological distress, and outlook were assessed at 2 to 3 months and at 8 months after the first reported anthrax attack. Initial anthrax media exposure was a powerful predictor of distress, whereas subsequent anthrax media exposure only predicted negative changes in outlook over time. Perceived risk of anthrax exposure predicted distress and outlook but did not appear to mediate the effects of media exposure. Determining the nature and consequences of media exposure to threatening and frightening events like terrorism will help predict and manage response to future bioterrorism. PMID:15899708

  10. Women Twice as Likely to Die from Severe Heart Attack

    MedlinePlus

    ... gov/medlineplus/news/fullstory_158172.html Women Twice as Likely to Die From Severe Heart Attack, Study ... 2016 (HealthDay News) -- Women are up to twice as likely as men to die from the most ...

  11. Quantum cloning attacks against PUF-based quantum authentication systems

    NASA Astrophysics Data System (ADS)

    Yao, Yao; Gao, Ming; Li, Mo; Zhang, Jian

    2016-08-01

    With the advent of physical unclonable functions (PUFs), PUF-based quantum authentication systems have been proposed for security purposes, and recently, proof-of-principle experiment has been demonstrated. As a further step toward completing the security analysis, we investigate quantum cloning attacks against PUF-based quantum authentication systems and prove that quantum cloning attacks outperform the so-called challenge-estimation attacks. We present the analytical expression of the false-accept probability by use of the corresponding optimal quantum cloning machines and extend the previous results in the literature. In light of these findings, an explicit comparison is made between PUF-based quantum authentication systems and quantum key distribution protocols in the context of cloning attacks. Moreover, from an experimental perspective, a trade-off between the average photon number and the detection efficiency is discussed in detail.

  12. Supersonic flow around circular cones at angles of attack

    NASA Technical Reports Server (NTRS)

    Ferri, Antonio

    1951-01-01

    The properties of conical flow without axial symmetry are analyzed. The flow around cones of circular cross section at small angles of attack is determined by correctly considering the effect of the entropy gradients in the flow.

  13. New records of Pipunculidae attacking proconiine sharpshooter (Auchenorrhyncha: Cicadellidae: Proconiini)

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Five records of Pipunculidae (Diptera) attacking proconiine sharpshooters (Auchenorrhyncha: Cicadellidae) are documented here for the first time. Eudorylas alternatus (Cresson) is documented as a parasitoid of Cuerna obtusa Oman and Beamer, and Oncometopia orbona (Fabricius) is recorded as being at...

  14. Trojan-horse attacks on quantum-key-distribution systems

    SciTech Connect

    Gisin, N.; Fasel, S.; Kraus, B.; Zbinden, H.; Ribordy, G.

    2006-02-15

    General Trojan-horse attacks on quantum-key-distribution systems, i.e., attacks on Alice or Bob's system via the quantum channel, are analyzed. We illustrate the power of such attacks with today's technology and conclude that all systems must implement active counter measures. In particular, all systems must include an auxiliary detector that monitors any incoming light. We show that such counter measures can be efficient, provided that enough additional privacy amplification is applied to the data. We present a practical way to reduce the maximal information gain that an adversary can gain using Trojan-horse attacks. This does reduce the security analysis of the two-way plug-and-play implementation to those of the standard one-way systems.

  15. Quantum cloning attacks against PUF-based quantum authentication systems

    NASA Astrophysics Data System (ADS)

    Yao, Yao; Gao, Ming; Li, Mo; Zhang, Jian

    2016-05-01

    With the advent of physical unclonable functions (PUFs), PUF-based quantum authentication systems have been proposed for security purposes, and recently, proof-of-principle experiment has been demonstrated. As a further step toward completing the security analysis, we investigate quantum cloning attacks against PUF-based quantum authentication systems and prove that quantum cloning attacks outperform the so-called challenge-estimation attacks. We present the analytical expression of the false-accept probability by use of the corresponding optimal quantum cloning machines and extend the previous results in the literature. In light of these findings, an explicit comparison is made between PUF-based quantum authentication systems and quantum key distribution protocols in the context of cloning attacks. Moreover, from an experimental perspective, a trade-off between the average photon number and the detection efficiency is discussed in detail.

  16. Holography beyond conformal invariance and AdS isometry?

    SciTech Connect

    Barvinsky, A. O.

    2015-03-15

    We suggest that the principle of holographic duality be extended beyond conformal invariance and AdS isometry. Such an extension is based on a special relation between functional determinants of the operators acting in the bulk and on its boundary, provided that the boundary operator represents the inverse propagators of the theory induced on the boundary by the Dirichlet boundary value problem in the bulk spacetime. This relation holds for operators of a general spin-tensor structure on generic manifolds with boundaries irrespective of their background geometry and conformal invariance, and it apparently underlies numerous O(N{sup 0}) tests of the AdS/CFT correspondence, based on direct calculation of the bulk and boundary partition functions, Casimir energies, and conformal anomalies. The generalized holographic duality is discussed within the concept of the “double-trace” deformation of the boundary theory, which is responsible in the case of large-N CFT coupled to the tower of higher-spin gauge fields for the renormalization group flow between infrared and ultraviolet fixed points. Potential extension of this method beyond the one-loop order is also briefly discussed.

  17. Holography beyond conformal invariance and AdS isometry?

    NASA Astrophysics Data System (ADS)

    Barvinsky, A. O.

    2015-03-01

    We suggest that the principle of holographic duality be extended beyond conformal invariance and AdS isometry. Such an extension is based on a special relation between functional determinants of the operators acting in the bulk and on its boundary, provided that the boundary operator represents the inverse propagators of the theory induced on the boundary by the Dirichlet boundary value problem in the bulk spacetime. This relation holds for operators of a general spin-tensor structure on generic manifolds with boundaries irrespective of their background geometry and conformal invariance, and it apparently underlies numerous O( N 0) tests of the AdS/CFT correspondence, based on direct calculation of the bulk and boundary partition functions, Casimir energies, and conformal anomalies. The generalized holographic duality is discussed within the concept of the "double-trace" deformation of the boundary theory, which is responsible in the case of large- N CFT coupled to the tower of higher-spin gauge fields for the renormalization group flow between infrared and ultraviolet fixed points. Potential extension of this method beyond the one-loop order is also briefly discussed.

  18. Islands of stability and recurrence times in AdS

    NASA Astrophysics Data System (ADS)

    Green, Stephen R.; Maillard, Antoine; Lehner, Luis; Liebling, Steven L.

    2015-10-01

    We study the stability of anti-de Sitter (AdS) spacetime to spherically symmetric perturbations of a real scalar field in general relativity. Further, we work within the context of the "two time framework" (TTF) approximation, which describes the leading nonlinear effects for small amplitude perturbations, and is therefore suitable for studying the weakly turbulent instability of AdS—including both collapsing and noncollapsing solutions. We have previously identified a class of quasiperiodic (QP) solutions to the TTF equations, and in this paper we analyze their stability. We show that there exist several families of QP solutions that are stable to linear order, and we argue that these solutions represent islands of stability in TTF. We extract the eigenmodes of small oscillations about QP solutions, and we use them to predict approximate recurrence times for generic noncollapsing initial data in the full (non-TTF) system. Alternatively, when sufficient energy is driven to high-frequency modes, as occurs for initial data far from a QP solution, the TTF description breaks down as an approximation to the full system. Depending on the higher order dynamics of the full system, this often signals an imminent collapse to a black hole.

  19. Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Alicherry, Mansoor; Keromytis, Angelos D.; Stavrou, Angelos

    Mobile Ad-hoc Networks (MANETs) are increasingly employed in tactical military and civil rapid-deployment networks, including emergency rescue operations and ad hoc disaster-relief networks. However, this flexibility of MANETs comes at a price, when compared to wired and base station-based wireless networks: MANETs are susceptible to both insider and outsider attacks. This is mainly because of the lack of a well-defined defense perimeter preventing the effective use of wired defenses including firewalls and intrusion detection systems.

  20. Security solution against denial of service attacks in BESIP system

    NASA Astrophysics Data System (ADS)

    Rezac, Filip; Voznak, Miroslav; Safarik, Jakub; Partila, Pavol; Tomala, Karel

    2013-05-01

    This article deals about embedded SIP communication server with an easy integration into the computer network based on open source solutions and its effective defense against the most frequent attack in the present - Denial of Service. The article contains brief introduction into the Bright Embedded Solution for IP Telephony - BESIP and describes the most common types of DoS attacks, which are applied on SIP elements of the VoIP infrastructure including the results of defensive mechanism that has been designed.

  1. [Panic attacks and panic syndrome--diagnosis and therapy].

    PubMed

    Katschnig, H; Nutzinger, D O

    1990-01-01

    Paroxysmal states of anxiety that cannot be traced back to somatic causes have been called panic attacks since the publication of the Diagnostic and Statistical Manual of Mental Disorders (DSM III) of the American Psychiatric Association. This term has since been accepted as part of psychiatric everyday language in many countries. The present review discusses initially the diagnostic and differential diagnostic aspects against the background of nosological classifications as practised to date, with particular emphasis on the requirements of the practising psychiatrist. The authors of this review hold the opinion that whereas the phenomenon of panic attack is a valid concept, the conceptualisation of a panic disorder is still largely hypothetical. The often observed "natural history"--after panic attacks, anticipatory anxiety, coupling of attacks to certain situations, avoidance of these situations, as well as agoraphobia, depressivity, self-medication with tranquilisers and alcohol, hypochondriacal fears with increased consultation of doctors, and family conflicts may develop--requires early therapeutic intervention. Hence, the second part of this article presents the pharmacological and psychotherapeutical treatment methods for panic attacks and their complications as developed and successfully tried out during the past few years. The efficacy has been proven of drug therapy on the one hand of prophylactic treatment using tricyclic antidepressives, MAO-inhibitors and alprazolam or clonazepam, and on the other hand also of a non-continuous attack-related treatment strategy. Of the more recent psychotherapeutic methods, relaxation methods and the cognitive treatment of panic attacks are discussed. This direct focus on panic attacks seems to be more promising than the conventional treatment methods centered on secondary symptoms such as anticipatory anxiety or agoraphobia. PMID:2179978

  2. The effects of malicious nodes on performance of mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Li, Fanzhi; Shi, Xiyu; Jassim, Sabah; Adams, Christopher

    2006-05-01

    Wireless ad hoc networking offers convenient infrastructureless communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to security attacks. Unlike their wired counterpart, infrastructureless ad hoc networks do not have a clear line of defense, their topology is dynamically changing, and every mobile node can receive messages from its neighbors and can be contacted by all other nodes in its neighborhood. This poses a great danger to network security if some nodes behave in a malicious manner. The immediate concern about the security in this type of networks is how to protect the network and the individual mobile nodes against malicious act of rogue nodes from within the network. This paper is concerned with security aspects of wireless ad hoc networks. We shall present results of simulation experiments on ad hoc network's performance in the presence of malicious nodes. We shall investigate two types of attacks and the consequences will be simulated and quantified in terms of loss of packets and other factors. The results show that network performance, in terms of successful packet delivery ratios, significantly deteriorates when malicious nodes act according to the defined misbehaving characteristics.

  3. The Integrity of Science: Identifying Logical Fallacies, Deceitful Tactics, and Abuse of the Public Trust

    NASA Astrophysics Data System (ADS)

    Gleick, P. H.

    2006-12-01

    Science, government, and society interact in diverse and complex ways, but good scientific information and advice are vital for making sound policy decisions. Recent efforts to discredit or distort science for political agendas raise difficult questions for the scientific community. As a result, there is growing distrust of scientists long held in esteem by the public and a growing misuse of science critical for public policy. This paper will categorize and define more than 20 different kinds of problems that challenge the integrity of science, including logical fallacies, such as Arguments from Ideology, Personal Incredulity, or Ignorance; and deceitful tactics, such as ad hominem attacks, "straw man" mischaracterizations, scientific misconduct, and misuse of facts. Examples from the geophysical sciences and its intersection with the public policy arena will be presented, together with suggestions for strengthening the public trust.

  4. The Roman Catholic Church, the Holocaust, and the demonization of the Jews

    PubMed Central

    Kertzer, David I.

    2015-01-01

    Following eleven years’ work, in 1998 a high-level Vatican commission instituted by Pope John Paul II offered what has become the official position of the Roman Catholic Church denying any responsibility for fomenting the kind of demonization of the Jews that made the Holocaust possible. In a 2001 book, The popes against the Jews, I demonstrated that in fact the church played a major role in leading Catholics throughout Europe to view Jews as an existential threat. Yet defenders of the church position continue to deny the historical evidence and to launch ferocious ad hominem attacks against scholars who have researched the subject. The anti-Semitism promulgated by the church can be seen as part of the long battle it waged against modernity, with which the Jews were identified. PMID:27011787

  5. Enhancing community integrity of networks against multilevel targeted attacks

    NASA Astrophysics Data System (ADS)

    Ma, Lijia; Gong, Maoguo; Cai, Qing; Jiao, Licheng

    2013-08-01

    The community structure and the robustness are two important properties of networks for analyzing the functionality of complex systems. The community structure is crucial to understand the potential functionality of complex systems, while the robustness is indispensable to protect the functionality of complex systems from malicious attacks. When a network suffers from an unpredictable attack, its structural integrity would be damaged. Earlier studies focused on the integrity of the node structure or the edge structure when a network suffers from a single-level malicious attack on the nodes or the edges. In this study, we model the attack on the network as a two-level targeted one. Then, we propose a community robustness index to evaluate the integrality of the community structure when the network suffers from the modeled attack. The proposed index plays an important role in analyzing the ability of the real systems to resist unpredictable failures. Finally, based on the proposed community robustness index, a greedy algorithm is devised to mitigate the network attack. Experiments on three real network systems show that with minor changes in links the community robustness of networks can be greatly improved. The results also demonstrate that the community structures in the optimized networks remain practically unchanged compared with the original ones.

  6. What should we expect after the next attack?

    PubMed

    Silver, Roxane Cohen; Fischhoff, Baruch

    2011-09-01

    A test of any science is its ability to predict events under specified conditions. A test for the psychology represented in this special issue of the American Psychologist is its ability to predict individual and social behavior in the aftermath of a next terror attack. This article draws on that science to make such predictions. These predictions are conditioned on both the nature of the attack and our institutional preparations for it. Some attacks will test our resilience more than others. Whatever the attack, we will reduce its impacts if our institutions take advantage of psychological science. That science can reduce the scope of attacks by limiting terrorists' ability to organize their operations and by enhancing our ability to restrain them. It can reduce the impacts of any attacks that do occur by strengthening the institutions and civil society that must respond to them. Realizing these possibilities will require our social institutions to rely on science, rather than intuition, in dealing with these threats. It will require our profession to provide psychologists with rewards for public service, applied research, and interdisciplinary collaboration, as demanded by complex problems. Responding to these challenges could strengthen society and psychology. PMID:21823771

  7. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    NASA Astrophysics Data System (ADS)

    Friedrich, Steinhäusler; Stan, Rydell; Lyudmila, Zaitseva

    2008-08-01

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb). This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment.

  8. Human behaviour can trigger large carnivore attacks in developed countries

    PubMed Central

    Penteriani, Vincenzo; Delgado, María del Mar; Pinchera, Francesco; Naves, Javier; Fernández-Gil, Alberto; Kojola, Ilpo; Härkönen, Sauli; Norberg, Harri; Frank, Jens; Fedriani, José María; Sahlén, Veronica; Støen, Ole-Gunnar; Swenson, Jon E.; Wabakken, Petter; Pellegrini, Mario; Herrero, Stephen; López-Bao, José Vicente

    2016-01-01

    The media and scientific literature are increasingly reporting an escalation of large carnivore attacks on humans in North America and Europe. Although rare compared to human fatalities by other wildlife, the media often overplay large carnivore attacks on humans, causing increased fear and negative attitudes towards coexisting with and conserving these species. Although large carnivore populations are generally increasing in developed countries, increased numbers are not solely responsible for the observed rise in the number of attacks by large carnivores. Here we show that an increasing number of people are involved in outdoor activities and, when doing so, some people engage in risk-enhancing behaviour that can increase the probability of a risky encounter and a potential attack. About half of the well-documented reported attacks have involved risk-enhancing human behaviours, the most common of which is leaving children unattended. Our study provides unique insight into the causes, and as a result the prevention, of large carnivore attacks on people. Prevention and information that can encourage appropriate human behaviour when sharing the landscape with large carnivores are of paramount importance to reduce both potentially fatal human-carnivore encounters and their consequences to large carnivores. PMID:26838467

  9. Vulnerability of water supply systems to cyber-physical attacks

    NASA Astrophysics Data System (ADS)

    Galelli, Stefano; Taormina, Riccardo; Tippenhauer, Nils; Salomons, Elad; Ostfeld, Avi

    2016-04-01

    The adoption of smart meters, distributed sensor networks and industrial control systems has largely improved the level of service provided by modern water supply systems. Yet, the progressive computerization exposes these critical infrastructures to cyber-physical attacks, which are generally aimed at stealing critical information (cyber-espionage) or causing service disruption (denial-of-service). Recent statistics show that water and power utilities are undergoing frequent attacks - such as the December power outage in Ukraine - , attracting the interest of operators and security agencies. Taking the security of Water Distribution Networks (WDNs) as domain of study, our work seeks to characterize the vulnerability of WDNs to cyber-physical attacks, so as to conceive adequate defense mechanisms. We extend the functionality of EPANET, which models hydraulic and water quality processes in pressurized pipe networks, to include a cyber layer vulnerable to repeated attacks. Simulation results on a medium-scale network show that several hydraulic actuators (valves and pumps, for example) can be easily attacked, causing both service disruption - i.e., water spillage and loss of pressure - and structural damages - e.g., pipes burst. Our work highlights the need for adequate countermeasures, such as attacks detection and reactive control systems.

