Science.gov

Sample records for gnss-based positioning attacks

  1. GNSS-based network positioning technology for cooperative emergency management

    NASA Astrophysics Data System (ADS)

    Wu, Caicong; Chu, Tianxing; Tang, Anning; Su, Huaihong

    2009-06-01

    Personal digital assistant (PDA) with built-in GPS chip begins to be used for city management and emergency response management nowadays. The intelligent terminal can be used for event recording, multimedia (photo, audio, and video) capturing, wireless communication, GPS positioning and navigation. In the near future, PDA would take place of the vehicle GPS monitoring terminal to provide more functions and convenient. This article organizes the PDA of the same team for emergency response event into an integrated network through wireless communication so that each terminal can see each other on the map, including the vehicle GPS monitoring terminals. All of the terminals should send its GPS position and collected information to the emergency response center (ERC) through GPRS with a customized protocol. Then the center would create the socket connection to push the neighbors' location and common or special information to the others in the team according to the terminal's requirement and its authorities, and the leader or commander could send commands and messages to all of the underling members also. The GNSS based positioning and communication network organizes the dispersive emergency response personnel handheld with PDA and vehicles equipped with vehicle GPS monitoring terminal into an organic and cooperative network, each member in the network can see where its colleagues are, so as to seek for the help or support and exchange information in real time without calling which avoids exposure to the tracked objects. The Compass-1 satellite positioning and communication terminal is also used for personnel and vehicle positioning and message reporting. Altay is selected as the demonstration area. The prototype emergency management system is established for the local public security bureau and well validates the terminals and network function.

  2. The Value of Positioning Integrity for GNSS-Based Electronic Fee Collection Systems

    NASA Astrophysics Data System (ADS)

    Gomes, P.; Barradas Pereira, R.

    2007-08-01

    The main objective for a GNSS-based Electronic Fee Collection systems is to obtain its PVT with a certain level of quality, expressed in terms of accuracy, integrity, continuity and availability. The ability to provide efficient toll collect is directly related with availability of integrity at the On-Board Unit. Assuming EGNOS assures a service with a certain defined quality, these systems should take advantage from such assurance. The integrity of posit ioning refers to the assurance that the system works within specified limits. These limits relate to the maximum error that the system can cope while continuing to exhibit a correct behaviour. For tolling this translates to maximum error that is allowed while identifying the correct charge objects.

  3. Measuring and forecasting great tsunamis by GNSS-based vertical positioning of multiple ships

    NASA Astrophysics Data System (ADS)

    Inazu, D.; Waseda, T.; Hibiya, T.; Ohta, Y.

    2016-12-01

    Vertical ship positioning by the Global Navigation Satellite System (GNSS) was investigated for measuring and forecasting great tsunamis. We first examined existing GNSS vertical position data of a navigating vessel. The result indicated that by using the kinematic Precise Point Positioning (PPP) method, tsunamis greater than 10^-1 m can be detected from the vertical position of the ship. Based on Automatic Identification System (AIS) data, tens of cargo ships and tankers are regularly identified navigating over the Nankai Trough, southwest of Japan. We then assumed that a future Nankai Trough great earthquake tsunami will be observed by ships at locations based on AIS data. The tsunami forecast capability by these virtual offshore tsunami measurements was examined. A conventional Green's function based inversion was used to determine the initial tsunami height distribution. Tsunami forecast tests over the Nankai Trough were carried out using simulated tsunami data of the vertical positions of multiple cargo ships/tankers on a certain day, and of the currently operating observations by deep-sea pressure gauges and Global Positioning System (GPS) buoys. The forecast capability of ship-based tsunami height measurements alone was shown to be comparable to or better than that using the existing offshore observations.