  10. Larval Defense against Attack from Parasitoid Wasps Requires Nociceptive Neurons

    PubMed Central

    Robertson, Jessica L.; Tsubouchi, Asako; Tracey, W. Daniel

    2013-01-01

    Parasitoid wasps are a fierce predator of Drosophila larvae. Female Leptopilina boulardi (LB) wasps use a sharp ovipositor to inject eggs into the bodies of Drosophila melanogaster larvae. The wasp then eats the Drosophila larva alive from the inside, and an adult wasp ecloses from the Drosophila pupal case instead of a fly. However, the Drosophila larvae are not defenseless as they may resist the attack of the wasps through somatosensory-triggered behavioral responses. Here we describe the full range of behaviors performed by the larval prey in immediate response to attacks by the wasps. Our results suggest that Drosophila larvae primarily sense the wasps using their mechanosensory systems. The range of behavioral responses included both “gentle touch” like responses as well as nociceptive responses. We found that the precise larval response depended on both the somatotopic location of the attack, and whether or not the larval cuticle was successfully penetrated during the course of the attack. Interestingly, nociceptive responses are more likely to be triggered by attacks in which the cuticle had been successfully penetrated by the wasp. Finally, we found that the class IV neurons, which are necessary for mechanical nociception, were also necessary for a nociceptive response to wasp attacks. Thus, the class IV neurons allow for a nociceptive behavioral response to a naturally occurring predator of Drosophila. PMID:24205297

  11. Understanding public confidence in government to prevent terrorist attacks.

    SciTech Connect

    Baldwin, T. E.; Ramaprasad, A,; Samsa, M. E.; Decision and Information Sciences; Univ. of Illinois at Chicago

    2008-04-02

    A primary goal of terrorism is to instill a sense of fear and vulnerability in a population and to erode its confidence in government and law enforcement agencies to protect citizens against future attacks. In recognition of its importance, the Department of Homeland Security includes public confidence as one of the principal metrics used to assess the consequences of terrorist attacks. Hence, a detailed understanding of the variations in public confidence among individuals, terrorist event types, and as a function of time is critical to developing this metric. In this exploratory study, a questionnaire was designed, tested, and administered to small groups of individuals to measure public confidence in the ability of federal, state, and local governments and their public safety agencies to prevent acts of terrorism. Data was collected from three groups before and after they watched mock television news broadcasts portraying a smallpox attack, a series of suicide bomber attacks, a refinery explosion attack, and cyber intrusions on financial institutions, resulting in identity theft. Our findings are: (a) although the aggregate confidence level is low, there are optimists and pessimists; (b) the subjects are discriminating in interpreting the nature of a terrorist attack, the time horizon, and its impact; (c) confidence recovery after a terrorist event has an incubation period; and (d) the patterns of recovery of confidence of the optimists and the pessimists are different. These findings can affect the strategy and policies to manage public confidence after a terrorist event.

  12. Facial injuries following hyena attack in rural eastern Ethiopia.

    PubMed

    Fell, M J; Ayalew, Y; McClenaghan, F C; McGurk, M

    2014-12-01

    Hyenas are effective hunters and will consider humans as potential prey if the need and opportunity arise. This study describes the circumstances of hyena attacks, the patterns of injuries sustained, and reconstruction in a resource-poor setting. As part of a charitable surgical mission to Ethiopia in 2012, 45 patients with facial deformities were reviewed, of whom four were victims of hyena attacks. A semi-structured interview was performed to ascertain the circumstances of the attack and the subsequent consequences. The age of the victims at the time of attack varied from 5 to 50 years. The attacks occurred when the victims were alone and vulnerable and took place in outdoor open spaces, during the evening or at night. The initial lunge was made to the facial area; if the jaws closed on the facial bones they were crushed, but in all cases the soft tissues were grasped and torn from the underlying bone. Reconstruction was dictated by the extent of soft tissue loss but could normally be obtained by use of local or regional flaps. Hyenas have been shown to attack humans in a predictable way and cause injuries that typically involve the soft tissues of the face. PMID:25132572

  13. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    SciTech Connect

    Friedrich, Steinhaeusler; Lyudmila, Zaitseva; Stan, Rydell

    2008-08-07

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb).This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment.

  14. A comparative analysis of network robustness against different link attacks

    NASA Astrophysics Data System (ADS)

    Duan, Boping; Liu, Jing; Zhou, Mingxing; Ma, Liangliang

    2016-04-01

    Recently, the study of optimizing network robustness has attracted increasing attentions, and the constraint that every node's degree cannot be changed is considered. Although this constraint maintains the node degree distribution consistently in order to reserve the structure of networks, it makes the network structure be lack of flexibility since many network structure always transform in the modern society. Given this consideration, in this paper, we analyze the robustness of networks through setting a new constraint; that is, only the number of edges should be unchanged. Then, we use the link-robustness index (Rl) as the measure of the network robustness against either random failures or intentional attacks, and make a comparative analysis of network robustness against different types of link attacks. Moreover, we use four types of networks as initial networks, namely scale-free networks, random networks, regular networks, and small-world networks. The experimental results show that the values of robustness measures for the optimized networks starting from different initial networks are similar under different link attacks, but the network topologies may be different. That is to say, networks with different topologies may have similar robustness in terms of the robustness measures. We also find that the optimized networks obtained by one link attack may not robust against other link attacks, sometimes, even weaker than the original networks. Therefore, before building networks, it is better to study which type of link attacks may happen.

  15. Modeling attacker-defender interactions in information networks.

    SciTech Connect

    Collins, Michael Joseph

    2010-09-01

    The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in isolation from one another: an attacker seeks to penetrate or disrupt a system that has been protected to a given level, while a defender attempts to thwart particular attacks. Such a model also views all non-malicious parties as having the same goal of preventing all attacks. But in fact, attackers and defenders are interacting parts of the same system, and different defenders have their own individual interests: defenders may be willing to accept some risk of successful attack if the cost of defense is too high. We have used game theory to develop models of how non-cooperative but non-malicious players in a network interact when there is a substantial cost associated with effective defensive measures. Although game theory has been applied in this area before, we have introduced some novel aspects of player behavior in our work, including: (1) A model of how players attempt to avoid the costs of defense and force others to assume these costs; (2) A model of how players interact when the cost of defending one node can be shared by other nodes; and (3) A model of the incentives for a defender to choose less expensive, but less effective, defensive actions.

  16. Human behaviour can trigger large carnivore attacks in developed countries.

    PubMed

    Penteriani, Vincenzo; Delgado, María del Mar; Pinchera, Francesco; Naves, Javier; Fernández-Gil, Alberto; Kojola, Ilpo; Härkönen, Sauli; Norberg, Harri; Frank, Jens; Fedriani, José María; Sahlén, Veronica; Støen, Ole-Gunnar; Swenson, Jon E; Wabakken, Petter; Pellegrini, Mario; Herrero, Stephen; López-Bao, José Vicente

    2016-01-01

    The media and scientific literature are increasingly reporting an escalation of large carnivore attacks on humans in North America and Europe. Although rare compared to human fatalities by other wildlife, the media often overplay large carnivore attacks on humans, causing increased fear and negative attitudes towards coexisting with and conserving these species. Although large carnivore populations are generally increasing in developed countries, increased numbers are not solely responsible for the observed rise in the number of attacks by large carnivores. Here we show that an increasing number of people are involved in outdoor activities and, when doing so, some people engage in risk-enhancing behaviour that can increase the probability of a risky encounter and a potential attack. About half of the well-documented reported attacks have involved risk-enhancing human behaviours, the most common of which is leaving children unattended. Our study provides unique insight into the causes, and as a result the prevention, of large carnivore attacks on people. Prevention and information that can encourage appropriate human behaviour when sharing the landscape with large carnivores are of paramount importance to reduce both potentially fatal human-carnivore encounters and their consequences to large carnivores. PMID:26838467

  17. Detecting and isolating malicious nodes in wireless ad hoc networks

    NASA Astrophysics Data System (ADS)

    Li, Fanzhi; Jassim, Sabah

    2007-04-01

    Malicious nodes can seriously impair the performance of wireless ad hoc networks as a result of different actions such as packet dropping. Secure routes are shortest paths on which every node on the route is trusted even if unknown. Secure route discovery requires the adoption of mechanisms of associating trust to nodes. Most existing secure route discovery mechanisms rely on shared keys and digital signature. In the absence of central nodes that act as certification authority, such protocols suffer from heavy computational burden and are vulnerable to malicious attacks. In this paper we shall review existing techniques for secure routing and propose to complement route finding with creditability scores. Each node would have a credit list for its neighbors. Each node monitors its neighbors' pattern of delivering packets and regularly credits are reviewed and updated accordingly. Unlike most existing schemes the focus of our work is based on post route discovery stage, i.e. when packets are transmitted on discovered routes. The level of trust in any route will be based on the credits associated with the neighbors belonging to the discovered route. We shall evaluate the performance of the proposed scheme by modifying our simulation system so that each node has a dynamic changing "credit list" for its neighbors' behavior. We shall conduct a series of simulations with and without the proposed scheme and compare the results. We will demonstrate that the proposed mechanism is capable of isolating malicious nodes and thereby counteracting black hole attacks.

  18. Attack methodology Analysis: SQL Injection Attacks and Their Applicability to Control Systems

    SciTech Connect

    Bri Rolston

    2005-09-01

    Database applications have become a core component in control systems and their associated record keeping utilities. Traditional security models attempt to secure systems by isolating core software components and concentrating security efforts against threats specific to those computers or software components. Database security within control systems follows these models by using generally independent systems that rely on one another for proper functionality. The high level of reliance between the two systems creates an expanded threat surface. To understand the scope of a threat surface, all segments of the control system, with an emphasis on entry points, must be examined. The communication link between data and decision layers is the primary attack surface for SQL injection. This paper facilitates understanding what SQL injection is and why it is a significant threat to control system environments.

  19. Scattering States in AdS/CFT

    SciTech Connect

    Fitzpatrick, A.Liam; Kaplan, Jared; /SLAC

    2012-02-14

    We show that suitably regulated multi-trace primary states in large N CFTs behave like 'in' and 'out' scattering states in the flat-space limit of AdS. Their transition matrix elements approach the exact scattering amplitudes for the bulk theory, providing a natural CFT definition of the flat space S-Matrix. We study corrections resulting from the AdS curvature and particle propagation far from the center of AdS, and show that AdS simply provides an IR regulator that disappears in the flat space limit.

  20. ADS's Dexter Data Extraction Applet

    NASA Astrophysics Data System (ADS)

    Demleitner, M.; Accomazzi, A.; Eichhorn, G.; Grant, C. S.; Kurtz, M. J.; Murray, S. S.

    The NASA Astrophysics Data System (ADS) now holds 1.3 million scanned pages, containing numerous plots and figures for which the original data sets are lost or inaccessible. The availability of scans of the figures can significantly ease the regeneration of the data sets. For this purpose, the ADS has developed Dexter, a Java applet that supports the user in this process. Dexter's basic functionality is to let the user manually digitize a plot by marking points and defining the coordinate transformation from the logical to the physical coordinate system. Advanced features include automatic identification of axes, tracing lines and finding points matching a template. This contribution both describes the operation of Dexter from a user's point of view and discusses some of the architectural issues we faced during implementation.

  1. Realizing "value-added" metrology

    NASA Astrophysics Data System (ADS)

    Bunday, Benjamin; Lipscomb, Pete; Allgair, John; Patel, Dilip; Caldwell, Mark; Solecky, Eric; Archie, Chas; Morningstar, Jennifer; Rice, Bryan J.; Singh, Bhanwar; Cain, Jason; Emami, Iraj; Banke, Bill, Jr.; Herrera, Alfredo; Ukraintsev, Vladamir; Schlessinger, Jerry; Ritchison, Jeff

    2007-03-01

    The conventional premise that metrology is a "non-value-added necessary evil" is a misleading and dangerous assertion, which must be viewed as obsolete thinking. Many metrology applications are key enablers to traditionally labeled "value-added" processing steps in lithography and etch, such that they can be considered integral parts of the processes. Various key trends in modern, state-of-the-art processing such as optical proximity correction (OPC), design for manufacturability (DFM), and advanced process control (APC) are based, at their hearts, on the assumption of fine-tuned metrology, in terms of uncertainty and accuracy. These trends are vehicles where metrology thus has large opportunities to create value through the engineering of tight and targetable process distributions. Such distributions make possible predictability in speed-sorts and in other parameters, which results in high-end product. Additionally, significant reliance has also been placed on defect metrology to predict, improve, and reduce yield variability. The necessary quality metrology is strongly influenced by not only the choice of equipment, but also the quality application of these tools in a production environment. The ultimate value added by metrology is a result of quality tools run by a quality metrology team using quality practices. This paper will explore the relationships among present and future trends and challenges in metrology, including equipment, key applications, and metrology deployment in the manufacturing flow. Of key importance are metrology personnel, with their expertise, practices, and metrics in achieving and maintaining the required level of metrology performance, including where precision, matching, and accuracy fit into these considerations. The value of metrology will be demonstrated to have shifted to "key enabler of large revenues," debunking the out-of-date premise that metrology is "non-value-added." Examples used will be from critical dimension (CD

  2. Factors governing risk of cougar attacks on humans

    USGS Publications Warehouse

    Mattson, David; Logan, Kenneth; Sweanor, Linda

    2011-01-01

    Since the 1980s wildlife managers in the United States and Canada have expressed increasing concern about the physical threat posed by cougars (Puma concolor) to humans. We developed a conceptual framework and analyzed 386 human–cougar encounters (29 fatal attacks, 171 instances of nonfatal contact, and 186 close-threatening encounters) to provide information relevant to public safety. We conceived of human injury and death as the outcome of 4 transitions affected by different suites of factors: (1) a human encountering a cougar: (2) given an encounter, odds that the cougar would be aggressive; (3) given aggression, odds that the cougar would attack; and (4) given an attack, odds that the human would die. We developed multivariable logistic regression models to explain variation in odds at transitions three and four using variables pertaining to characteristics of involved people and cougars. Young (≤ 2.5 years) or unhealthy (by weight, condition, or disease) cougars were more likely than any others to be involved in close (typically <5 m) encounters that threatened the involved person. Of cougars in close encounters, females were more likely than males to attack, and of attacking animals, adults were more likely than juveniles to kill the victim (32% versus 9% fatality, respectively). During close encounters, victims who used a weapon killed the involved cougar in 82% of cases. Other mitigating behaviors (e.g., yelling, backing away, throwing objects, increasing stature) also substantially lessened odds of attack. People who were moving quickly or erratically when an encounter happened (running, playing, skiing, snowshoeing, biking, ATV-riding) were more likely to be attacked and killed compared to people who were less active (25% versus 8% fatality). Children (≤ 10 years) were more likely than single adults to be attacked, but intervention by people of any age reduced odds of a child’s death by 4.6×. Overall, cougar attacks on people in Canada and the

  3. Value of ABCD2-F in Predicting Cerebral Ischemic Attacks: Three Months Follow-Up after the Primary Attack.

    PubMed

    Chardoli, Mojtaba; Firoozabadi, Nader H; Nouri, Mohsen; Rahimi-Movaghar, Vafa

    2016-06-01

    Cerebrovascular attack (CVA) and transient ischemic attack (TIA) are major causes of emergency department visits around the globe. A significant number of these patients may experience repeat attacks if left untreated. Several risk stratifying scoring systems have been developed in recent years to point out the high risk patients. ABCD2 is based on age, blood pressure, clinical status, diabetes mellitus, and duration of symptoms and is used commonly for this purpose. In this study, we were to enhance its sensitivity and specificity with the addition of another criterion namely atrial fibrillation and making ABCD2-F. A prospective study in two hospitals was performed and 138 patients diagnosed with TIA/CVA were enrolled. Demographic, clinical, and paraclinical data of all patients were registered. All patients were followed for three months for any sign or symptom of a recurrent ischemic attack. Recurrent ischemic attacks happened in 9.4% of the patients. None of the criteria of ABCD2-F was associated with higher chance of ischemic attacks. Similarly, ABCD2-F was not different between patients with or without repeat cerebral ischemia. The addition of atrial fibrillation to ABCD2 did not enhance the accuracy of this scoring system to detect patients high risk for repeat cerebral ischemia. More studies in the future to improve sensitivity and specificity of this test are warranted. PMID:27306346

  4. A multiple linear regression analysis of hot corrosion attack on a series of nickel base turbine alloys

    NASA Technical Reports Server (NTRS)

    Barrett, C. A.

    1985-01-01

    Multiple linear regression analysis was used to determine an equation for estimating hot corrosion attack for a series of Ni base cast turbine alloys. The U transform (i.e., 1/sin (% A/100) to the 1/2) was shown to give the best estimate of the dependent variable, y. A complete second degree equation is described for the centered" weight chemistries for the elements Cr, Al, Ti, Mo, W, Cb, Ta, and Co. In addition linear terms for the minor elements C, B, and Zr were added for a basic 47 term equation. The best reduced equation was determined by the stepwise selection method with essentially 13 terms. The Cr term was found to be the most important accounting for 60 percent of the explained variability hot corrosion attack.

  5. Missing top of the AdS resonance structure

    NASA Astrophysics Data System (ADS)

    Yang, I.-Sheng

    2015-03-01

    We study a massless scalar field in AdSd +1 with a nonlinear coupling ϕN and not limited to spherical symmetry. The free-field-eigenstate spectrum is strongly resonant, and it is commonly believed that the nonlinear coupling leads to energy transfer between eigenstates. We prove that when N d is even, the most efficient resonant channels to transfer energy are always absent. In particular, for N =3 this means no energy transfer at all. For N =4 , this effectively kills half of the channels, leading to the same set of extra conservation laws recently derived for gravitational interactions within spherical symmetry.

  6. Magnetic mass in 4D AdS gravity

    NASA Astrophysics Data System (ADS)

    Araneda, René; Aros, Rodrigo; Miskovic, Olivera; Olea, Rodrigo

    2016-04-01

    We provide a fully covariant expression for the diffeomorphic charge in four-dimensional anti-de Sitter gravity, when the Gauss-Bonnet and Pontryagin terms are added to the action. The couplings of these topological invariants are such that the Weyl tensor and its dual appear in the on-shell variation of the action and such that the action is stationary for asymptotic (anti-)self-dual solutions in the Weyl tensor. In analogy with Euclidean electromagnetism, whenever the self-duality condition is global, both the action and the total charge are identically vanishing. Therefore, for such configurations, the magnetic mass equals the Ashtekhar-Magnon-Das definition.

  7. Canonical energy and hairy AdS black holes

    NASA Astrophysics Data System (ADS)

    Hyun, Seungjoon; Park, Sang-A.; Yi, Sang-Heon

    2016-08-01

    We propose the modified version of the canonical energy which was introduced originally by Hollands and Wald. Our construction depends only on the Euler-Lagrange expression of the system and thus is independent of the ambiguity in the Lagrangian. After some comments on our construction, we briefly mention on the relevance of our construction to the boundary information metric in the context of the AdS/CFT correspondence. We also study the stability of three-dimensional hairy extremal black holes by using our construction.

  8. Sleep attacks in patients taking dopamine agonists: review

    PubMed Central

    Homann, Carl Nikolaus; Wenzel, Karoline; Suppan, Klaudia; Ivanic, Gerd; Kriechbaum, Norbert; Crevenna, Richard; Ott, Erwin

    2002-01-01

    Objectives To assess the evidence for the existence and prevalence of sleep attacks in patients taking dopamine agonists for Parkinson's disease, the type of drugs implicated, and strategies for prevention and treatment. Design Review of publications between July 1999 and May 2001 in which sleep attacks or narcoleptic-like attacks were discussed in patients with Parkinson's disease. Results 124 patients with sleep events were found in 20 publications. Overall, 6.6% of patients taking dopamine agonists who attended movement disorder centres had sleep events. Men were over-represented. Sleep events occurred at both high and low doses of the drugs, with different durations of treatment (0-20 years), and with or without preceding signs of tiredness. Sleep attacks are a class effect, having been found in patients taking the following dopamine agonists: levodopa (monotherapy in 8 patients), ergot agonists (apomorphine in 2 patients, bromocriptine in 13, cabergoline in 1, lisuride or piribedil in 23, pergolide in 5,) and non-ergot agonists (pramipexole in 32, ropinirole in 38). Reports suggest two distinct types of events: those of sudden onset without warning and those of slow onset with prodrome drowsiness. Conclusion Insufficient data are available to provide effective guidelines for prevention and treatment of sleep events in patients taking dopamine agonists for Parkinson's disease. Prospective population based studies are needed to provide this information. What is already known on this topicCar crashes in patients with Parkinson's disease have been associated with sleep attacks caused by the dopamine agonists pramipexole and ropiniroleWhether sleep attacks exist, their connection with certain agonists, prevention or treatment, and the justification of legal actions are controversialWhat this study addsSleep attacks as a phenomenon distinct from normal somnolence really do existThey are a class effect of all dopamine drugsEffective prevention and treatment

  9. Trigeminal nociceptive transmission in migraineurs predicts migraine attacks.

    PubMed

    Stankewitz, Anne; Aderjan, David; Eippert, Falk; May, Arne

    2011-02-01

    Several lines of evidence suggest a major role of the trigeminovascular system in the pathogenesis of migraine. Using functional magnetic resonance imaging (fMRI), we compared brain responses during trigeminal pain processing in migraine patients with those of healthy control subjects. The main finding is that the activity of the spinal trigeminal nuclei in response to nociceptive stimulation showed a cycling behavior over the migraine interval. Although interictal (i.e., outside of attack) migraine patients revealed lower activations in the spinal trigeminal nuclei compared with controls, preictal (i.e., shortly before attack) patients showed activity similar to controls, which demonstrates that the trigeminal activation level increases over the pain-free migraine interval. Remarkably, the distance to the next headache attack was predictable by the height of the signal intensities in the spinal nuclei. Migraine patients scanned during the acute spontaneous migraine attack showed significantly lower signal intensities in the trigeminal nuclei compared with controls, demonstrating activity levels similar to interictal patients. Additionally we found-for the first time using fMRI-that migraineurs showed a significant increase in activation of dorsal parts of the pons, previously coined "migraine generator." Unlike the dorsal pons activation usually linked to migraine attacks, the gradient-like activity following nociceptive stimulation in the spinal trigeminal neurons likely reflects a raise in susceptibility of the brain to generate the next attack, as these areas increase their activity long before headache starts. This oscillating behavior may be a key player in the generation of migraine headache, whereas attack-specific pons activations are most likely a secondary event. PMID:21307231

  10. Attacks, applications, and evaluation of known watermarking algorithms with Checkmark

    NASA Astrophysics Data System (ADS)

    Meerwald, Peter; Pereira, Shelby

    2002-04-01

    The Checkmark benchmarking tool was introduced to provide a framework for application-oriented evaluation of watermarking schemes. In this article we introduce new attacks and applications into the existing Checkmark framework. In addition to describing new attacks and applications, we also compare the performance of some well-known watermarking algorithms (proposed by Bruyndonckx,Cox, Fridrich, Dugad, Kim, Wang, Xia, Xie, Zhu and Pereira) with respect to the Checkmark benchmark. In particular, we consider the non-geometric application which contains tests that do not change the geometry of image. This attack constraint is artificial, but yet important for research purposes since a number of algorithms may be interesting, but would score poorly with respect to specific applications simply because geometric compensation has not been incorporated. We note, however, that with the help of image registration, even research algorithms that do not have counter-measures against geometric distortion -- such as a template or reference watermark -- can be evaluated. In the first version of the Checkmark benchmarking program, application-oriented evaluation was introduced, along with many new attacks not already considered in the literature. A second goal of this paper is to introduce new attacks and new applications into the Checkmark framework. In particular, we introduce the following new applications: video frame watermarking, medical imaging and watermarking of logos. Video frame watermarking includes low compression attacks and distortions which warp the edges of the video as well as general projective transformations which may result from someone filming the screen at a cinema. With respect to medical imaging, only small distortions are considered and furthermore it is essential that no distortions are present at embedding. Finally for logos, we consider images of small sizes and particularly compression, scaling, aspect ratio and other small distortions. The challenge

  11. The ADS All Sky Survey

    NASA Astrophysics Data System (ADS)

    Goodman, Alyssa

    We will create the first interactive sky map of astronomers' understanding of the Universe over time. We will accomplish this goal by turning the NASA Astrophysics Data System (ADS), widely known for its unrivaled value as a literature resource, into a data resource. GIS and GPS systems have made it commonplace to see and explore information about goings-on on Earth in the context of maps and timelines. Our proposal shows an example of a program that lets a user explore which countries have been mentioned in the New York Times, on what dates, and in what kinds of articles. By analogy, the goal of our project is to enable this kind of exploration-on the sky-for the full corpus of astrophysical literature available through ADS. Our group's expertise and collaborations uniquely position us to create this interactive sky map of the literature, which we call the "ADS All-Sky Survey." To create this survey, here are the principal steps we need to follow. First, by analogy to "geotagging," we will "astrotag," the ADS literature. Many "astrotags" effectively already exist, thanks to curation efforts at both CDS and NED. These efforts have created links to "source" positions on the sky associated with each of the millions of articles in the ADS. Our collaboration with ADS and CDS will let us automatically extract astrotags for all existing and future ADS holdings. The new ADS Labs, which our group helps to develop, includes the ability for researchers to filter article search results using a variety of "facets" (e.g. sources, keywords, authors, observatories, etc.). Using only extracted astrotags and facets, we can create functionality like what is described in the Times example above: we can offer a map of the density of positions' "mentions" on the sky, filterable by the properties of those mentions. Using this map, researchers will be able to interactively, visually, discover what regions have been studied for what reasons, at what times, and by whom. Second, where

  12. Robustness of network of networks under targeted attack

    NASA Astrophysics Data System (ADS)

    Dong, Gaogao; Gao, Jianxi; Du, Ruijin; Tian, Lixin; Stanley, H. Eugene; Havlin, Shlomo

    2013-05-01

    The robustness of a network of networks (NON) under random attack has been studied recently [Gao , Phys. Rev. Lett.PRLTAO0031-900710.1103/PhysRevLett.107.195701 107, 195701 (2011)]. Understanding how robust a NON is to targeted attacks is a major challenge when designing resilient infrastructures. We address here the question how the robustness of a NON is affected by targeted attack on high- or low-degree nodes. We introduce a targeted attack probability function that is dependent upon node degree and study the robustness of two types of NON under targeted attack: (i) a tree of n fully interdependent Erdős-Rényi or scale-free networks and (ii) a starlike network of n partially interdependent Erdős-Rényi networks. For any tree of n fully interdependent Erdős-Rényi networks and scale-free networks under targeted attack, we find that the network becomes significantly more vulnerable when nodes of higher degree have higher probability to fail. When the probability that a node will fail is proportional to its degree, for a NON composed of Erdős-Rényi networks we find analytical solutions for the mutual giant component P∞ as a function of p, where 1-p is the initial fraction of failed nodes in each network. We also find analytical solutions for the critical fraction pc, which causes the fragmentation of the n interdependent networks, and for the minimum average degree k¯min below which the NON will collapse even if only a single node fails. For a starlike NON of n partially interdependent Erdős-Rényi networks under targeted attack, we find the critical coupling strength qc for different n. When q>qc, the attacked system undergoes an abrupt first order type transition. When q≤qc, the system displays a smooth second order percolation transition. We also evaluate how the central network becomes more vulnerable as the number of networks with the same coupling strength q increases. The limit of q=0 represents no dependency, and the results are consistent with

  13. Capacity and optimal collusion attack channels for Gaussian fingerprinting games

    NASA Astrophysics Data System (ADS)

    Wang, Ying; Moulin, Pierre

    2007-02-01

    In content fingerprinting, the same media covertext - image, video, audio, or text - is distributed to many users. A fingerprint, a mark unique to each user, is embedded into each copy of the distributed covertext. In a collusion attack, two or more users may combine their copies in an attempt to "remove" their fingerprints and forge a pirated copy. To trace the forgery back to members of the coalition, we need fingerprinting codes that can reliably identify the fingerprints of those members. Researchers have been focusing on designing or testing fingerprints for Gaussian host signals and the mean square error (MSE) distortion under some classes of collusion attacks, in terms of the detector's error probability in detecting collusion members. For example, under the assumptions of Gaussian fingerprints and Gaussian attacks (the fingerprinted signals are averaged and then the result is passed through a Gaussian test channel), Moulin and Briassouli1 derived optimal strategies in a game-theoretic framework that uses the detector's error probability as the performance measure for a binary decision problem (whether a user participates in the collusion attack or not); Stone2 and Zhao et al. 3 studied average and other non-linear collusion attacks for Gaussian-like fingerprints; Wang et al. 4 stated that the average collusion attack is the most efficient one for orthogonal fingerprints; Kiyavash and Moulin 5 derived a mathematical proof of the optimality of the average collusion attack under some assumptions. In this paper, we also consider Gaussian cover signals, the MSE distortion, and memoryless collusion attacks. We do not make any assumption about the fingerprinting codes used other than an embedding distortion constraint. Also, our only assumptions about the attack channel are an expected distortion constraint, a memoryless constraint, and a fairness constraint. That is, the colluders are allowed to use any arbitrary nonlinear strategy subject to the above

  14. Learning from history: The Glasgow Airport terrorist attack.

    PubMed

    Crichton, Gillies

    Glasgow Airport was the target of a terrorist attack on 30th June, 2007. Many people within Scotland had come to believe that Scotland was immune from terrorism. This perception was in large part informed by Scotland's experience during the protracted Troubles in Northern Ireland, during which the Provisional Irish Republican Army's mainland bombing campaign focused on targets in England, sparing both Scotland and Wales. While Glasgow Airport did not expect such an attack to take place, meticulous planning, organising and testing of plans had taken place to mitigate the unlikely event of such an attack. The attack stands up as a shining example of robust business continuity management, where the airport reopened for business as usual in less than 24 hours from the time of the attack. Little is known about how the airport handled the situation in conjunction with other responding agencies as people tend to want to focus on high-profile disasters only. Yet countless such incidents are happening worldwide on a daily basis, in which there are excellent learning opportunities, and, taken in the spirit of converting hindsight into foresight, the likelihood of similar incidents could potentially be reduced in the future. PMID:25416378

  15. Impact of Degree Heterogeneity on Attack Vulnerability of Interdependent Networks.

    PubMed

    Sun, Shiwen; Wu, Yafang; Ma, Yilin; Wang, Li; Gao, Zhongke; Xia, Chengyi

    2016-01-01

    The study of interdependent networks has become a new research focus in recent years. We focus on one fundamental property of interdependent networks: vulnerability. Previous studies mainly focused on the impact of topological properties upon interdependent networks under random attacks, the effect of degree heterogeneity on structural vulnerability of interdependent networks under intentional attacks, however, is still unexplored. In order to deeply understand the role of degree distribution and in particular degree heterogeneity, we construct an interdependent system model which consists of two networks whose extent of degree heterogeneity can be controlled simultaneously by a tuning parameter. Meanwhile, a new quantity, which can better measure the performance of interdependent networks after attack, is proposed. Numerical simulation results demonstrate that degree heterogeneity can significantly increase the vulnerability of both single and interdependent networks. Moreover, it is found that interdependent links between two networks make the entire system much more fragile to attacks. Enhancing coupling strength between networks can greatly increase the fragility of both networks against targeted attacks, which is most evident under the case of max-max assortative coupling. Current results can help to deepen the understanding of structural complexity of complex real-world systems. PMID:27609483

  16. Risk of Wheezing Attacks in Infants With Transient Tachypnea Newborns

    PubMed Central

    Golshantafti, Mohammad; Yavari, Tahereh; Afrand, Mohammadhosain

    2016-01-01

    Background: The most common reason of respiratory distress in the newborn is transient tachypnea of the newborn (TTN). There are some reports saying that TTN is associated with increased frequencies of wheezing attacks. Objectives: The aims of this study were to determine the risk factors associated with TTN and to determine the association between TTN and the development of wheezing syndromes in early life. Materials and Methods: In a historical cohort study, we recorded the characteristics of 70 infants born at the Shohadaye Kargar Hospital in Yazd between March 2005 and March 2009 and who were hospitalized because of TTN in the neonatal intensive-care unit. We called their parents at least four years after the infants were discharged from the hospital and asked about any wheezing attacks. Seventy other infants with no health problems during the newborn period were included in the study as the control group. Results: The rate of wheezing attacks in newborns with TTN was more than patients with no TTN diagnosis (P = 0.014). TTN was found to be an independent risk factor for later wheezing attacks (relative risk [RR] = 2.8). Conclusions: The most obvious finding of this study was that TTN was an independent risk factor for wheezing attacks. So long-term medical care is suggested for these patients who may be at risk, because TTN may not be as transient as has been previously thought. PMID:26848370

  17. Deployable Overlay Network for Defense against Distributed SYN Flood Attacks

    NASA Astrophysics Data System (ADS)

    Ohsita, Yuichi; Ata, Shingo; Murata, Masayuki

    Distributed denial-of-service attacks on public servers have recently become more serious. Most of them are SYN flood attacks, since the malicious attackers can easily exploit the TCP specification to generate traffic making public servers unavailable. We need a defense method which can protect legitimate traffic so that end users can connect the target servers during such attacks. In this paper, we propose a new framework, in which all of the TCP connections to the victim servers from a domain are maintained at the gateways of the domain (i. e., near the clients). We call the nodes maintaining the TCP connection defense nodes. The defense nodes check whether arriving packets are legitimate or not by maintaining the TCP connection. That is, the defense nodes delegate reply packets to the received connection request packets and identify the legitimate packets by checking whether the clients reply to the reply packets. Then, only identified traffic are relayed via overlay networks. As a result, by deploying the defense nodes at the gateways of a domain, the legitimate packets from the domain are relayed apart from other packets including attack packets and protected. Our simulation results show that our method can protect legitimate traffic from the domain deploying our method. We also describe the deployment scenario of our defense mechanism.

  18. Adaptive Timer-Based Countermeasures against TCP SYN Flood Attacks

    NASA Astrophysics Data System (ADS)

    Tanabe, Masao; Akaike, Hirofumi; Aida, Masaki; Murata, Masayuki; Imase, Makoto

    As a result of the rapid development of the Internet in recent years, network security has become an urgent issue. Distributed denial of service (DDoS) attacks are one of the most serious security issues. In particular, 60 percent of the DDoS attacks found on the Internet are TCP attacks, including SYN flood attacks. In this paper, we propose adaptive timer-based countermeasures against SYN flood attacks. Our proposal utilizes the concept of soft-state protocols that are widely used for resource management on the Internet. In order to avoid deadlock, a server releases resources using a time-out mechanism without any explicit requests from its clients. If we change the value of the timer in accordance with the network conditions, we can add more flexibility to the soft-state protocols. The timer is used to manage the resources assigned to half-open connections in a TCP 3-way handshake mechanism, and its value is determined adaptively according to the network conditions. In addition, we report our simulation results to show the effectiveness of our approach.

  19. Myocardial perfusion imaging study of CO(2)-induced panic attack.

    PubMed

    Soares-Filho, Gastão L F; Machado, Sergio; Arias-Carrión, Oscar; Santulli, Gaetano; Mesquita, Claudio T; Cosci, Fiammetta; Silva, Adriana C; Nardi, Antonio E

    2014-01-15

    Chest pain is often seen alongside with panic attacks. Moreover, panic disorder has been suggested as a risk factor for cardiovascular disease and even a trigger for acute coronary syndrome. Patients with coronary artery disease may have myocardial ischemia in response to mental stress, in which panic attack is a strong component, by an increase in coronary vasomotor tone or sympathetic hyperactivity setting off an increase in myocardial oxygen consumption. Indeed, coronary artery spasm was presumed to be present in cases of cardiac ischemia linked to panic disorder. These findings correlating panic disorder with coronary artery disease lead us to raise questions about the favorable prognosis of chest pain in panic attack. To investigate whether myocardial ischemia is the genesis of chest pain in panic attacks, we developed a myocardial perfusion study through research by myocardial scintigraphy in patients with panic attacks induced in the laboratory by inhalation of 35% carbon dioxide. In conclusion, from the data obtained, some hypotheses are discussed from the viewpoint of endothelial dysfunction and microvascular disease present in mental stress response. PMID:24188891

  20. Why do chimpanzee males attack the females of neighboring communities?

    PubMed

    Pradhan, Gauri R; Pandit, Sagar A; Van schaik, Carel P

    2014-11-01

    Our closest nonhuman primate relatives, chimpanzees, engage in potentially lethal between-group conflict; this collective aggressive behavior shows parallels with human warfare. In some communities, chimpanzee males also severely attack and even kill females of the neighboring groups. This is surprising given their system of resource defense polygyny, where males are expected to acquire potential mates. We develop a simple mathematical model based on reproductive skew among primate males to solve this puzzle. The model predicts that it is advantageous for high-ranking males but not for low-ranking males to attack females. It also predicts that more males gain a benefit from attacking females as the community's reproductive skew decreases, i.e., as mating success is more evenly distributed. Thus, fatal attacks on females should be concentrated in communities with low reproductive skew. These attacks should also concur with between-community infanticide. A review of the chimpanzee literature provides enough preliminary support for this prediction to warrant more detailed testing. PMID:25100507

  1. Protecting infrastructure networks from cost-based attacks

    NASA Astrophysics Data System (ADS)

    Wang, Xingang; Guan, Shuguang; Heng Lai, Choy

    2009-03-01

    It is well known that heterogeneous networks are vulnerable to the intentional removal of a small fraction of highly connected or loaded nodes, implying that to protect the network effectively, the important nodes should be allocated more defense resource than the others. However, if too much resource is allocated to the few important nodes, the numerous less-important nodes will be less protected, which if attacked together can still lead to devastating damage. A natural question is therefore how to efficiently distribute the limited defense resource among the network nodes such that the network damage is minimized against any attack strategy. In this paper, taking into account the factor of attack cost, the problem of network security is reconsidered in terms of efficient network defense against cost-based attacks. The results show that, for a general complex network, there exists an optimal distribution of the defense resource with which the network is best protected from cost-based attacks. Furthermore, it is found that the configuration of the optimal defense is dependent on the network parameters. Specifically, networks of larger size, sparser connection and more heterogeneous structure will more likely benefit from the defense optimization.