  4. GNSS-based Road User Charging

    NASA Astrophysics Data System (ADS)

    Vrhovski, Drazen; Moore, Terry; Bennett, Lloyd

    2004-01-01

    The last few years have seen a rapid growth of applications based on positioning information provided by satellite positioning systems. In transport management and control, satellite positioning has proven to be the most promising means for spatial location data collection. With the GPS modernisation programme well underway, and the recent developments of the Galileo project, even more GNSS-based applications are to be expected in the future. One such GNSS-based application is the use of position and velocity information as the prime input to a road user charging (RUC) scheme. However, navigation in urban environments raises a number of problems. Most important are the difficulties related to signal obstruction by features such as tall buildings, urban canyons, bridges and trees, as well as the effects of multipath caused by signal reflections from buildings and other vehicles. Given the inevitable limitations of road trials, the use of simulation modelling to assess the present and future satellite positioning systems' performance to support urban RUC seems indispensable. The main objective of the research undertaken at the University of Nottingham Institute of Engineering Surveying and Space Geodesy (IESSG), and the Nottingham Centre for Infrastructure (NCI), was to develop a tool to simulate GPS for Satellite Positioning-based Road User Charging (SPRUC). In this regard, an existing GPS simulator was modified to rectify one of its major weaknesses, namely the inability to address properly the change in non-static GPS measurements with respect to changes in built environment. For this purpose, state-of-the-art Geographic Information Systems (GIS) software was used to complement the simulator, and consequently a seamless interface between the two software has been developed. Finally, in order to provide a prime input to the simulator, field tests have been undertaken and significant amounts of GPS data were collected. Statistics were also derived for positioning

  5. Ionospheric Challenges for GNSS Based Augmentation Systems

    NASA Astrophysics Data System (ADS)

    Doherty, P.; Valladares, C. E.

    2007-12-01

    The ionosphere is a highly dynamic physical phenomenon that presents a variable source of error for Global Navigation Satellite System (GNSS) signals and GNSS based operational systems. The Federal Aviation Administration's (FAA) Wide-Area Augmentation System (WAAS) was designed to enhance the GNSS standard positioning service by providing additional accuracy, availability and integrity that is sufficient for use in commercial aviation. It is the first of a number of planned regional Satellite Based Augmentation Systems (SBAS). Other systems in development include the European EGNOS system, the MSAS system in Japan and the GAGAN system in India. In addition, the South American countries are investigating the feasibility of operating an SBAS system in this region. Much of the WAAS ionospheric research and development focused on defining and mitigating ionospheric challenges characteristic of the mid-latitude regions, where the ionosphere is well studied and relatively quiescent. The EGNOS and MSAS systems will primarily operate under a similarly quiescent mid-latitude ionosphere. SBAS system development in South America, India and other low-latitude regions, however, will have to contend with much more extreme conditions. These conditions include strong spatial and temporal gradients, plasma depletions and scintillation. All of these conditions have a potential to limit SBAS performance in the low latitude regions. This presentation will review the effects that the ionosphere has on the mid-latitude WAAS system. It will present the techniques that are used to mitigate ionospheric disturbances induced on the system during severe geomagnetic activity and it will quantify the effect that this activity has on system performance. The presentation will then present data from the South American Low-latitude Ionospheric Sensor Network (LISN) that can be used to infer the ionospheric effects on SBAS performance in the most challenging low-latitude ionospheric environment

  6. Localization of an air target by means of GNSS-based multistatic radar

    NASA Astrophysics Data System (ADS)

    Akhmedov, Daulet Sh.; Raskaliyev, Almat S.

    2016-08-01

    The possibility of utilizing transmitters of opportunity for target detection, tracking and positioning is of great interest to the radar community. In particular the optional use of Global Navigation Satellite System (GNSS) has lately triggered scientific research that has purpose to take advantage of this source of signal generation for passive radar. Number of studies have been conducted previously on development of GNSS-based bistatic and multistatic radars for detection and range estimation to the object located in the close atmosphere. To further enrich research in this area, we present a novel method for coordinate determination of the air target by means of the GNSS-based multistatic radar.

  7. Quantum position verification in bounded-attack-frequency model

    NASA Astrophysics Data System (ADS)

    Gao, Fei; Liu, Bin; Wen, QiaoYan

    2016-11-01

    In 2011, Buhrman et al. proved that it is impossible to design an unconditionally secure quantum position verification (QPV) protocol if the adversaries are allowed to previously share unlimited entanglements. Afterwards, people started to design secure QPV protocols in practical settings, e.g. the bounded-storage model, where the adversaries' pre-shared entangled resources are supposed to be limited. Here we focus on another practical factor that it is very difficult for the adversaries to perform attack operations with unlimitedly high frequency. Concretely, we present a new kind of QPV protocols, called non-simultaneous QPV. And we prove the security of a specific non-simultaneous QPV protocol with the assumption that the frequency of the adversaries' attack operations is bounded, but no assumptions on their pre-shared entanglements or quantum storage. Actually, in our nonsimultaneous protocol, the information whether there comes a signal at present time is also a piece of command. It renders the adversaries "blind", that is, they have to execute attack operations with unlimitedly high frequency no matter whether a signal arrives, which implies the non-simultaneous QPV is also secure in the bounded-storage model.

  8. High accuracy GNSS based navigation in GEO

    NASA Astrophysics Data System (ADS)

    Capuano, Vincenzo; Shehaj, Endrit; Blunt, Paul; Botteron, Cyril; Farine, Pierre-André

    2017-07-01

    Although significant improvements in efficiency and performance of communication satellites have been achieved in the past decades, it is expected that the demand for new platforms in Geostationary Orbit (GEO) and for the On-Orbit Servicing (OOS) on the existing ones will continue to rise. Indeed, the GEO orbit is used for many applications including direct broadcast as well as communications. At the same time, Global Navigation Satellites System (GNSS), originally designed for land, maritime and air applications, has been successfully used as navigation system in Low Earth Orbit (LEO) and its further utilization for navigation of geosynchronous satellites becomes a viable alternative offering many advantages over present ground based methods. Following our previous studies of GNSS signal characteristics in Medium Earth Orbit (MEO), GEO and beyond, in this research we specifically investigate the processing of different GNSS signals, with the goal to determine the best navigation performance they can provide in a GEO mission. Firstly, a detailed selection among different GNSS signals and different combinations of them is discussed, taking into consideration the L1 and L5 frequency bands, and the GPS and Galileo constellations. Then, the implementation of an Orbital Filter is summarized, which adaptively fuses the GN1SS observations with an accurate orbital forces model. Finally, simulation tests of the navigation performance achievable by processing the selected combination of GNSS signals are carried out. The results obtained show an achievable positioning accuracy of less than one meter. In addition, hardware-in-the-loop tests are presented using a COTS receiver connected to our GNSS Spirent simulator, in order to collect real-time hardware-in-the-loop observations and process them by the proposed navigation module.

  9. GNSS-based densification of the ITRF velocity field through a collaborative approach

    NASA Astrophysics Data System (ADS)

    Legrand, Juliette; Bruyninx, Carine; Craymer, Michael; Dawson, John; Griffiths, Jake; Kenyeres, Ambrus; Rebischung, Paul; Sánchez, Laura; Santamaría-Gómez, Alvaro; Saria, Elifuraha; Altamimi, Zuheir

    2015-04-01

    The objective of the IAG Working Group "Integration of Dense Velocity Fields in the ITRF" is to provide a GNSS-based dense, unified and reliable velocity field globally referenced in the ITRF (International Terrestrial Reference Frame) and useful for geodynamical and geophysical interpretations. The WG is embedded in IAG Sub-Commission 1.3 "Regional Reference Frames" where it coexists with the Regional Reference Frame Sub-Commissions AFREF (Africa), APREF (Asia & Pacific), EUREF (Europe), NAREF (North America), SCAR (Antarctica), SIRGAS (Latin America & Caribbean). These IAG Regional Reference Frame sub-commissions are responsible for providing GNSS-based densified weekly solutions for their region. To obtain such a densified velocity field, the WG combined the individual weekly solutions from 7 individual contributors (AFREF, APREF, EUREF, NAREF (NGS, GSB), SIRGAS, IGS) and then stacked these weekly combined solutions in order to derive a ITRF2008 densification as well as the associated residual position time series for more than 2800 sites. Here we present the latest densification results.