  2. Pharmacokinetics of rizatriptan tablets during and between migraine attacks.

    PubMed

    Cutler, N R; Jhee, S S; Majumdar, A K; McLaughlin, D; Brucker, M J; Carides, A D; Kramer, M S; Matzura-Wolfe, D; Reines, S A; Goldberg, M R

    1999-04-01

    Gastric stasis during migraine attacks results in delayed absorption of several orally administered antimigraine agents. This study, as part of a larger trial, was conducted to examine the pharmacokinetics of rizatriptan tablets during and between migraine attacks. Participating patients met IHS criteria for migraine with or without aura, and suffered between one and eight migraines per month for the previous 6 months. In part 1 of the study, 21 patients were randomized to receive a single 5-mg tablet of rizatriptan or placebo in the migraine-free state. In part 2, the same patients were treated during migraine with rizatriptan 5-mg tablets (n=18) or placebo (n=3). Blood samples were obtained before dosing and 0.25, 0.5, 0.75, 1, 1.5, 2, 3, 4, 6, 8, and 12 hours after dosing. The plasma concentration profile (ie, AUC((0-infinity)), C(max), T(max)) of rizatriptan 5-mg tablets administered during and between migraine attacks were comparable. The median T(max) for rizatriptan between and during attacks was 1 hour, indicating rapid absorption even during a migraine attack. Rizatriptan 5 mg was well tolerated and 67% of the patients experienced headache relief 2 hours postdose. PMID:15613223

  3. Automatic analysis of attack data from distributed honeypot network

    NASA Astrophysics Data System (ADS)

    Safarik, Jakub; Voznak, MIroslav; Rezac, Filip; Partila, Pavol; Tomala, Karel

    2013-05-01

    There are many ways of getting real data about malicious activity in a network. One of them relies on masquerading monitoring servers as a production one. These servers are called honeypots and data about attacks on them brings us valuable information about actual attacks and techniques used by hackers. The article describes distributed topology of honeypots, which was developed with a strong orientation on monitoring of IP telephony traffic. IP telephony servers can be easily exposed to various types of attacks, and without protection, this situation can lead to loss of money and other unpleasant consequences. Using a distributed topology with honeypots placed in different geological locations and networks provides more valuable and independent results. With automatic system of gathering information from all honeypots, it is possible to work with all information on one centralized point. Communication between honeypots and centralized data store use secure SSH tunnels and server communicates only with authorized honeypots. The centralized server also automatically analyses data from each honeypot. Results of this analysis and also other statistical data about malicious activity are simply accessible through a built-in web server. All statistical and analysis reports serve as information basis for an algorithm which classifies different types of used VoIP attacks. The web interface then brings a tool for quick comparison and evaluation of actual attacks in all monitored networks. The article describes both, the honeypots nodes in distributed architecture, which monitor suspicious activity, and also methods and algorithms used on the server side for analysis of gathered data.

  4. Deterring watermark collusion attacks using signal processing techniques

    NASA Astrophysics Data System (ADS)

    Lemma, Aweke N.; van der Veen, Michiel

    2007-02-01

    Collusion attack is a malicious watermark removal attack in which the hacker has access to multiple copies of the same content with different watermarks and tries to remove the watermark using averaging. In the literature, several solutions to collusion attacks have been reported. The main stream solutions aim at designing watermark codes that are inherently resistant to collusion attacks. The other approaches propose signal processing based solutions that aim at modifying the watermarked signals in such a way that averaging multiple copies of the content leads to a significant degradation of the content quality. In this paper, we present signal processing based technique that may be deployed for deterring collusion attacks. We formulate the problem in the context of electronic music distribution where the content is generally available in the compressed domain. Thus, we first extend the collusion resistance principles to bit stream signals and secondly present experimental based analysis to estimate a bound on the maximum number of modified versions of a content that satisfy good perceptibility requirement on one hand and destructive averaging property on the other hand.

  5. Impact of Degree Heterogeneity on Attack Vulnerability of Interdependent Networks

    PubMed Central

    Sun, Shiwen; Wu, Yafang; Ma, Yilin; Wang, Li; Gao, Zhongke; Xia, Chengyi

    2016-01-01

    The study of interdependent networks has become a new research focus in recent years. We focus on one fundamental property of interdependent networks: vulnerability. Previous studies mainly focused on the impact of topological properties upon interdependent networks under random attacks, the effect of degree heterogeneity on structural vulnerability of interdependent networks under intentional attacks, however, is still unexplored. In order to deeply understand the role of degree distribution and in particular degree heterogeneity, we construct an interdependent system model which consists of two networks whose extent of degree heterogeneity can be controlled simultaneously by a tuning parameter. Meanwhile, a new quantity, which can better measure the performance of interdependent networks after attack, is proposed. Numerical simulation results demonstrate that degree heterogeneity can significantly increase the vulnerability of both single and interdependent networks. Moreover, it is found that interdependent links between two networks make the entire system much more fragile to attacks. Enhancing coupling strength between networks can greatly increase the fragility of both networks against targeted attacks, which is most evident under the case of max-max assortative coupling. Current results can help to deepen the understanding of structural complexity of complex real-world systems. PMID:27609483

  6. Transient ischemic attack: Part II. Risk factor modification and treatment.

    PubMed

    Simmons, B Brent; Gadegbeku, Annette B; Cirignano, Barbara

    2012-09-15

    Interventions following a transient ischemic attack are aimed at preventing a future episode or stroke. Hypertension, current smoking, obesity, physical inactivity, diabetes mellitus, and dyslipidemia are all well-known risk factors, and controlling these factors can have dramatic effects on transient ischemic attack and stroke risk. For patients presenting within 48 hours of resolution of transient ischemic attack symptoms, advantages of hospital admission include rapid diagnostic evaluation and early intervention to reduce the risk of stroke. For long-term prevention of future stroke, the American Heart Association/American Stroke Association recommends antiplatelet agents, statins, and carotid artery intervention for advanced stenosis. Aspirin, extended-release dipyridamole/aspirin, and clopidogrel are acceptable first-line antiplatelet agents. Statins have also been shown to reduce the risk of stroke following transient ischemic attack, with maximal benefit occurring with at least a 50 percent reduction in low-density lipoprotein cholesterol level or a target of less than 70 mg per dL (1.81 mmol per L). For those with transient ischemic attack and carotid artery stenosis, carotid endarterectomy is recommended if stenosis is 70 to 99 percent, and perioperative morbidity and mortality are estimated to be less than 6 percent. PMID:23062044

  7. Gait biometrics under spoofing attacks: an experimental investigation

    NASA Astrophysics Data System (ADS)

    Hadid, Abdenour; Ghahramani, Mohammad; Kellokumpu, Vili; Feng, Xiaoyi; Bustard, John; Nixon, Mark

    2015-11-01

    Gait is a relatively biometric modality which has a precious advantage over other modalities, such as iris and voice, in that it can be easily captured from a distance. Although it has recently become a topic of great interest in biometric research, there has been little investigation into gait spoofing attacks where a person tries to imitate the clothing or walking style of someone else. We recently analyzed for the first time the effects of spoofing attacks on silhouette-based gait biometric systems and showed that it was indeed possible to spoof gait biometric systems by clothing impersonation and the deliberate selection of a target that has a similar build to the attacker. To gain deeper insight into the performance of current gait biometric systems under spoofing attacks, we provide a thorough investigation on how clothing can be used to spoof a target and evaluate the performance of two state-of-the-art recognition methods on a gait spoofing database recorded at the University of Southampton. Furthermore, we describe and evaluate an initial solution coping with gait spoofing attacks. The obtained results are very promising and point out interesting findings which can be used for future investigations.

  8. 3 CFR - Continuation of the National Emergency With Respect to Certain Terrorist Attacks

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... to Certain Terrorist Attacks Presidential Documents Other Presidential Documents Notice of September 10, 2013 Continuation of the National Emergency With Respect to Certain Terrorist Attacks Consistent... terrorist attacks of September 11, 2001, and the continuing and immediate threat of further attacks on...

  9. 3 CFR - Continuation of the National Emergency With Respect to Certain Terrorist Attacks

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... to Certain Terrorist Attacks Presidential Documents Other Presidential Documents Notice of September 10, 2010 Continuation of the National Emergency With Respect to Certain TerroristAttacks Consistent... terrorist attacks of September 11, 2001,and the continuing and immediate threat of further attacks on...

  10. 3 CFR - Continuation of the National Emergency With Respect to Certain Terrorist Attacks

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... to Certain Terrorist Attacks Presidential Documents Other Presidential Documents Notice of September 9, 2011 Continuation of the National Emergency With Respect to Certain Terrorist Attacks Consistent... terrorist attacks of September 11, 2001, and the continuing and immediate threat of further attacks on...

  11. Learn What a Heart Attack Feels Like--It Could Save Your Life

    MedlinePlus

    Learn What a Heart Attack Feels Like— It Could Save Your Life. This fact sheet tells you about heart attack signs. It also tells you what to do ... your life. 1. Know the signs of a heart attack. 2. Understand that heart attacks are not all ...

  12. The inside outs of AdS3/CFT2: exact AdS wormholes with entangled CFT duals

    NASA Astrophysics Data System (ADS)

    Mandal, Gautam; Sinha, Ritam; Sorokhaibam, Nilakash

    2015-01-01

    We present the complete family of solutions of 3D gravity (Λ < 0) with two asymptotically AdS exterior regions. The solutions are constructed from data at the two boundaries, which correspond to two independent and arbitrary stress tensors T R , , and T L , . The two exteriors are smoothly joined on to an interior region through a regular horizon. We find CFT duals of these geometries which are entangled states of two CFT's. We compute correlators between general operators at the two boundaries and find perfect agreement between CFT and bulk calculations. We calculate and match the CFT entanglement entropy (EE) with the holographic EE which involves geodesics passing through the wormhole. We also compute a holographic, non-equilibrium entropy for the CFT using properties of the regular horizon. The construction of the bulk solutions here uses an exact version of Brown-Henneaux type diffeomorphisms which are asymptotically nontrivial and transform the CFT states by two independent unitary operators on the two sides. Our solutions provide an infinite family of explicit examples of the ER=EPR relation of Maldacena and Susskind [1].

  13. RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks

    NASA Astrophysics Data System (ADS)

    Kim, Chong Hee; Avoine, Gildas

    RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud and terrorist fraud attacks. Among them mafia fraud attack is the most serious since this attack can be mounted without the notice of both the reader and the tag. An adversary performs a kind of man-in-the-middle attack between the reader and the tag. It is very difficult to prevent this attack since the adversary does not change any data between the reader and the tag. Recently distance bounding protocols measuring the round-trip time between the reader and the tag have been researched to prevent this attack.

  14. Gray Matter Is Targeted in First-Attack Multiple Sclerosis

    SciTech Connect

    Schutzer, Steven E.; Angel, Thomas E.; Liu, Tao; Schepmoes, Athena A.; Xie, Fang; Bergquist, Jonas P.; Vecsei, Lazlo'; Zadori, Denes; Camp, David G.; Holland, Bart K.; Smith, Richard D.; Coyle, Patricia K.

    2013-09-10

    The cause of multiple sclerosis (MS), its driving pathogenesis at the earliest stages, and what factors allow the first clinical attack to manifest remain unknown. Some imaging studies suggest gray rather than white matter may be involved early, and some postulate this may be predictive of developing MS. Other imaging studies are in conflict. To determine if there was objective molecular evidence of gray matter involvement in early MS we used high-resolution mass spectrometry to identify proteins in the cerebrospinal fluid (CSF) of first-attack MS patients (two independent groups) compared to established relapsing remitting (RR) MS and controls. We found that the CSF proteins in first-attack patients were differentially enriched for gray matter components (axon, neuron, synapse). Myelin components did not distinguish these groups. The results support that gray matter dysfunction is involved early in MS, and also may be integral for the initial clinical presentation.

  15. Performance analysis for geometrical attack on digital image watermarking

    NASA Astrophysics Data System (ADS)

    Jayanthi, VE.; Rajamani, V.; Karthikayen, P.

    2011-11-01

    We present a technique for irreversible watermarking approach robust to affine transform attacks in camera, biomedical and satellite images stored in the form of monochrome bitmap images. The watermarking approach is based on image normalisation in which both watermark embedding and extraction are carried out with respect to an image normalised to meet a set of predefined moment criteria. The normalisation procedure is invariant to affine transform attacks. The result of watermarking scheme is suitable for public watermarking applications, where the original image is not available for watermark extraction. Here, direct-sequence code division multiple access approach is used to embed multibit text information in DCT and DWT transform domains. The proposed watermarking schemes are robust against various types of attacks such as Gaussian noise, shearing, scaling, rotation, flipping, affine transform, signal processing and JPEG compression. Performance analysis results are measured using image processing metrics.

  16. Acute kidney injury after massive attack of Africanised bees.

    PubMed

    Bridi, Ramaiane A; Balbi, Andre Luis; Neves, Precil M; Ponce, Daniela

    2014-01-01

    Acute kidney injury (AKI) is a well-documented complication of massive attack by Africanised bees and can be observed 48-72 h after the accident. We report a case of Africanised bees attack followed by severe and lethal AKI. A 56-year-old man was admitted to emergency department after a massive attack of Africanised bees (>1000 bee stings). He was unconscious, presenting with hypotension and tachycardia. Mechanical ventilation, volume expansion and care for anaphylaxis were instituted. The patient was transferred to the intensive care unit (ICU) and after 48 h he developed rhabdomyolysis, oliguria, increased creatinine levels, hyperkalaemia and refractory acidosis. A diagnosis of AKI secondary to rhabdomyolysis and shock was made. The patient was treated with a prolonged course of haemodialysis. However, he progressed to refractory shock and died 5 days after admission. PMID:24618864

  17. Iterative phase retrieval algorithms. Part II: Attacking optical encryption systems.

    PubMed

    Guo, Changliang; Liu, Shi; Sheridan, John T

    2015-05-20

    The modified iterative phase retrieval algorithms developed in Part I [Guo et al., Appl. Opt.54, 4698 (2015)] are applied to perform known plaintext and ciphertext attacks on amplitude encoding and phase encoding Fourier-transform-based double random phase encryption (DRPE) systems. It is shown that the new algorithms can retrieve the two random phase keys (RPKs) perfectly. The performances of the algorithms are tested by using the retrieved RPKs to decrypt a set of different ciphertexts encrypted using the same RPKs. Significantly, it is also shown that the DRPE system is, under certain conditions, vulnerable to ciphertext-only attack, i.e., in some cases an attacker can decrypt DRPE data successfully when only the ciphertext is intercepted. PMID:26192505

  18. A Model of Biological Attacks on a Realistic Population

    NASA Astrophysics Data System (ADS)

    Carley, Kathleen M.; Fridsma, Douglas; Casman, Elizabeth; Altman, Neal; Chen, Li-Chiou; Kaminsky, Boris; Nave, Demian; Yahja, Alex

    The capability to assess the impacts of large-scale biological attacks and the efficacy of containment policies is critical and requires knowledge-intensive reasoning about social response and disease transmission within a complex social system. There is a close linkage among social networks, transportation networks, disease spread, and early detection. Spatial dimensions related to public gathering places such as hospitals, nursing homes, and restaurants, can play a major role in epidemics [Klovdahl et. al. 2001]. Like natural epidemics, bioterrorist attacks unfold within spatially defined, complex social systems, and the societal and networked response can have profound effects on their outcome. This paper focuses on bioterrorist attacks, but the model has been applied to emergent and familiar diseases as well.

  19. Aerodynamic characteristics of airplanes at high angles of attack

    NASA Technical Reports Server (NTRS)

    Chambers, J. R.; Grafton, S. B.

    1977-01-01

    An introduction to, and a broad overiew of, the aerodynamic characteristics of airplanes at high angles of attack are provided. Items include: (1) some important fundamental phenomena which determine the aerodynamic characteristics of airplanes at high angles of attack; (2) static and dynamic aerodynamic characteristics near the stall; (3) aerodynamics of the spin; (4) test techniques used in stall/spin studies; (5) applications of aerodynamic data to problems in flight dynamics in the stall/spin area; and (6) the outlook for future research in the area. Although stalling and spinning are flight dynamic problems of importance to all aircraft, including general aviation aircraft, commercial transports, and military airplanes, emphasis is placed on military configurations and the principle aerodynamic factors which influence the stability and control of such vehicles at high angles of attack.

  20. A case of hereditary angioedema involving recurrent abdominal attacks.

    PubMed

    Kasamatsu, Yoshihiro; Yoshinoya, Kiyokazu; Kasamatsu, Yu; Yamamoto, Tetsuro; Horiuchi, Takahiko; Kadoya, Masatoshi

    2011-01-01

    A 44-year-old Japanese woman was diagnosed with type 1 hereditary angioedema (HAE) at the age of 30. In March 2007, she began suffering from severe abdominal pain due to intestinal edema. After treatment with C1-INH concentrate, her symptoms disappeared. However, during the subsequent three years, the frequency of the attacks increased continuously, and C1-INH concentrate was necessary for treatment of every attack. The increase in the number of attacks might have been due to the frequent injection of C1-INH concentrate or the deterioration of her disease course. In a genetic investigation, the patient was found to have a novel mutation in the C1-INH gene. PMID:22129507

  1. Aerodynamic characteristics of cruciform missiles at high angles of attack

    NASA Technical Reports Server (NTRS)

    Lesieutre, Daniel J.; Mendenhall, Michael R.; Nazario, Susana M.; Hemsch, Michael J.

    1987-01-01

    An aerodynamic prediction method for missile aerodynamic performance and preliminary design has been developed to utilize a newly available systematic fin data base and an improved equivalent angle of attack methodology. The method predicts total aerodynamic loads and individual fin forces and moments for body-tail (wing-body) and canard-body-tail configurations with cruciform fin arrangements. The data base and the prediction method are valid for angles of attack up to 45 deg, arbitrary roll angles, fin deflection angles between -40 deg and 40 deg, Mach numbers between 0.6 and 4.5, and fin aspect ratios between 0.25 and 4.0. The equivalent angle of attack concept is employed to include the effects of vorticity and geometric scaling.

  2. A Threshold-Adaptive Reputation System on Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Tsai, Hsiao-Chien; Lo, Nai-Wei; Wu, Tzong-Chen

    In recent years huge potential benefits from novel applications in mobile ad hoc networks (MANET) have been discussed extensively. However, without robust security mechanisms and systems to provide safety shell through the MANET infrastructure, MANET applications can be vulnerable and hammered by malicious attackers easily. In order to detect misbehaved message routing and identify malicious attackers in MANET, schemes based on reputation concept have shown their advantages in this area in terms of good scalability and simple threshold-based detection strategy. We observed that previous reputation schemes generally use predefined thresholds which do not take into account the effect of behavior dynamics between nodes in a period of time. In this paper, we propose a Threshold-Adaptive Reputation System (TARS) to overcome the shortcomings of static threshold strategy and improve the overall MANET performance under misbehaved routing attack. A fuzzy-based inference engine is introduced to evaluate the trustiness of a node's one-hop neighbors. Malicious nodes whose trust values are lower than the adaptive threshold, will be detected and filtered out by their honest neighbors during trustiness evaluation process. The results of network simulation show that the TARS outperforms other compared schemes under security attacks in most cases and at the same time reduces the decrease of total packet delivery ratio by 67% in comparison with MANET without reputation system.

  3. Defending networks against denial-of-service attacks

    NASA Astrophysics Data System (ADS)

    Gelenbe, Erol; Gellman, Michael; Loukas, George

    2004-11-01

    Denial of service attacks, viruses and worms are common tools for malicious adversarial behavior in networks. Experience shows that over the last few years several of these techniques have probably been used by governments to impair the Internet communications of various entities, and we can expect that these and other information warfare tools will be used increasingly as part of hostile behavior either independently, or in conjunction with other forms of attack in conventional or asymmetric warfare, as well as in other forms of malicious behavior. In this paper we concentrate on Distributed Denial of Service Attacks (DDoS) where one or more attackers generate flooding traffic and direct it from multiple sources towards a set of selected nodes or IP addresses in the Internet. We first briefly survey the literature on the subject, and discuss some examples of DDoS incidents. We then present a technique that can be used for DDoS protection based on creating islands of protection around a critical information infrastructure. This technique, that we call the CPN-DoS-DT (Cognitive Packet Networks DoS Defence Technique), creates a self-monitoring sub-network surrounding each critical infrastructure node. CPN-DoS-DT is triggered by a DDoS detection scheme, and generates control traffic from the objects of the DDoS attack to the islands of protection where DDOS packet flows are destroyed before they reach the critical infrastructure. We use mathematical modelling, simulation and experiments on our test-bed to show the positive and negative outcomes that may result from both the attack, and the CPN-DoS-DT protection mechanism, due to imperfect detection and false alarms.

  4. VoIP attacks detection engine based on neural network

    NASA Astrophysics Data System (ADS)

    Safarik, Jakub; Slachta, Jiri

    2015-05-01

    The security is crucial for any system nowadays, especially communications. One of the most successful protocols in the field of communication over IP networks is Session Initiation Protocol. It is an open-source project used by different kinds of applications, both open-source and proprietary. High penetration and text-based principle made SIP number one target in IP telephony infrastructure, so security of SIP server is essential. To keep up with hackers and to detect potential malicious attacks, security administrator needs to monitor and evaluate SIP traffic in the network. But monitoring and following evaluation could easily overwhelm the security administrator in networks, typically in networks with a number of SIP servers, users and logically or geographically separated networks. The proposed solution lies in automatic attack detection systems. The article covers detection of VoIP attacks through a distributed network of nodes. Then the gathered data analyze aggregation server with artificial neural network. Artificial neural network means multilayer perceptron network trained with a set of collected attacks. Attack data could also be preprocessed and verified with a self-organizing map. The source data is detected by distributed network of detection nodes. Each node contains a honeypot application and traffic monitoring mechanism. Aggregation of data from each node creates an input for neural networks. The automatic classification on a centralized server with low false positive detection reduce the cost of attack detection resources. The detection system uses modular design for easy deployment in final infrastructure. The centralized server collects and process detected traffic. It also maintains all detection nodes.

  5. Assessing Terrorist Motivations for Attacking Critical "Chemical" Infrastructure

    SciTech Connect

    Ackerman, G; Bale, J; Moran, K

    2004-12-14

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security, and way of life. One particular type of CI--that relating to chemicals--constitutes both an important element of our nation's infrastructure and a particularly attractive set of potential targets. This is primarily because of the large quantities of toxic industrial chemicals (TICs) it employs in various operations and because of the essential economic functions it serves. This study attempts to minimize some of the ambiguities that presently impede chemical infrastructure threat assessments by providing new insight into the key motivational factors that affect terrorist organizations propensity to attack chemical facilities. Prepared as a companion piece to the Center for Nonproliferation Studies August 2004 study--''Assessing Terrorist Motivations for Attacking Critical Infrastructure''--it investigates three overarching research questions: (1) why do terrorists choose to attack chemical-related infrastructure over other targets; (2) what specific factors influence their target selection decisions concerning chemical facilities; and (3) which, if any, types of groups are most inclined to attack chemical infrastructure targets? The study involved a multi-pronged research design, which made use of four discrete investigative techniques to answer the above questions as comprehensively as possible. These include: (1) a review of terrorism and threat assessment literature to glean expert consensus regarding terrorist interest in targeting chemical facilities; (2) the preparation of case studies to help identify internal group factors and contextual influences that have played a significant role in leading some terrorist groups to attack chemical facilities; (3) an examination of data from the Critical Infrastructure Terrorist Incident Catalog (CrITIC) to further illuminate the nature of terrorist attacks against chemical facilities to date; and (4

  6. Ultrasonic anemometer angle of attack errors under turbulent conditions

    NASA Astrophysics Data System (ADS)

    Nakai, T.

    2009-12-01

    Measurements of eddy fluxes are premised on the assumption that wind speeds are measured accurately by an ultrasonic anemometer. Recently, ultrasonic anemometers have been shown to suffer errors depending on the angle of attack, which is the angle between the wind vector and the horizontal. The correction of these errors resulted in general increases in eddy fluxes. However, since the check of the angle of attack dependent error was carried out in the wind tunnel experiment, which would be under the condition of nearly laminar flow, the applicability of this correction to the field data under turbulent conditions has been questioned. In this study, angle of attack dependencies of wind speeds measured by Gill Windmaster ultrasonic anemometers were assessed by field experiment over meadow, considered to be turbulent conditions. By using five identical anemometers, two pairs of systems were prepared: two anemometers for references and one between them for tilt. The dependencies of (co)sine responses of anemometers on angles of attack of 0 to -90 degrees in 10-degree steps and 45 degrees were checked, and clarified that the angle of attack dependent errors occur also under turbulent conditions, with results similar to the wind tunnel experiments. Sine responses of vertical wind speeds depended not only on vertical angle of attack but also on horizontal wind direction, which had not been considered in previous studies. For more robust correction, alternative calibration functions were obtained empirically so as to reasonably explain our field experimental results. Applying this new correction, eddy fluxes increased substantially even over meadow, which is somewhat aerodynamically smooth compared with forests or agricultural fields.

  7. Fingerprinting Codes for Multimedia Data against Averaging Attack

    NASA Astrophysics Data System (ADS)

    Yagi, Hideki; Matsushima, Toshiyasu; Hirasawa, Shigeichi

    Code construction for digital fingerprinting, which is a copyright protection technique for multimedia, is considered. Digital fingerprinting should deter collusion attacks, where several fingerprinted copies of the same content are mixed to disturb their fingerprints. In this paper, we consider the averaging attack, which is known to be effective for multimedia fingerprinting with the spread spectrum technique. We propose new methods for constructing fingerprinting codes to increase the coding rate of conventional fingerprinting codes, while they guarantee to identify the same number of colluders. Due to the new fingerprinting codes, the system can deal with a larger number of users to supply digital contents.

  8. Burton Award Talk: Science Under Attack: Intelligent Design

    NASA Astrophysics Data System (ADS)

    Krauss, Lawrence

    2005-04-01

    Science is under attack in many places throughout our society, from the White House to the classroom. I will concentrate my remarks here on the emerging threat to science education associated with the effort to have Intelligent Design incorporated into high school science curricula. While this may appear to be primarily an attack on evolutionary biology, it is in fact motivated by an effort to undermine the teaching of science itself as a discipline based on the scientific method. Moreover, the key proponents of this methodology are not misguided scientists, they are highly refined political operatives who are motivated by a desire to incorporate religion directly in science classes.

  9. Grievous temporal and occipital injury caused by a bear attack.

    PubMed

    Prasad, Sampath Chandra; Thada, Nikhil Dinaker; Rao, Pallavi; Thada, Smitha Rani; Prasad, Kishore Chandra

    2013-01-01

    Bear attacks are reported from nearly every part of the world. The chance of a human encountering a bear increases as the remote bear territory diminishes. The sloth bear is one of the three species of bears found in India, which inhabits the forests of India and its neighboring countries. Here we describe a teenager who came to us with a critical injury involving the face, temporal and occipital bones inflicted by a sloth bear attack. He underwent a temporal exploration, facial nerve decompression, pinna reconstruction, and occipital bone repair to save him from fatality. PMID:24396623

  10. Patrol detection for replica attacks on wireless sensor networks.

    PubMed

    Wang, Liang-Min; Shi, Yang

    2011-01-01

    Replica attack is a critical concern in the security of wireless sensor networks. We employ mobile nodes as patrollers to detect replicas distributed in different zones in a network, in which a basic patrol detection protocol and two detection algorithms for stationary and mobile modes are presented. Then we perform security analysis to discuss the defense strategies against the possible attacks on the proposed detection protocol. Moreover, we show the advantages of the proposed protocol by discussing and comparing the communication cost and detection probability with some existing methods. PMID:22163752

  11. Grievous Temporal and Occipital Injury Caused by a Bear Attack

    PubMed Central

    Thada, Nikhil Dinaker; Rao, Pallavi; Thada, Smitha Rani; Prasad, Kishore Chandra

    2013-01-01

    Bear attacks are reported from nearly every part of the world. The chance of a human encountering a bear increases as the remote bear territory diminishes. The sloth bear is one of the three species of bears found in India, which inhabits the forests of India and its neighboring countries. Here we describe a teenager who came to us with a critical injury involving the face, temporal and occipital bones inflicted by a sloth bear attack. He underwent a temporal exploration, facial nerve decompression, pinna reconstruction, and occipital bone repair to save him from fatality. PMID:24396623

  12. [The tropical rat mite Ornithonyssus bacoti attacks humans in Iceland.].

    PubMed

    Skírnisson, K

    2001-12-01

    In the summer of 2001 the obligate, intermittent tropical rat mite Ornithonyssus bacoti attacked humans in an Icelandic household where infected Mongolian gerbils (Meriones unguiculatus), bought in a local pet shop, had been kept for few months. After a rapid proliferation the mite started attacking the humans living in the house. A boy sharing room with the pets suffered from extensive dermatitis. Optimal conditions for O. bacoti are at 24-26 degrees C and a relative humidity of 47%. Similar conditions frequently occur indoors in Icelandic premises. Therefore, if O. bacoti has been noticed indoors, necessary measures should be undertaken to immediately eliminate the pest. PMID:17019023

  13. Onion-like network topology enhances robustness against malicious attacks

    NASA Astrophysics Data System (ADS)

    Herrmann, Hans J.; Schneider, Christian M.; Moreira, André A.; Andrade, José S., Jr.; Havlin, Shlomo

    2011-01-01

    We develop a method to generate robust networks against malicious attacks, as well as to substantially improve the robustness of a given network by swapping edges and keeping the degree distribution fixed. The method, based on persistence of the size of the largest cluster during attacks, was applied to several types of networks with broad degree distributions, including a real network—the Internet. We find that our method can improve the robustness significantly. Our results show that robust networks have a novel 'onion-like' topology consisting of a core of highly connected nodes hierarchically surrounded by rings of nodes with decreasing degree.

  14. Monitoring and Diagnosing Malicious Attacks with Autonomic Software

    NASA Astrophysics Data System (ADS)

    Souza, Vítor E. Silva; Mylopoulos, John

    Monitoring and diagnosing (M&D) software based on requirement models is a problem that has recently received a lot of attention in field of Requirement Engineering. In this context, Wang et al. [1] propose a M&D framework that uses goal models to diagnose failures in software at different levels of granularity. In this paper we extend Wang's framework to monitor and diagnose malicious attacks. Our extensions include the addition of anti-goals to model attacker intentions, as well as context-based modeling of the domain within which our system operates. The extended framework has been implemented and evaluated through a series of experiments intended to test its scalability.

  15. A practical timing attack on RSA over a LAN

    NASA Astrophysics Data System (ADS)

    Lodato, Mark J.; Jouny, Ismail

    2006-04-01

    Today, the specific implementation of a cryptosystem is of possibly greater importance than the underlying cryptographic algorithm itself. Through side-channel cryptanalysis, an adversary may deduce a secret key just by monitoring implementation-specific side channels, such as execution time or power consumption during a cryptographic operation. In this paper, we describe a successful remote timing attack against a server running a protocol similar to SSL. Using a fully-automated attack on Chinese Remaindering Theorem (CRT) implementations of RSA, we show it is practical to recover a 1024-bit key in under an hour over a local area network.

  16. Jaguar Attack on a Child: Case Report and Literature Review

    PubMed Central

    Iserson, Kenneth V.; Francis, Adama M.

    2015-01-01

    Jaguar attacks on humans rarely occur in the wild. When they do, they are often fatal. We describe a jaguar attack on a three-year-old girl near her home deep in a remote area of the Guyanese jungle. The patient had a complex but, relatively, rapid transport to a medical treatment facility for her life-threatening injuries. The child, who suffered typical jaguar-inflicted injury patterns and survived, is highlighted. We review jaguar anatomy, environmental status, hunting and killing behaviors, and discuss optimal medical management, given the resource-limited treatment environment of this international emergency medicine case. PMID:25834674

  17. Enhancing the security of quantum secret sharing against multiphoton attack

    NASA Astrophysics Data System (ADS)

    Zhang, Bin-Bin; Wang, Da-Qing; Huang, Shan-Shan; Liu, Yu

    2009-06-01

    It is generally believed that nonorthogonal operations which can realize the state transformation between two nonorthogonal bases may ensure the security of many quantum communication protocols. However, in this paper, we present a powerful attack against quantum secret sharing protocols of these kinds. Applying entangled photons as fake signals, Eve can successfully steal the exact information without being revealed. We also give our effective modification to improve it. Under the suggested checking strategy, even to Eve's most general attack, it is robust and secure.

  18. Intelligent Sensing and Classification in DSR-Based Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Dempsey, Tae; Sahin, Gokhan; Morton, Yu T. (Jade

    Wireless ad hoc networks have fundamentally altered today's battlefield, with applications ranging from unmanned air vehicles to randomly deployed sensor networks. Security and vulnerabilities in wireless ad hoc networks have been considered at different layers, and many attack strategies have been proposed, including denial of service (DoS) through the intelligent jamming of the most critical packet types of flows in a network. This paper investigates the effectiveness of intelligent jamming in wireless ad hoc networks using the Dynamic Source Routing (DSR) and TCP protocols and introduces an intelligent classifier to facilitate the jamming of such networks. Assuming encrypted packet headers and contents, our classifier is based solely on the observable characteristics of size, inter-arrival timing, and direction and classifies packets with up to 99.4% accuracy in our experiments.

  19. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    SciTech Connect

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills, and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between

  20. Management of victims of urban chemical attack: the French approach.

    PubMed

    Laurent, J F; Richter, F; Michel, A

    1999-10-01

    Since the early 1980s several disasters involving mass release of toxic substances have focused the attention of different administrations and the fire services into producing protocols and guidelines for action in civilian situations. The bomb attack in the Tokyo subway, in March 1995, made it clear that a terrorist attack using highly toxic agents is now feasible. Management of disasters in the civil sector in France is based upon two interlinked plans: the Red Plan, which covers on-site organisation, and the White Plan, which concerns the interface with hospital services. Special procedures have been developed to adapt the Red and White Plans for use in the event of toxic attack and concern the deployment of emergency responding personnel, the provision of life support and antidotes in the contaminated zone, the prevention of secondary contamination and the transport and reception of victims at the hospital. Based on the established principle of pre-hospital resuscitation and well-tried assistance plans, this doctrine allows a safe and effective response to terrorist attacks as well as to other toxic release incidents. PMID:10617333

  1. Experimental eavesdropping attack against Ekert's protocol based on Wigner's inequality

    SciTech Connect

    Bovino, F. A.; Colla, A. M.; Castagnoli, G.; Castelletto, S.; Degiovanni, I. P.; Rastello, M. L.

    2003-09-01

    We experimentally implemented an eavesdropping attack against the Ekert protocol for quantum key distribution based on the Wigner inequality. We demonstrate a serious lack of security of this protocol when the eavesdropper gains total control of the source. In addition we tested a modified Wigner inequality which should guarantee a secure quantum key distribution.

  2. Attacks on the Freedom To Learn. 1986-1987 Report.

    ERIC Educational Resources Information Center

    People for the American Way, Washington, DC.

    Documenting a cumulative attack on the freedom to learn, which strikes at the heart of public education, this report describes how censorship has grown since 1982, highlighting trends that have emerged over five years, the actors, the challenges, and the results. Following an introduction, the report documents the state of censorship for…

  3. Male Brown-headed Cowbird Attacks and Kills a Nestling

    USGS Publications Warehouse

    Igl, L.D.

    2003-01-01

    I observed a male Brown-headed Cowbird (Molothrus ater) attack and kill a nestling of an unidentified passerine in a grassland field in Day County, South Dakota, in June 2000. The killing or removal of nestlings by female cowbirds has been reported by others, but this behavior has not been documented previously in male cowbirds.

  4. Revising School Attack Protections since 9/11

    ERIC Educational Resources Information Center

    Black, Susan

    2004-01-01

    The terrorist attacks of September 11, 2001, prompted federal officials to step up campaigns to make schools safe. After visiting Ground Zero at New York City's World Trade Center, Education Secretary Rodney Paige sent each chief state school officer suggestions for managing school crises. Many states also have school safety plans in place. New…

  5. Hypergame theory applied to cyber attack and defense

    NASA Astrophysics Data System (ADS)

    House, James Thomas; Cybenko, George

    2010-04-01

    This work concerns cyber attack and defense in the context of game theory--specifically hypergame theory. Hypergame theory extends classical game theory with the ability to deal with differences in players' expertise, differences in their understanding of game rules, misperceptions, and so forth. Each of these different sub-scenarios, or subgames, is associated with a probability--representing the likelihood that the given subgame is truly "in play" at a given moment. In order to form an optimal attack or defense policy, these probabilities must be learned if they're not known a-priori. We present hidden Markov model and maximum entropy approaches for accurately learning these probabilities through multiple iterations of both normal and modified game play. We also give a widely-applicable approach for the analysis of cases where an opponent is aware that he is being studied, and intentionally plays to spoil the process of learning and thereby obfuscate his attributes. These are considered in the context of a generic, abstract cyber attack example. We demonstrate that machine learning efficacy can be heavily dependent on the goals and styles of participant behavior. To this end detailed simulation results under various combinations of attacker and defender behaviors are presented and analyzed.