  10. Headache during a cluster of benign paroxysmal positional vertigo attacks.

    PubMed

    Pollak, Lea; Pollak, Eitan

    2014-12-01

    In view of patients' recurrent complaints, we were interested in investigating the frequency and headache characteristics in patients during a benign paroxysmal positional vertigo (BPPV) cluster. Patients with BPPV treated at an outpatient dizziness clinic were interviewed about the presence of headache; its quality, localization, severity, time course, and aggravating and alleviating factors; and headache-related disability during their present vertigo cluster. Among 152 patients with BPPV, 53 (34.8%) reported headache associated with vertigo. According to The International Classification of Headache Disorders, 8 (15%) patients could be classified as migraine without aura (1.1), 14 (26%) were classified as infrequent episodic tension-type headache associated with pericranial tenderness (2.1.1), 23 (43%) were classified as infrequent episodic tension-type headache without pericranial tenderness (2.1.2), 6 (11%) had cervicogenic headache (11.2.1), and in 2 (4%) patients, the headache could not be specified (14.2). Fifty-two age-matched BPPV patients without headache did not differ in history of headaches, BPPV history, or background diseases. The distribution of canal involvement and number of treatment maneuvers was also similar in both groups. Headache is frequent in BPPV. The most common is tension-type headache, followed by migraine and cervicogenic headache. Head pain seems to be an independently associated epiphenomenon of BPPV that can worsen patients' distress. © The Author(s) 2014.

  11. Identifying positioning-based attacks against 3D printed objects and the 3D printing process

    NASA Astrophysics Data System (ADS)

    Straub, Jeremy

    2017-05-01

    Zeltmann, et al. demonstrated that structural integrity and other quality damage to objects can be caused by changing its position on a 3D printer's build plate. On some printers, for example, object surfaces and support members may be stronger when oriented parallel to the X or Y axis. The challenge presented by the need to assure 3D printed object orientation is that this can be altered in numerous places throughout the system. This paper considers attack scenarios and discusses where attacks that change printing orientation can occur in the process. An imaging-based solution to combat this problem is presented.

  12. Can CK-MB be used as a marker in benign paroxysmal positional vertigo attack?

    PubMed

    Torun, Mümtaz Taner; Yalçın, Yusuf; Özkan, Özalkan

    2017-04-19

    Benign paroxysmal positional vertigo (BPPV) is one of the main causes of vertigo. More than 90% of cases of positional vertigo and nystagmus can be associated with BPPV. There is no known specific laboratory test for BPPV. Because of the possible muscle activity in BPPV (especially result of nause, vomiting and increasing heart rate) we thought the CK-MB levels may change in this situation. The purpose of this study was to investigate the relation between serum CK-MB levels and BPPV and attacks. The medical records of 35 patients with BPPV presenting to our clinic between November 2014 and November 2015 were investigated retrospectively. Thirty-two control patients with no vertigo, muscular or cardiac disease and with measured CK-MB levels were randomized into a control group. Both groups' existing CK-MB levels were obtained from the patient records. CK-MB values measured before BPPV attack from 11 patients in the patient group were also recorded. The patient and control groups were similar in terms of demographic parameters. CK-MB values at time of attack in the patient group ranged between 5.4 and 38.9 (mean: 19.67 ± 6.81), while control group values ranged between 12 and 27.9 (mean: 20.31 ± 4.54). CK-MB values in 11 patients in the patient group measured before attack ranged between 8.9 and 24 (mean: 17.02 ± 4.97), and CK-MB values during attack ranged between 9 and 34 (mean: 19.74 ± 7.64). Although CK-MB elevation at time of attack was determined in patients with BPPV, this was not statistically significant.

  13. Foveal and peripheral fields of vision influences perceptual skill in anticipating opponents' attacking position in volleyball.

    PubMed

    Schorer, Jörg; Rienhoff, Rebecca; Fischer, Lennart; Baker, Joseph

    2013-09-01

    The importance of perceptual-cognitive expertise in sport has been repeatedly demonstrated. In this study we examined the role of different sources of visual information (i.e., foveal versus peripheral) in anticipating volleyball attack positions. Expert (n = 11), advanced (n = 13) and novice (n = 16) players completed an anticipation task that involved predicting the location of volleyball attacks. Video clips of volleyball attacks (n = 72) were spatially and temporally occluded to provide varying amounts of information to the participant. In addition, participants viewed the attacks under three visual conditions: full vision, foveal vision only, and peripheral vision only. Analysis of variance revealed significant between group differences in prediction accuracy with higher skilled players performing better than lower skilled players. Additionally, we found significant differences between temporal and spatial occlusion conditions. Both of those factors interacted separately, but not combined with expertise. Importantly, for experts the sum of both fields of vision was superior to either source in isolation. Our results suggest different sources of visual information work collectively to facilitate expert anticipation in time-constrained sports and reinforce the complexity of expert perception.

  14. The GNSS-based component for the new Indonesian tsunami early warning centre provided by GITEWS

    NASA Astrophysics Data System (ADS)

    Falck, C.; Ramatschi, M.; Bartsch, M.; Merx, A.; Hoeberechts, J.; Rothacher, M.

    2009-04-01

    Introduction Nowadays GNSS technologies are used for a large variety of precise positioning applications. The accuracy can reach the mm level depending on the data analysis methods. GNSS technologies thus offer a high potential to support tsunami early warning systems, e.g., by detection of ground motions due to earthquakes and of tsunami waves on the ocean by GNSS instruments on a buoy. Although GNSS-based precise positioning is a standard method, it is not yet common to apply this technique under tight time constraints and, hence, in the absence of precise satellite orbits and clocks. The new developed GNSS-based component utilises on- and offshore measured GNSS data and is the first system of its kind that was integrated into an operational early warning system. (Indonesian Tsunami Early Warning Centre INATEWS, inaugurated at BMKG, Jakarta on November, 11th 2008) Motivation After the Tsunami event of 26th December 2004 the German government initiated the GITEWS project (German Indonesian Tsunami Early Warning System) to develop a tsunami early warning system for Indonesia. The GFZ Potsdam (German Research Centre for Geosciences) as the consortial leader of GITEWS also covers several work packages, most of them related to sensor systems. The geodetic branch (Department 1) of the GFZ was assigned to develop a GNSS-based component. Brief system description The system covers all aspects from sensor stations with new developed hard- and software designs, manufacturing and installation of stations, real-time data transfer issues, a new developed automatic near real-time data processing and a graphical user interface for early warning centre operators including training on the system. GNSS sensors are installed on buoys, at tide gauges and as real-time reference stations (RTR stations), either stand-alone or co-located with seismic sensors. The GNSS data are transmitted to the warning centre where they are processed in a near real-time data processing chain. For

  15. High angle of attack position sensing for the Southampton University magnetic suspension and balance system

    NASA Technical Reports Server (NTRS)

    Parker, David H.

    1987-01-01

    An all digital five channel position detection system is to be installed in the Southampton University Magnetic Suspension and Balance System (SUMSBS). The system is intended to monitor a much larger range of model pitch attitudes than has been possible hitherto, up to a maximum of a 90 degree angle of attack. It is based on the use of self-scanning photodiode arrays and illuminating laser light beams, together with purpose built processing electronics. The principles behind the design of the system are discussed, together with the results of testing one channel of the system which was used to control the axial position of a magnetically suspended model in SUMSBS. The removal of optically coupled heave position information from the axial position sensing channel is described.

  16. A Novel General Imaging Formation Algorithm for GNSS-Based Bistatic SAR.

    PubMed

    Zeng, Hong-Cheng; Wang, Peng-Bo; Chen, Jie; Liu, Wei; Ge, LinLin; Yang, Wei

    2016-02-26

    Global Navigation Satellite System (GNSS)-based bistatic Synthetic Aperture Radar (SAR) recently plays a more and more significant role in remote sensing applications for its low-cost and real-time global coverage capability. In this paper, a general imaging formation algorithm was proposed for accurately and efficiently focusing GNSS-based bistatic SAR data, which avoids the interpolation processing in traditional back projection algorithms (BPAs). A two-dimensional point target spectrum model was firstly presented, and the bulk range cell migration correction (RCMC) was consequently derived for reducing range cell migration (RCM) and coarse focusing. As the bulk RCMC seriously changes the range history of the radar signal, a modified and much more efficient hybrid correlation operation was introduced for compensating residual phase errors. Simulation results were presented based on a general geometric topology with non-parallel trajectories and unequal velocities for both transmitter and receiver platforms, showing a satisfactory performance by the proposed method.