  6. Animal biowarfare research: historical perspective and potential future attacks.

    PubMed

    Yeh, Jung-Yong; Park, Jee-Yong; Cho, Yun Sang; Cho, In-Soo

    2012-12-01

    A biological attack on livestock or poultry could result in the loss of valuable animals, costs related to the containment of outbreaks and the disposal of carcasses, lost trade and other economic effects involving suppliers, transporters, distributors and restaurants; however, it is not possible to secure all livestock, and livestock are much less well guarded than human targets. Thus, the vulnerability of the livestock industry to the introduction of biological agents varies for the following reasons: (i) the majority of lethal and contagious biological agents are environmentally resilient, endemic in foreign countries and harmless to humans, making it easier for terrorists to acquire, handle and deploy these pathogens, (ii) with animals concentrated in fewer production facilities and frequently transported between these facilities, a single pathogen introduction could cause widespread infection and (iii) the extent of human travel around the globe makes it difficult to exclude exotic animal diseases as possible biological agents. Historically, many governments have developed and planned to use biological agents for direct attacks on livestock or poultry. In the past, developed nations have actively developed biological weapons to target animals. The potential spectrum of bioterrorism ranges from isolated acts against individuals by individuals to tactical and strategic military attacks and state-sponsored international terrorism intended to cause mass casualties in animals, humans or both. This review provides an overview of the past development and use of biological weapons and describes potential future attacks. PMID:22646760

  7. Exercise Following a Heart Attack: Some Special Considerations.

    ERIC Educational Resources Information Center

    Fardy, Paul S.

    This paper presents information on the effectiveness of exercise programs for heart attack victims. Some of the observations come from unpublished results of a two year experiment of the National Exercise and Heart Disease Project. The paper first establishes that a group exercise program with trained supervision is advantageous for people with…

  8. Recommendations for the treatment of migraine attacks - a Brazilian consensus.

    PubMed

    Bordini, Carlos Alberto; Roesler, Célia; Carvalho, Deusvenir de Souza; Macedo, Djacir Dantas P; Piovesan, Élcio; Melhado, Eliana Meire; Dach, Fabiola; Kowacs, Fernando; Silva Júnior, Hilton Mariano da; Souza, Jano Alves de; Maciel, Jayme Antunes; Carvalho, João José de Freitas de; Speciali, José Geraldo; Barea, Liselotte Menke; Queiroz, Luiz Paulo; Ciciarelli, Marcelo Cedrinho; Valença, Marcelo Moraes; Lima, Márcia Maria Ferreira; Vincent, Maurice Borges

    2016-03-01

    In this article, a group of experts in headache management of the Brazilian Headache Society developed through a consensus strategic measurements to treat a migraine attack in both the child and the adult. Particular emphasis was laid on the treatment of migraine in women, including at pregnancy, lactation and perimenstrual period. PMID:27050859

  9. Jamming Attack in Wireless Sensor Network: From Time to Space

    NASA Astrophysics Data System (ADS)

    Sun, Yanqiang; Wang, Xiaodong; Zhou, Xingming

    Classical jamming attack models in the time domain have been proposed, such as constant jammer, random jammer, and reactive jammer. In this letter, we consider a new problem: given k jammers, how does the attacker minimize the pair-wise connectivity among the nodes in a Wireless Sensor Network (WSN)? We call this problem k-Jammer Deployment Problem (k-JDP). To the best of our knowledge, this is the first attempt at considering the position-critical jamming attack against wireless sensor network. We mainly make three contributions. First, we prove that the decision version of k-JDP is NP-complete even in the ideal situation where the attacker has full knowledge of the topology information of sensor network. Second, we propose a mathematical formulation based on Integer Programming (IP) model which yields an optimal solution. Third, we present a heuristic algorithm HAJDP, and compare it with the IP model. Numerical results show that our heuristic algorithm is computationally efficient.

  10. Vulnerabilities in GSM technology and feasibility of selected attacks

    NASA Astrophysics Data System (ADS)

    Voznak, M.; Prokes, M.; Sevcik, L.; Frnda, J.; Toral-Cruz, Homer; Jakovlev, Sergej; Fazio, Peppino; Mehic, M.; Mikulec, M.

    2015-05-01

    Global System for Mobile communication (GSM) is the most widespread technology for mobile communications in the world and serving over 7 billion users. Since first publication of system documentation there has been notified a potential safety problem's occurrence. Selected types of attacks, based on the analysis of the technical feasibility and the degree of risk of these weaknesses, were implemented and demonstrated in laboratory of the VSB-Technical University of Ostrava, Czech Republic. These vulnerabilities were analyzed and afterwards possible attacks were described. These attacks were implemented using open-source tools, software programmable radio USRP (Universal Software RadioPeripheral) and DVB-T (Digital Video Broadcasting - Terrestrial) receiver. GSM security architecture is being scrutinized since first public releases of its specification mainly pointing out weaknesses in authentication and ciphering mechanisms. This contribution also summarizes practically proofed and used scenarios that are performed using opensource software tools and variety of scripts mostly written in Python. Main goal of this paper is in analyzing security issues in GSM network and practical demonstration of selected attacks.

  11. Angle of Attack Modulation for Mars Entry Terminal State Optimization

    NASA Technical Reports Server (NTRS)

    Lafleur, Jarret M.; Cerimele, Christopher J.

    2009-01-01

    From the perspective of atmospheric entry, descent, and landing (EDL), one of the most foreboding destinations in the solar system is Mars due in part to its exceedingly thin atmosphere. To benchmark best possible scenarios for evaluation of potential Mars EDL system designs, a study is conducted to optimize the entry-to-terminal-state portion of EDL for a variety of entry velocities and vehicle masses, focusing on the identification of potential benefits of enabling angle of attack modulation. The terminal state is envisioned as one appropriate for the initiation of terminal descent via parachute or other means. A particle swarm optimizer varies entry flight path angle, ten bank profile points, and ten angle of attack profile points to find maximum-final-altitude trajectories for a 10 30 m ellipsled at 180 different combinations of values for entry mass, entry velocity, terminal Mach number, and minimum allowable altitude. Parametric plots of maximum achievable altitude are shown, as are examples of optimized trajectories. It is shown that appreciable terminal state altitude gains (2.5-4.0 km) over pure bank angle control may be possible if angle of attack modulation is enabled for Mars entry vehicles. Gains of this magnitude could prove to be enabling for missions requiring high-altitude landing sites. Conclusions are also drawn regarding trends in the bank and angle of attack profiles that produce the optimal trajectories in this study, and directions for future work are identified.

  12. Cultural Connections: Bowl with Frieze of Lions Attacking Bulls

    ERIC Educational Resources Information Center

    School Arts: The Art Education Magazine for Teachers, 2004

    2004-01-01

    This article gives a brief description of the piece of art titled "Bowl with Frieze of Lions Attacking Bulls" which is thought to be the product of a court or palace of the Neo-Assyrian period and dates to the late seventh to eighth century BC, between the reigns of Sargon and Ashurbanipal. The article highlights the piece's most notable cultural…

  13. Parent-Reported Predictors of Adolescent Panic Attacks.

    ERIC Educational Resources Information Center

    Hayward, Chris; Wilson, Kimberly A.; Lagle, Kristy; Killen, Joel D.; Taylor, C. Barr

    2004-01-01

    Objective: To identify parent-reported risk factors for adolescent panic attacks. Method: Structured diagnostic interviews were obtained from 770 parents of participants in a school-based risk factor study for adolescent panic. Parent-reported risk factors assessed included characteristics of the child (negative affect, separation anxiety disorder…

  14. Technosocial Modeling of IED Threat Scenarios and Attacks

    SciTech Connect

    Whitney, Paul D.; Brothers, Alan J.; Coles, Garill A.; Young, Jonathan; Wolf, Katherine E.; Thompson, Sandra E.; Niesen, David A.; Madsen, John M.; Henderson, Cynthia L.

    2009-03-23

    This paper describes an approach for integrating sociological and technical models to develop more complete threat assessment. Current approaches to analyzing and addressing threats tend to focus on the technical factors. This paper addresses development of predictive models that encompass behavioral as well as these technical factors. Using improvised explosive device (IED) attacks as motivation, this model supports identification of intervention activities 'left of boom' as well as prioritizing attack modalities. We show how Bayes nets integrate social factors associated with IED attacks into general threat model containing technical and organizational steps from planning through obtaining the IED to initiation of the attack. The social models are computationally-based representations of relevant social science literature that describes human decision making and physical factors. When combined with technical models, the resulting model provides improved knowledge integration into threat assessment for monitoring. This paper discusses the construction of IED threat scenarios, integration of diverse factors into an analytical framework for threat assessment, indicator identification for future threats, and future research directions.

  15. Delimiting Democratic Debate: The Fordham Institute's Attack on Democratic Values

    ERIC Educational Resources Information Center

    Leahey, Christopher R.

    2005-01-01

    Reflecting on the current debate on how to teach about the terrorist attacks of September 11, 2001, and the subsequent U.S. invasions of Afghanistan and Iraq, this article examines Thomas B. Fordham Institute's Terrorists, Despots, and Democracy: What Our Children Need to Know, one of the several publications produced by the Fordham Institute that…

  16. Effect of attack angle on flow characteristic of centrifugal fan

    NASA Astrophysics Data System (ADS)

    Wu, Y.; Dou, H. S.; Wei, Y. K.; Chen, X. P.; Chen, Y. N.; Cao, W. B.

    2016-05-01

    In this paper, numerical simulation is performed for the performance and internal flow of a centrifugal fan with different operating conditions using steady three-dimensional incompressible Navier-Stokes equations coupled with the RNG k-e turbulent model. The performance curves, the contours of static pressure, total pressure, radial velocity, relative streamlines and turbulence intensity at different attack angles are obtained. The distributions of static pressure and velocity on suction surface and pressure surface in the same impeller channel are compared for various attack angles. The research shows that the efficiency of the centrifugal fan is the highest when the attack angle is 8 degree. The main reason is that the vortex flow in the impeller is reduced, and the jet-wake pattern is weakened at the impeller outlet. The pressure difference between pressure side and suction side is smooth and the amplitude of the total pressure fluctuation is low along the circumferential direction. These phenomena may cause the loss reduced for the attack angle of about 8 degree.

  17. X-31 high angle of attack control system performance

    NASA Technical Reports Server (NTRS)

    Huber, Peter; Seamount, Patricia

    1994-01-01

    The design goals for the X-31 flight control system were: (1) level 1 handling qualities during post-stall maneuvering (30 to 70 degrees angle-of-attack); (2) thrust vectoring to enhance performance across the flight envelope; and (3) adequate pitch-down authority at high angle-of-attack. Additional performance goals are discussed. A description of the flight control system is presented, highlighting flight control system features in the pitch and roll axes and X-31 thrust vectoring characteristics. The high angle-of-attack envelope clearance approach will be described, including a brief explanation of analysis techniques and tools. Also, problems encountered during envelope expansion will be discussed. This presentation emphasizes control system solutions to problems encountered in envelope expansion. An essentially 'care free' envelope was cleared for the close-in-combat demonstrator phase. High angle-of-attack flying qualities maneuvers are currently being flown and evaluated. These results are compared with pilot opinions expressed during the close-in-combat program and with results obtained from the F-18 HARV for identical maneuvers. The status and preliminary results of these tests are discussed.

  18. Sleep Deprivation Attack Detection in Wireless Sensor Network

    NASA Astrophysics Data System (ADS)

    Bhattasali, Tapalina; Chaki, Rituparna; Sanyal, Sugata

    2012-02-01

    Deployment of sensor network in hostile environment makes it mainly vulnerable to battery drainage attacks because it is impossible to recharge or replace the battery power of sensor nodes. Among different types of security threats, low power sensor nodes are immensely affected by the attacks which cause random drainage of the energy level of sensors, leading to death of the nodes. The most dangerous type of attack in this category is sleep deprivation, where target of the intruder is to maximize the power consumption of sensor nodes, so that their lifetime is minimized. Most of the existing works on sleep deprivation attack detection involve a lot of overhead, leading to poor throughput. The need of the day is to design a model for detecting intrusions accurately in an energy efficient manner. This paper proposes a hierarchical framework based on distributed collaborative mechanism for detecting sleep deprivation torture in wireless sensor network efficiently. Proposed model uses anomaly detection technique in two steps to reduce the probability of false intrusion.

  19. Risk assessment for physical and cyber attacks on critical infrastructures.

    SciTech Connect

    Smith, Bryan J.; Sholander, Peter E.; Phelan, James M.; Wyss, Gregory Dane; Varnado, G. Bruce; Depoy, Jennifer Mae

    2005-08-01

    Assessing the risk of malevolent attacks against large-scale critical infrastructures requires modifications to existing methodologies. Existing risk assessment methodologies consider physical security and cyber security separately. As such, they do not accurately model attacks that involve defeating both physical protection and cyber protection elements (e.g., hackers turning off alarm systems prior to forced entry). This paper presents a risk assessment methodology that accounts for both physical and cyber security. It also preserves the traditional security paradigm of detect, delay and respond, while accounting for the possibility that a facility may be able to recover from or mitigate the results of a successful attack before serious consequences occur. The methodology provides a means for ranking those assets most at risk from malevolent attacks. Because the methodology is automated the analyst can also play 'what if with mitigation measures to gain a better understanding of how to best expend resources towards securing the facilities. It is simple enough to be applied to large infrastructure facilities without developing highly complicated models. Finally, it is applicable to facilities with extensive security as well as those that are less well-protected.

  20. A Functional Approach to Televised Political Spots: Acclaiming, Attacking, Defending.

    ERIC Educational Resources Information Center

    Benoit, William L.; Pier, P. M.; Blaney, Joseph R.

    1997-01-01

    Articulates a theoretical framework for understanding the fundamental functions of political advertising (acclaiming, attacking, defending) which occur on the twin grounds of policy considerations and character. Applies this theory of political discourse to presidential general election television spots from 1980-1996, finding that Democrats and…

  1. The Rape of a Discipline: Home Economics under Attack.

    ERIC Educational Resources Information Center

    Thompson, Patricia J.

    Changes in a Home Economics curriculum at Lehman College of the City University of New York from 1979-1988 are examined, and a line of inquiry first reported in 1983 is continued. A secondary, feminist analysis of the earlier data, combined with the current data, discloses the extent to which the patriarchal academy will go to attack the "mental…

  2. Endangered Education: How Corporate Polluters Are Attacking Environmental Education.

    ERIC Educational Resources Information Center

    Bohart, Barbara; Manilov, Marianne; Schwarz, Tamara

    This report claims that an attack has been waged on environmental education to derail the re-authorization of the National Environmental Education Act and to de-stabilize and de-fund environmental education in the United States. Presented in the media as a grassroots movement, stories have appeared in local, state, and national media that…

  3. Defeating Insider Attacks via Autonomic Self-Protective Networks

    ERIC Educational Resources Information Center

    Sibai, Faisal M.

    2012-01-01

    There has been a constant growing security concern with insider attacks on network accessible computer systems. Users with power credentials can do almost anything they want with the systems they own with very little control or oversight. Most breaches occurring nowadays by power users are considered legitimate access and not necessarily…

  4. Possibility of spoof attack against robustness of multibiometric authentication systems

    NASA Astrophysics Data System (ADS)

    Hariri, Mahdi; Shokouhi, Shahriar Baradaran

    2011-07-01

    Multibiometric systems have been recently developed in order to overcome some weaknesses of single biometric authentication systems, but security of these systems against spoofing has not received enough attention. In this paper, we propose a novel practical method for simulation of possibilities of spoof attacks against a biometric authentication system. Using this method, we model matching scores from standard to completely spoofed genuine samples. Sum, product, and Bayes fusion rules are applied for score level combination. The security of multimodal authentication systems are examined and compared with the single systems against various spoof possibilities. However, vulnerability of fused systems is considerably increased against spoofing, but their robustness is generally higher than single matcher systems. In this paper we show that robustness of a combined system is not always higher than a single system against spoof attack. We propose empirical methods for upgrading the security of multibiometric systems, which contain how to organize and select biometric traits and matchers against various possibilities of spoof attack. These methods provide considerable robustness and present an appropriate reason for using combined systems against spoof attacks.

  5. Molten Salt Techniques for Students: Attacking Hematite with Pyrosulfate.

    ERIC Educational Resources Information Center

    Atkinson, George F.

    1986-01-01

    Discusses materials needed, procedures used, and typical results obtained for an experiment involving a dry attack of ores with pyrosulfate flux. The experiment has been carried out by about 150 students a year with a demonstrator-to-student ratio of about 1:15 with no serious accidents. (JN)

  6. Database Relation Watermarking Resilient against Secondary Watermarking Attacks

    NASA Astrophysics Data System (ADS)

    Gupta, Gaurav; Pieprzyk, Josef

    There has been tremendous interest in watermarking multimedia content during the past two decades, mainly for proving ownership and detecting tamper. Digital fingerprinting, that deals with identifying malicious user(s), has also received significant attention. While extensive work has been carried out in watermarking of images, other multimedia objects still have enormous research potential. Watermarking database relations is one of the several areas which demand research focus owing to the commercial implications of database theft. Recently, there has been little progress in database watermarking, with most of the watermarking schemes modeled after the irreversible database watermarking scheme proposed by Agrawal and Kiernan. Reversibility is the ability to re-generate the original (unmarked) relation from the watermarked relation using a secret key. As explained in our paper, reversible watermarking schemes provide greater security against secondary watermarking attacks, where an attacker watermarks an already marked relation in an attempt to erase the original watermark. This paper proposes an improvement over the reversible and blind watermarking scheme presented in [5], identifying and eliminating a critical problem with the previous model. Experiments showing that the average watermark detection rate is around 91% even with attacker distorting half of the attributes. The current scheme provides security against secondary watermarking attacks.