  17. A Novel General Imaging Formation Algorithm for GNSS-Based Bistatic SAR

    PubMed Central

    Zeng, Hong-Cheng; Wang, Peng-Bo; Chen, Jie; Liu, Wei; Ge, LinLin; Yang, Wei

    2016-01-01

    Global Navigation Satellite System (GNSS)-based bistatic Synthetic Aperture Radar (SAR) recently plays a more and more significant role in remote sensing applications for its low-cost and real-time global coverage capability. In this paper, a general imaging formation algorithm was proposed for accurately and efficiently focusing GNSS-based bistatic SAR data, which avoids the interpolation processing in traditional back projection algorithms (BPAs). A two-dimensional point target spectrum model was firstly presented, and the bulk range cell migration correction (RCMC) was consequently derived for reducing range cell migration (RCM) and coarse focusing. As the bulk RCMC seriously changes the range history of the radar signal, a modified and much more efficient hybrid correlation operation was introduced for compensating residual phase errors. Simulation results were presented based on a general geometric topology with non-parallel trajectories and unequal velocities for both transmitter and receiver platforms, showing a satisfactory performance by the proposed method. PMID:26927117

  18. GNSS-Based Space Weather Systems Including COSMIC Ionospheric Measurements

    NASA Technical Reports Server (NTRS)

    Komjathy, Attila; Mandrake, Lukas; Wilson, Brian; Iijima, Byron; Pi, Xiaoqing; Hajj, George; Mannucci, Anthony J.

    2006-01-01

    The presentation outline includes University Corporation for Atmospheric Research (UCAR) and Jet Propulsion Laboratory (JPL) product comparisons, assimilating ground-based global positioning satellites (GPS) and COSMIC into JPL/University of Southern California (USC) Global Assimilative Ionospheric Model (GAIM), and JPL/USC GAIM validation. The discussion of comparisons examines Abel profiles and calibrated TEC. The JPL/USC GAIM validation uses Arecibo ISR, Jason-2 VTEC, and Abel profiles.

  19. GNSS-Based Space Weather Systems Including COSMIC Ionospheric Measurements

    NASA Technical Reports Server (NTRS)

    Komjathy, Attila; Mandrake, Lukas; Wilson, Brian; Iijima, Byron; Pi, Xiaoqing; Hajj, George; Mannucci, Anthony J.

    2006-01-01

    The presentation outline includes University Corporation for Atmospheric Research (UCAR) and Jet Propulsion Laboratory (JPL) product comparisons, assimilating ground-based global positioning satellites (GPS) and COSMIC into JPL/University of Southern California (USC) Global Assimilative Ionospheric Model (GAIM), and JPL/USC GAIM validation. The discussion of comparisons examines Abel profiles and calibrated TEC. The JPL/USC GAIM validation uses Arecibo ISR, Jason-2 VTEC, and Abel profiles.