  7. Assessing Sexual Abuse/Attack Histories with Bariatric Surgery Patients

    ERIC Educational Resources Information Center

    Mahony, David

    2010-01-01

    This study assessed sexual abuse/attack histories in 537 bariatric surgery patients using the PsyBari. The prevalence rates found were lower (15.5%, 19.3% of women, 5.2% of men) than other studies that used bariatric surgery patients but consistent with studies that used nonbariatric obese subjects. Furthermore, bariatric surgery patients who…

  8. Protecting water and wastewater infrastructure from cyber attacks

    NASA Astrophysics Data System (ADS)

    Panguluri, Srinivas; Phillips, William; Cusimano, John

    2011-12-01

    Multiple organizations over the years have collected and analyzed data on cyber attacks and they all agree on one conclusion: cyber attacks are real and can cause significant damages. This paper presents some recent statistics on cyber attacks and resulting damages. Water and wastewater utilities must adopt countermeasures to prevent or minimize the damage in case of such attacks. Many unique challenges are faced by the water and wastewater industry while selecting and implementing security countermeasures; the key challenges are: 1) the increasing interconnection of their business and control system networks, 2) large variation of proprietary industrial control equipment utilized, 3) multitude of cross-sector cyber-security standards, and 4) the differences in the equipment vendor's approaches to meet these security standards. The utilities can meet these challenges by voluntarily selecting and adopting security standards, conducting a gap analysis, performing vulnerability/risk analysis, and undertaking countermeasures that best meets their security and organizational requirements. Utilities should optimally utilize their limited resources to prepare and implement necessary programs that are designed to increase cyber-security over the years. Implementing cyber security does not necessarily have to be expensive, substantial improvements can be accomplished through policy, procedure, training and awareness. Utilities can also get creative and allocate more funding through annual budgets and reduce dependence upon capital improvement programs to achieve improvements in cyber-security.

  9. Assessment and Intervention for Academic Task Attack Strategy Competencies

    ERIC Educational Resources Information Center

    Busse, R. T.; Lee, Charlene

    2015-01-01

    Many students who underachieve in schools may not be learning as effectively as they could. Direct assessments such as the Academic Competence Evaluation Scales (ACES), School Motivation and Learning Strategies Inventory (SMALSI), and the Academic Task Attack Checklist System (ATACS) can be used to evaluate students' knowledge and use of…

  10. An Initial Facet Analysis of the FYCSP Word Attack Test.

    ERIC Educational Resources Information Center

    Besel, Ronald

    The concepts "facet analysis,""facet design," and "facet structure" are defined. The FYCSP (First Year Communication Skills Program) Word Attack Test is analyzed in terms of two related facet structures. Stepwise linear regression is used to predict distractor attractiveness. Hypotheses suggested by Guttman relating distractor attractiveness to…

  11. What Should We Expect after the next Attack?

    ERIC Educational Resources Information Center

    Silver, Roxane Cohen; Fischhoff, Baruch

    2011-01-01

    A test of any science is its ability to predict events under specified conditions. A test for the psychology represented in this special issue of the American Psychologist is its ability to predict individual and social behavior in the aftermath of a next terror attack. This article draws on that science to make such predictions. These predictions…

  12. Hydrogen attack - Influence of hydrogen sulfide. [on carbon steel

    NASA Technical Reports Server (NTRS)

    Eliezer, D.; Nelson, H. G.

    1978-01-01

    An experimental study is conducted on 12.5-mm-thick SAE 1020 steel (plain carbon steel) plate to assess hydrogen attack at room temperature after specimen exposure at 525 C to hydrogen and a blend of hydrogen sulfide and hydrogen at a pressure of 3.5 MN/sq m for exposure times up to 240 hr. The results are discussed in terms of tensile properties, fissure formation, and surface scales. It is shown that hydrogen attack from a high-purity hydrogen environment is severe, with the formation of numerous methane fissures and bubbles along with a significant reduction in the room-temperature tensile yield and ultimate strengths. However, no hydrogen attack is observed in the hydrogen/hydrogen sulfide blend environment, i.e. no fissure or bubble formation occurred and the room-temperature tensile properties remained unchanged. It is suggested that the observed porous discontinuous scale of FeS acts as a barrier to hydrogen entry, thus reducing its effective equilibrium solubility in the iron lattice. Therefore, hydrogen attack should not occur in pressure-vessel steels used in many coal gasification processes.

  13. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks

    PubMed Central

    Chen, Huifang; Ge, Linlin; Xie, Lei

    2015-01-01

    The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes. PMID:26184224

  14. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks.

    PubMed

    Chen, Huifang; Ge, Linlin; Xie, Lei

    2015-01-01

    The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes. PMID:26184224

  15. Intracellular Signaling and Desmoglein 2 Shedding Triggered by Human Adenoviruses Ad3, Ad14, and Ad14P1

    PubMed Central

    Wang, Hongjie; Ducournau, Corinne; Saydaminova, Kamola; Richter, Maximilian; Yumul, Roma; Ho, Martin; Carter, Darrick; Zubieta, Chloé

    2015-01-01

    ABSTRACT We recently discovered that desmoglein 2 (DSG2) is a receptor for human adenovirus species B serotypes Ad3, Ad7, Ad11, and Ad14. Ad3 is considered to be a widely distributed human pathogen. Ad3 binding to DSG2 triggers the transient opening of epithelial junctions. Here, we further delineate the mechanism that leads to DSG2-mediated epithelial junction opening in cells exposed to Ad3 and recombinant Ad3 fiber proteins. We identified an Ad3 fiber knob-dependent pathway that involves the phosphorylation of mitogen-activated protein (MAP) kinases triggering the activation of the matrix-metalloproteinase ADAM17. ADAM17, in turn, cleaves the extracellular domain of DSG2 that links epithelial cells together. The shed DSG2 domain can be detected in cell culture supernatant and also in serum of mice with established human xenograft tumors. We then extended our studies to Ad14 and Ad14P1. Ad14 is an important research and clinical object because of the recent appearance of a new, more pathogenic strain (Ad14P1). In a human epithelial cancer xenograft model, Ad14P1 showed more efficient viral spread and oncolysis than Ad14. Here, we tested the hypothesis that a mutation in the Ad14P1 fiber knob could account for the differences between the two strains. While our X-ray crystallography studies suggested an altered three-dimensional (3D) structure of the Ad14P1 fiber knob in the F-G loop region, this did not significantly change the fiber knob affinity to DSG2 or the intracellular signaling and DSG2 shedding in epithelial cancer cells. IMPORTANCE A number of widely distributed adenoviruses use the epithelial junction protein DSG2 as a receptor for infection and lateral spread. Interaction with DSG2 allows the virus not only to enter cells but also to open epithelial junctions which form a physical barrier to virus spread. Our study elucidates the mechanism beyond virus-triggered junction opening with a focus on adenovirus serotype 3. Ad3 binds to DSG2 with its fiber

  16. 16 CFR 460.18 - Insulation ads.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Insulation ads. 460.18 Section 460.18... INSULATION § 460.18 Insulation ads. (a) If your ad gives an R-value, you must give the type of insulation and... your ad gives a price, you must give the type of insulation, the R-value at a specific thickness,...

  17. 16 CFR 460.18 - Insulation ads.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Insulation ads. 460.18 Section 460.18... INSULATION § 460.18 Insulation ads. (a) If your ad gives an R-value, you must give the type of insulation and... your ad gives a price, you must give the type of insulation, the R-value at a specific thickness,...

  18. 16 CFR 460.18 - Insulation ads.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Insulation ads. 460.18 Section 460.18... INSULATION § 460.18 Insulation ads. (a) If your ad gives an R-value, you must give the type of insulation and... your ad gives a price, you must give the type of insulation, the R-value at a specific thickness,...

  19. 16 CFR 460.18 - Insulation ads.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Insulation ads. 460.18 Section 460.18... INSULATION § 460.18 Insulation ads. (a) If your ad gives an R-value, you must give the type of insulation and... your ad gives a price, you must give the type of insulation, the R-value at a specific thickness,...

  20. 16 CFR 460.18 - Insulation ads.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Insulation ads. 460.18 Section 460.18... INSULATION § 460.18 Insulation ads. (a) If your ad gives an R-value, you must give the type of insulation and... your ad gives a price, you must give the type of insulation, the R-value at a specific thickness,...

  1. Myths & Facts about Value-Added Analysis

    ERIC Educational Resources Information Center

    TNTP, 2011

    2011-01-01

    This paper presents myths as well as facts about value-added analysis. These myths include: (1) "Value-added isn't fair to teachers who work in high-need schools, where students tend to lag far behind academically"; (2) "Value-added scores are too volatile from year-to-year to be trusted"; (3) "There's no research behind value-added"; (4) "Using…

  2. Novel mechanism of network protection against the new generation of cyber attacks

    NASA Astrophysics Data System (ADS)

    Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit

    2012-06-01

    A new intelligent mechanism is presented to protect networks against the new generation of cyber attacks. This mechanism integrates TCP/UDP/IP protocol stack protection and attacker/intruder deception to eliminate existing TCP/UDP/IP protocol stack vulnerabilities. It allows to detect currently undetectable, highly distributed, low-frequency attacks such as distributed denial-of-service (DDoS) attacks, coordinated attacks, botnet, and stealth network reconnaissance. The mechanism also allows insulating attacker/intruder from the network and redirecting the attack to a simulated network acting as a decoy. As a result, network security personnel gain sufficient time to defend the network and collect the attack information. The presented approach can be incorporated into wireless or wired networks that require protection against known and the new generation of cyber attacks.

  3. Fast WEP-Key Recovery Attack Using Only Encrypted IP Packets

    NASA Astrophysics Data System (ADS)

    Teramura, Ryoichi; Asakura, Yasuo; Ohigashi, Toshihiro; Kuwakado, Hidenori; Morii, Masakatu

    Conventional efficient key recovery attacks against Wired Equivalent Privacy (WEP) require specific initialization vectors or specific packets. Since it takes much time to collect the packets sufficiently, any active attack should be performed. An Intrusion Detection System (IDS), however, will be able to prevent the attack. Since the attack logs are stored at the servers, it is possible to prevent such an attack. This paper proposes an algorithm for recovering a 104-bit WEP key from any IP packets in a realistic environment. This attack needs about 36, 500 packets with a success probability 0.5, and the complexity of our attack is equivalent to about 220 computations of the RC4 key setups. Since our attack is passive, it is difficult for both WEP users and administrators to detect our attack.

  4. Determination of an angle of attack sensor correction for a general aviation airplane at large angles of attack as determined from wind tunnel and flight tests

    NASA Technical Reports Server (NTRS)

    Moul, T. M.; Taylor, L. W., Jr.

    1980-01-01

    A comprehensive investigation into the flow correction for an angle of attack sensor mounted ahead of the wing tip of a general aviation research airplane has been conducted at the Langley Research Center. This correction has been determined in wind tunnels using a full-scale model up to angles of attack of 45 deg and a 1/5-scale model up to 80 deg angle of attack. The flow correction has also been obtained in flight by using a standard technique at low angles of attack and in spinning flight at larger angles of attack, by using both a simple approximate technique and a parameter estimation technique. The results show the correction is significant, reaching 10 deg at a measured angle of attack of about 90 deg. The flow correction was sensitive to the angle of sideslip at measured angles of attack greater than 60 deg and was not influenced by wing leading-edge modifications or aileron deflections.

  5. Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets.

    PubMed

    DeTrano, Alexander; Karimi, Naghmeh; Karri, Ramesh; Guo, Xiaofei; Carlet, Claude; Guilley, Sylvain

    2015-01-01

    Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvolatile memory. Our attack targets AES implemented in software protected by a low entropy masking scheme and recovers the masks with 91% success rate. Recovering the secret key requires fewer power traces (in fact, by at least two orders of magnitude) compared to a classical second-order attack. Moreover, we show that this attack remains viable in a noisy environment or with a reduced number of leakage points. Eventually, we specify a method to enhance the countermeasure by selecting a suitable coset of the masks set. PMID:26491717

  6. Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets

    PubMed Central

    DeTrano, Alexander; Karimi, Naghmeh; Karri, Ramesh; Guo, Xiaofei; Carlet, Claude; Guilley, Sylvain

    2015-01-01

    Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvolatile memory. Our attack targets AES implemented in software protected by a low entropy masking scheme and recovers the masks with 91% success rate. Recovering the secret key requires fewer power traces (in fact, by at least two orders of magnitude) compared to a classical second-order attack. Moreover, we show that this attack remains viable in a noisy environment or with a reduced number of leakage points. Eventually, we specify a method to enhance the countermeasure by selecting a suitable coset of the masks set. PMID:26491717

  7. Buffeting of NACA 0012 airfoil at high angle of attack

    NASA Astrophysics Data System (ADS)

    Zhou, Tong; Dowell, Earl

    2014-11-01

    Buffeting is a fluid instability caused by flow separation or shock wave oscillations in the flow around a bluff body. Typically there is a dominant frequency of these flow oscillations called Strouhal or buffeting frequency. In prior work several researchers at Duke University have noted the analogy between the classic Von Karman Vortex Street behind a bluff body and the flow oscillations that occur for flow around a NACA 0012 airfoil at sufficiently large angle of attack. Lock-in is found for certain combinations of airfoil oscillation (pitching motion) frequencies and amplitudes when the frequency of the airfoil motion is sufficiently close to the buffeting frequency. The goal of this paper is to explore the flow around a static and an oscillating airfoil at high angle of attack by developing a method for computing buffet response. Simulation results are compared with experimental data. Conditions for the onset of buffeting and lock-in of a NACA 0012 airfoil at high angle of attack are determined. Effects of several parameters on lift coefficient and flow response frequency are studied including Reynolds number, angle of attack and blockage ratio of the airfoil size to the wind tunnel dimensions. Also more detailed flow field characteristics are determined. For a static airfoil, a universal Strouhal number scaling has been found for angles of attack from 30° to 90°, where the flow around airfoil is fully separated. For an oscillating airfoil, conditions for lock-in are discussed. Differences between the lock-in case and the unlocked case are also studied. The second affiliation: Duke University.

  8. Ambient ozone concentration and emergency department visits for panic attacks.

    PubMed

    Cho, Jaelim; Choi, Yoon Jung; Sohn, Jungwoo; Suh, Mina; Cho, Seong-Kyung; Ha, Kyoung Hwa; Kim, Changsoo; Shin, Dong Chun

    2015-03-01

    The effect of ambient air pollution on panic disorder in the general population has not yet been thoroughly elucidated, although the occurrence of panic disorder in workers exposed to organic solvents has been reported previously. We investigated the association of ambient air pollution with the risk of panic attack-related emergency department visits. Using health insurance claims, we collected data from emergency department visits for panic attacks in Seoul, Republic of Korea (2005-2009). Daily air pollutant concentrations were obtained using automatic monitoring system data. We conducted a time-series study using a generalized additive model with Poisson distribution, which included spline variables (date of visit, daily mean temperature, and relative humidity) and parametric variables (daily mean air pollutant concentration, national holiday, and day of the week). In addition to single lag models (lag1 to lag3), cumulative lag models (lag0-1 to lag0-3) were constructed using moving-average concentrations on the days leading up to the visit. The risk was expressed as relative risk (RR) per one standard deviation of each air pollutant and its 95% confidence interval (95% CI). A total of 2320 emergency department visits for panic attacks were observed during the study period. The adjusted RR of panic attack-related emergency department visits was 1.051 (95% CI, 1.014-1.090) for same-day exposure to ozone. In cumulative models, adjusted RRs were 1.068 (1.029-1.107) in lag0-2 and 1.074 (1.035-1.114) in lag0-3. The ambient ozone concentration was significantly associated with emergency department visits for panic attacks. PMID:25669697

  9. Attacks by packs of dogs involving predation on human beings

    PubMed Central

    Borchelt, Peter L.; Lockwood, Randall; Beck, Alan M.; Voith, Victoria L.

    1983-01-01

    Dog bites are a medical problem for millions of people, children being the most common victims. Human deaths attributable to dog bite injury (not rabies) are relatively infrequent. There have been some epidemiologic reviews, but this study is the first attempt to arrive at an understanding of bites involving predation on human beings by conducting behavioral examinations under controlled conditions of the dogs involved, and by interviewing victims, witnesses, and people familiar with the animals. The three cases studied involved two fatalities and an attack that was nearly fatal. The victims were 11, 14, and 81. In each case, owned pet dogs consumed some human tissue. The severity of the victims' injuries was not the consequence of a single dog bite, but the result of repeated attacks by dogs behaving as a social group. Factors that might contribute to a dog's regarding human beings as potential prey were examined, including hunger, prior predation, group behaviors, defense of territory, previous interactions with people, the presence of estrous female dogs, and environmental stimuli. In two of the cases, it was possible, by using similar stimuli, to duplicate the circumstances at the time of the attack. The results of the observations showed the value of behavioral analysis and simulations methods in evaluating possible factors in dog attacks. Among the many factors probably involved in severe dog attacks are the size, number, and nutritional status of the dogs; the dogs' previous aggressive contacts with people; the victim's age, size, health, and behavior; and the absence of other human beings in the vicinity. Imagesp61-ap61-bp61-c PMID:6828639

  10. What's the Value in Value-Added?

    ERIC Educational Resources Information Center

    Duffrin, Elizabeth

    2011-01-01

    A growing number of school districts are adopting "value-added" measures of teaching quality to award bonuses or even tenure. And two competitive federal grants are spurring them on. Districts using value-added data are encouraged by the results. But researchers who support value-added measures advise caution. The ratings, which use a statistical…

  11. Value Added and Other Related Matters.

    ERIC Educational Resources Information Center

    Whitla, Dean K.

    The term "value added" refers to the assessment of the amount of learning that takes place during the college years. Two experiments, Value Added I and Value Added II, attempted to measure college students' attainment of eight liberal education objectives: (1) writing ability; (2) analytical ability; (3) sensitivity to ethics, morals, and values;…

  12. New Features in the ADS Abstract Service

    NASA Technical Reports Server (NTRS)

    Eichhorn, Guenther; Accomazzi, Alberto; Grant, Carolyn S.; Kurtz, Michael J.; Henneken, Edwin A.; Thompson, Donna M.; Murray, Stephen S.

    2005-01-01

    The NASA-ADS Abstract Service provides a sophisticated search capability for the literature in Astronomy, Planetary Sciences, Physics/Geophysics, and Space Instrumentation. The ADS is funded by NASA and access to the ADS services is free to anybody world-wide without restrictions. It allows the user to search the literature by author, title, and abstract text.

  13. 27 CFR 19.456 - Adding denaturants.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Adding denaturants. 19.456... Denaturation § 19.456 Adding denaturants. Denaturants and spirits shall be mixed in packages, tanks, or bulk... proprietor shall submit a flow diagram of the intended process or method of adding denaturants. (Sec....

  14. Gifted Children with AD/HD.

    ERIC Educational Resources Information Center

    Lovecky, Deirdre V.

    This brief paper on gifted children with attention deficit hyperactivity disorder (AD/HD) focuses on the special educational needs of this population. Emphasis is on four major conclusions: (1) gifted children with AD/HD differ from average children with AD/HD in cognitive, social, and emotional variables (e.g., the gifted child is likely to show…

  15. Condom ads promote illicit sex.

    PubMed

    Kippley, J F

    1994-01-01

    Written in 1987, this opinion was republished in the wake of US President Bill Clinton's AIDS prevention media campaign promoting condom use which began January 1994, targeted at young adults aged 18-25. The author staunchly opposes condom use even though he admits that people do not consider abstinence from sex to be a serious option for the prevention of HIV/STD infection. He believes that there is no moral use of sex with a condom and that condoms have always been a sign of immorality, be it prostitution, adultery, fornication, or marital contraception. Likewise, the author laments the success enjoyed by Planned Parenthood in achieving the social acceptance of marital contraception and sex outside of marriage. The complete social acceptance of homosexual activity, however, remains to be achieved. Magazines, newspapers, and television receive income in exchange for publishing or airing advertisements. Finding offensive advertisements which promote the use of condoms against HIV infection, the author recommends writing letters of complaint to the responsible media sources. If the television stations or publications in question continue to advertise condoms to the public, stop watching them or end one's subscriptions to the particular printed media. Such action taken collectively among many individuals will reduce product sales and income, and potentially sway corporate policy against condom ads. PMID:12345946

  16. Pre-Attack Stress-Load, Appraisals, and Coping in Children's Responses to the 9/11 Terrorist Attacks

    ERIC Educational Resources Information Center

    Lengua, Liliana J.; Long, Anna C.; Meltzoff, Andrew N.

    2006-01-01

    Background: Appraisal and coping following a disaster are important factors in children's post-traumatic stress (PTS) symptoms. However, little is known about predictors of disaster coping responses. This study examined stress-load, appraisals and coping styles measured prior to the September 11 terrorist attacks as predictors of 9/11-specific…

  17. Historical Literature in the ADS

    NASA Astrophysics Data System (ADS)

    Eichhorn, G.; Kurtz, M. J.; Accomazzi, A.; Grant, C. S.

    1997-12-01

    The Astrophysics Data System at http://adswww.harvard.edu is in the process of scanning the historical astronomical literature and making it available through the World Wide Web. We have scanned several volumes from the early 1800's of the "Astronomische Nachrichten", and the "Monthly Notices of the Royal Astronomical Society", the two oldest astronomical journals. We also have several of the early volumes of the "Astrophysical Journal" and the "Astronomical Journal" available. For all the journals that we cover, we have scanned volume 1. These early volumes can be accessed on a page-by-page basis. We plan to continue to scan this historical literature and complete these journals within the next year. We are also collaborating with a preservation project at Harvard University. This project will microfilm selected parts of astronomical Observatory reports. We plan to scan these microfilms to produce electronic images of these reports and put them on-line in the ADS. We hope to eventually cover most of the astronomical literature. In order to organize the scanned pages into articles, we need tables of contents (ToC). The early issues of the journals did not have printed ToC pages, so this needs to be done by hand. We do not have the financial resources to build these ToCs. We are looking for collaborators who would be willing to work with us in building these ToCs for the older journals and observatory reports. If you are interested in such a project, please contact the first author at gei@cfa.harvard.edu.

  18. Different phases of hairy black holes in AdS5 space

    NASA Astrophysics Data System (ADS)

    Giribet, Gaston; Goya, Andrés; Oliva, Julio

    2015-02-01

    We investigate the thermodynamics of hairy black holes in asymptotically anti-de Sitter (AdS) space, including backreaction. Resorting to the Euclidean path integral approach, we show that matter conformally coupled to Einstein gravity in five dimensions may exhibit a phase transition whose endpoint turns out to be a hairy black hole in AdS5 space. The scalar field configuration happens to be regular everywhere outside and on the horizon and behaves asymptotically in such a way that respects the AdS boundary conditions that are relevant for AdS/CFT. The theory presents other peculiar features in the ultraviolet, like the existence of black holes with arbitrarily low temperature in AdS5 . This provides a simple setup in which the fully backreacting problem of a hair forming in AdS at a certain critical temperature can be solved analytically.

  19. Targeted attack on networks coupled by connectivity and dependency links

    NASA Astrophysics Data System (ADS)

    Du, Ruijin; Dong, Gaogao; Tian, Lixin; Liu, Runran

    2016-05-01

    Coupled systems used to increase capacity were shown beneficial as long as it does not open pathways to cascades. Previous studies on the robustness of coupled networks except for interdependent networks are almost the cases of random attack. Many challenges remain exist in targeted-attack problem of coupled networks. Since nodes within coupled networks show different functions for each network, this paper both analytically and numerically analyzed the robustness of coupled networks under three types of targeted attacking strategies, including attacking on nodes by considering internal and external degree, internal degree only, and external degree only. For coupled network with both interdependent and interconnected links, all degree distributions of intra- and inter-connectivity links are Poissonian, we find the system undergoes from second to first order phase transition as coupling strength q increases. The fraction of nodes in the giant component P∞ at stable state, the critical phase transition threshold pc (first order threshold pcI and second order threshold pcII), and the critical point (pc ,qc) separating the first and second order phase transitions are analytically obtained for three types of attacking strategies with attacking probability parameter α = 0 , 1. We also find the system becomes more vulnerable as the average degree of intra-links k ¯ or inter-links K ¯ decreases. Therefore, the minimum average degrees k¯min and K¯min to maintain the system stable are obtained for the case of α = 0 , 1. Moreover, we discussed three typical cases of coupled networks, interdependent networks (K ¯ = 0), interacting networks (q = 0) and bipartite network (k = 0, q = 0), the analytical expressions of P∞, pc and (pc ,qc) (only for interdependent) are given respectively. Besides, we study the equivalence relations between interdependent networks and coupled networks with connectivity and dependency links for the same pc. The results imply that we can

  20. Scaling symmetry and scalar hairy rotating AdS3 black holes

    NASA Astrophysics Data System (ADS)

    Ahn, Byoungjoon; Hyun, Seungjoon; Park, Sang-A.; Yi, Sang-Heon

    2016-01-01

    By using the scaling symmetry in the reduced action formalism, we derive the novel Smarr relation which holds even for the hairy rotating AdS3 black holes. Then, by using the Smarr relation we argue that the hairy rotating AdS3 black holes are stable thermodynamically, compared to the nonhairy ones.

  1. Study of aerodynamic technology for VSTOL fighter attack aircraft

    NASA Technical Reports Server (NTRS)

    Burhans, W., Jr.; Crafta, V. J., Jr.; Dannenhoffer, N.; Dellamura, F. A.; Krepski, R. E.

    1978-01-01

    Vertical short takeoff aircraft capability, supersonic dash capability, and transonic agility were investigated for the development of Fighter/attack aircraft to be accommodated on ships smaller than present aircraft carriers. Topics covered include: (1) description of viable V/STOL fighter/attack configuration (a high wing, close-coupled canard, twin-engine, control configured aircraft) which meets or exceeds specified levels of vehicle performance; (2) estimates of vehicle aerodynamic characteristics and the methodology utilized to generate them; (3) description of propulsion system characteristics and vehicle mass properties; (4) identification of areas of aerodynamic uncertainty; and (5) a test program to investigate the areas of aerodynamic uncertainty in the conventional flight mode.

  2. [Managing the attacks, preventing headache. Migraine therapy in 2002].

    PubMed

    Göbel, H; Heinze, A; Heinze-Kuhn, K

    2002-05-01

    At the heart of every migraine treatment concept is the management of the acute attack with effective medication. Here, the triptans have been progressively replacing the ergot alkaloids with their unsatisfactory relationship between effect and side effects. Prophylactic medication is indicated when, despite every non-pharmaceutic measure, migraine attacks occur on seven or more days in a month. The beta receptor blockers metoprolol and propranolol have so far been considered the substances of first choice, but in practice there is now a trend towards substances with a lower potential for side effects. The article provides an up-to-date overview of the efficacy and tolerability of the various migraine prophylactics. PMID:12070849

  3. Robustness of networks against propagating attacks under vaccination strategies

    NASA Astrophysics Data System (ADS)

    Hasegawa, Takehisa; Masuda, Naoki

    2011-09-01

    We study the effect of vaccination on the robustness of networks against propagating attacks that obey the susceptible-infected-removed model. By extending the generating function formalism developed by Newman (2005 Phys. Rev. Lett. 95 108701), we analytically determine the robustness of networks that depends on the vaccination parameters. We consider the random defense where nodes are vaccinated randomly and the degree-based defense where hubs are preferentially vaccinated. We show that, when vaccines are inefficient, the random graph is more robust against propagating attacks than the scale-free network. When vaccines are relatively efficient, the scale-free network with the degree-based defense is more robust than the random graph with the random defense and the scale-free network with the random defense.

  4. Applying the Principles of Homicide by Heart Attack.

    PubMed

    Hlavaty, Leigh; Sung, LokMan

    2016-06-01

    Homicide by heart attack is a well-established model in forensic pathology that describes death elicited during or immediately after a criminal act where a threat or fear of physical injury is present. After its introduction nearly 4 decades ago, the principle has undergone a handful of modifications but still maintains its core concepts. All cases of this nature during a 20-year period at the Wayne County Medical Examiner's Office were compared and contrasted for demographics, circumstances and scene investigation, and autopsy and toxicology findings. Of the cases fulfilling the previously established criteria for homicide by heart attack, more than 80% displayed significant changes because of hypertension. This finding coincides with the high prevalence of hypertension in our urban population and highlights the significance of this disease. Also present were minor external and internal injuries in select cases, which reinforce the understanding that physical contact between the decedent and assailant does not preclude this diagnosis. PMID:27049661

  5. Delayed attacks of malaria in visitors to the tropics.

    PubMed

    Horstmann, P

    1973-08-25

    Out of 80 Danish college students and their teachers visiting the Middle East, West Pakistan, and India by bus in two four-month journeys during the summer and autumn of 1971, six individuals developed an apparently first attack of vivax malaria within seven to nine months after their return to Denmark. No cases of malaria were seen in the group during the journeys. Prophylaxis with chloroquine (Resochin) was strictly observed when visiting the areas in which malaria is endemic.All cases responded rapidly and completely to a full course of treatment with chloroquine. The most probable cause of the delay of the clinical manifestations is drug prophylaxis, which can prevent a clinical attack but not always eradicate the parasite. PMID:4580023

  6. Distributed Detection of Wormhole Attacks in Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    de Graaf, Rennie; Hegazy, Islam; Horton, Jeffrey; Safavi-Naini, Reihaneh

    Sensors in a wireless sensor network depend on their neighbours to route their messages. Yet, routing protocols in wireless sensor network are vulnerable to different types of attacks. In this paper, we consider the wormhole attack in which the adversary diverts traffic from one part of the network to another part by introducing a low cost tunnel between the two parts. We introduce a distributed intrusion detection system that monitors the communication in the network and propose a criterion for the placement of intrusion detection nodes. The intrusion detection system searches for violations of that criterion to detect wormholes of length above a certain minimum value. We evaluate the effectiveness of our system in a simulated environment. The experiments show that our system can detect 100% of the wormholes that are beyond the communication range of the intrusion detection nodes. Finally, we discuss our results and show directions for future work.

  7. Use of forensic analysis to better understand shark attack behaviour.

    PubMed

    Ritter, E; Levine, M

    2004-12-01

    Shark attacks have primarily been analyzed from wound patterns, with little knowledge of a shark's approach, behaviour and intention leading to such wounds. For the first time, during a shark-human interaction project in South Africa, a white shark, Carcharodon carcharias, was filmed biting a vertically positioned person at the water surface, and exhibiting distinct approach patterns leading to the bite. This bite was compared to ten white shark attacks that occurred (i) in the same geographical area of South Africa, and (ii) where the same body parts were bitten. Close similarity of some of these wound patterns to the bite imprint of the videotaped case indicate that the observed behaviour of the white shark may represent a common pattern of approaching and biting humans. PMID:16223019

  8. Engineering flowfield method with angle-of-attack applications

    NASA Technical Reports Server (NTRS)

    Zoby, E. V.; Simmonds, A. L.

    1984-01-01

    An approximate inviscid flowfield method has been extended to include heat-transfer predictions using a technique to account for variable-entropy edge conditions. The engineering code computes the flowfield over hyperboloids, ellipsoids, paraboloids, and sphere cones at 0 deg angle of attack (AOA). For angle-of-attack applications, an approximation to sphere-cone streamline-spreading effects on the heat transfer along the windward and leeward rays and an empirical circumferential heating technique have been incorporated also in the method. The present engineering calculations yield good comparisons with existing pressure and heating data over sphere cones even at high incidence values with the restriction that the sonic-line location remain on the spherical cap.

  9. Aerodynamics of slender finned bodies at large angles of attack

    NASA Technical Reports Server (NTRS)

    Agnone, A. M.; Zakkay, V.; Tory, E.; Stallings, R.

    1977-01-01

    In certain missions finned missiles perform slewing maneuvers. Here, large angles of attack are attained. Experimental data needed to understand the aerodynamics of such vehicles are presented. The purpose of this investigation was to study the interaction of the body flow field with that produced by the fins and the resulting effects on the aerodynamic forces and moments. The experiments were conducted at a nominal Mach number of 2.7 and angles of attack from 0 to 50 deg, with two different models. The tests were performed in a range of Reynolds number from 1.5 x 10 to the 6th to 4 x 10 to the 7th per foot (to cover both the laminar and fully turbulent regimes.) Several fin roll angles were investigated. Static pressures on both body and fin surfaces are reported.

  10. Analytic barrage attack model. Final report, January 1986-January 1989

    SciTech Connect

    St Ledger, J.W.; Naegeli, R.E.; Dowden, N.A.

    1989-01-01

    An analytic model is developed for a nuclear barrage attack, assuming weapons with no aiming error and a cookie-cutter damage function. The model is then extended with approximations for the effects of aiming error and distance damage sigma. The final result is a fast running model which calculates probability of damage for a barrage attack. The probability of damage is accurate to within seven percent or better, for weapon reliabilities of 50 to 100 percent, distance damage sigmas of 0.5 or less, and zero to very large circular error probabilities. FORTRAN 77 coding is included in the report for the analytic model and for a numerical model used to check the analytic results.

  11. Maintain the structural controllability under malicious attacks on directed networks

    NASA Astrophysics Data System (ADS)

    Wang, Bingbo; Gao, Lin; Gao, Yong; Deng, Yue

    2013-03-01

    The directedness of the links in a network plays a critical role in determining many dynamical processes among which the controllability has received much recent attention. The control robustness of a network against malicious attack and random failure also becomes a significant issue. In this paper, we propose a novel control robustness index motivated by recent studies on the global connectivity and controllability. In its general form, the problem of optimizing the control robustness index is computationally infeasible for large-scale networks. By analysing the influences of several directed topological factors on the dynamical control process, we transform the control robustness problem into the problem of transitivity maximization for control routes, and propose an efficient greedy algorithm to make control routes transitive. A series of experiments on real-world and synthetic networks show that the global connectivity and controllability can be improved simultaneously and we can mitigate the destruction of malicious attack through backing up the control routes.

  12. High-angle-of-attack aerodynamics - Lessons learned

    NASA Technical Reports Server (NTRS)

    Chambers, J. R.

    1986-01-01

    Recently, the military and civil technical communities have undertaken numerous studies of the high angle-of-attack aerodynamic characteristics of advanced airplane and missile configurations. The method of approach and the design methodology employed have necessarily been experimental and exploratory in nature, due to the complex nature of separated flows. However, despite the relatively poor definition of many of the key aerodynamic phenomena involved for high-alpha conditions, some generic guidelines for design consideration have been identified. The present paper summarizes some of the more important lessons learned in the area of high angle-of-attack aerodynamics with examples of a number of key concepts and with particular emphasis on high-alpha stability and control characteristics of high performance aircraft. Topics covered in the discussion include the impact of design evolution, forebody flows, control of separated flows, configuration effects, aerodynamic controls, wind-tunnel flight correlation, and recent NASA research activities.

  13. Lupus: When the Body Attacks Itself | NIH MedlinePlus the Magazine

    MedlinePlus

    ... of this page please turn JavaScript on. Feature: Lupus Lupus: When the Body Attacks Itself Past Issues / Spring 2014 Table of Contents fast facts 1 Lupus occurs when the body's immune system attacks the ...

  14. Analysis and visualization of large complex attack graphs for networks security

    NASA Astrophysics Data System (ADS)

    Chen, Hongda; Chen, Genshe; Blasch, Erik; Kruger, Martin; Sityar, Irma

    2007-04-01

    In this paper, we have proposed a comprehensive and innovative approach for analysis and visualization of large complex multi-step cyber attack graphs. As an automated tool for cyber attack detection, prediction, and visualization, the newly proposed method transforms large quantities of network security data into real-time actionable intelligence, which can be used to (1) provide guidance on network hardening to prevent attacks, (2) perform real-time attack event correlation during active attacks, and (3) formulate post-attack responses. We show that it is possible to visualize the complex graphs, including all possible network attack paths while still keeping complexity manageable. The proposed analysis and visualization tool provides an efficient and effective solution for predicting potential attacks upon observed intrusion evidence, as well as interactive multi-resolution views such that an analyst can first obtain high-level overviews quickly, and then drill down to specific details.

  15. Breast Cancer Meds Won't Raise Chances of Heart Attack, Stroke, Study Suggests

    MedlinePlus

    ... Breast Cancer Meds Won't Raise Chances of Heart Attack, Stroke, Study Suggests But there was a slightly ... aromatase inhibitors doesn't raise the risk of heart attacks and strokes among breast cancer survivors, a new ...

  16. Rheumatoid Arthritis When Your Immune System Attacks Your Body | NIH MedlinePlus the Magazine

    MedlinePlus

    ... Understanding Rheumatoid Arthritis (RA) Rheumatoid Arthritis When Your Immune System Attacks Your Body Past Issues / Summer 2014 Table ... disease, which means the arthritis results from your immune system attacking your body's own tissues. The course of ...

  17. Heart Failure After Heart Attack Tied to Cancer Risk in Study

    MedlinePlus

    ... gov/news/fullstory_159804.html Heart Failure After Heart Attack Tied to Cancer Risk in Study Preliminary finding ... News) -- People who develop heart failure after a heart attack may also face a higher risk of cancer, ...

  18. High Doses of Fish Oil Might Help Healing After Heart Attack

    MedlinePlus

    ... Doses of Fish Oil Might Help Healing After Heart Attack Study found improved heart function, less scarring To ... 2, 2016 MONDAY, Aug. 1, 2016 (HealthDay News) -- Heart attack patients who took high doses of fish oil ...

  19. Are Omega-3s Linked to Lower Risk for Fatal Heart Attack?

    MedlinePlus

    ... Omega-3s Linked to Lower Risk for Fatal Heart Attack? These vital nutrients are found in seafood, nuts ... these people, nearly 8,000 suffered a first heart attack over time, which resulted in 2,781 deaths. ...

  20. Talk With Your Health Care Provider About Taking Aspirin to Prevent Heart Attack

    MedlinePlus

    ... q What are my chances of having a heart attack? q Would I benefit from taking aspirin? q ... Health Care Provider About Taking Aspirin to Prevent Heart Attacks Did you know that aspirin can be an ...