  20. Primary Position Upbeat Nystagmus during an Acute Attack of Multiple Sclerosis.

    PubMed

    Kim, Jee-Ae; Jeong, In-Hye; Lim, Young-Min; Kim, Kwang-Kuk

    2014-01-01

    Ocular manifestation is one of the frequent signs of an acute attack in multiple sclerosis (MS), although primary position upbeat nystagmus (PPUN) is rare. The purpose of this study is to determine the incidence of PPUN in MS and to determine the lesions that are responsible for this sign. The medical records of 120 MS patients with acute brain lesions were reviewed over a consecutive period of 9 years; of these, 6 patients were found to have PPUN. Other ocular motor abnormalities were analyzed in combination with upbeat nystagmus, video-oculographic findings, and lesions detected on brain MRI. Lesions in the pontine tegmentum involving the medial longitudinal fasciculus (MLF) and ventral tegmental tract (VTT) were the most common, being observed in three of the six patients with PPUN. One patient exhibited caudal medullary lesions bilaterally affecting the paramedian portion of the posterior tegmentum, and two patients exhibited multiple lesions involving the pons with the cerebral peduncle or medulla. In five patients, other ocular motor dysfunctions, such as gaze-evoked nystagmus (n=3) and internuclear ophthalmoplegia (n=1), were found in combination with upbeat nystagmus. PPUN is an infrequent, ocular manifestation noted during an acute attack of MS, and was observed in 5% of the present cases. Brainstem lesions in these cases primarily involved the pontine tegmentum and the caudal medulla. These findings support the theory that upbeat nystagmus is attributable to damage to the upward vestibulo-ocular reflex pathway related to the vestibular nucleus, VTT, and interconnecting pathways.

  1. Prevalence of positive diffusion-weighted imaging findings and ischemic stroke recurrence in transient ischemic attack.

    PubMed

    Gon, Yasufumi; Sakaguchi, Manabu; Okazaki, Shuhei; Mochizuki, Hideki; Kitagawa, Kazuo

    2015-05-01

    The relationship between transient ischemic attack (TIA) clinical etiology, positive diffusion-weighted imaging (DWI) findings, and stroke recurrence is controversial. This study aimed to clarify the prevalence of positive DWI findings and TIA recurrence in relation to TIA patient characteristics. The subjects were patients admitted to our stroke unit within 7 days after symptom onset between January 2006 and July 2013. We examined DWI findings and TIA recurrence according to etiologic subtypes. We enrolled 139 patients with lacunar TIA (n = 17), atherothrombotic TIA (n = 35), cardioembolic TIA (n = 25), TIA due to other causes (n = 32), or TIA with undetermined etiology (n = 30). The prevalence of positive DWI findings was highest among the cardioembolic TIA patients (56.0%). No association was found between the prevalence of positive DWI findings and symptom duration, motor presence, or ABCD(2) score. Plasma d-dimer level was significantly higher in the DWI-positive group than that in the DWI-negative group (P = .01). The prevalence of TIA recurrence was highest (5 of 35, 14.3%) among the atherothrombotic TIA patients, regardless of positive DWI findings. None of the patients treated with the anticoagulant and antiplatelet combination therapy experienced a recurrence. In contrast, almost all patients with cardioembolic TIA received anticoagulant treatment and none experienced recurrence. The prevalence of positive DWI findings was high among the cardiogenic TIA patients. TIA recurrence was often observed among the atherothrombotic TIA patients treated with antiplatelets. Management of patients with atherothrombotic TIA requires further aggressive antithrombotic strategy. Copyright © 2015 National Stroke Association. Published by Elsevier Inc. All rights reserved.

  2. Prototyping a GNSS-Based Passive Radar for UAVs: An Instrument to Classify the Water Content Feature of Lands

    PubMed Central

    Troglia Gamba, Micaela; Marucco, Gianluca; Pini, Marco; Ugazio, Sabrina; Falletti, Emanuela; Lo Presti, Letizia

    2015-01-01

    Global Navigation Satellite Systems (GNSS) broadcast signals for positioning and navigation, which can be also employed for remote sensing applications. Indeed, the satellites of any GNSS can be seen as synchronized sources of electromagnetic radiation, and specific processing of the signals reflected back from the ground can be used to estimate the geophysical properties of the Earth’s surface. Several experiments have successfully demonstrated GNSS-reflectometry (GNSS-R), whereas new applications are continuously emerging and are presently under development, either from static or dynamic platforms. GNSS-R can be implemented at a low cost, primarily if small devices are mounted on-board unmanned aerial vehicles (UAVs), which today can be equipped with several types of sensors for environmental monitoring. So far, many instruments for GNSS-R have followed the GNSS bistatic radar architecture and consisted of custom GNSS receivers, often requiring a personal computer and bulky systems to store large amounts of data. This paper presents the development of a GNSS-based sensor for UAVs and small manned aircraft, used to classify lands according to their soil water content. The paper provides details on the design of the major hardware and software components, as well as the description of the results obtained through field tests. PMID:26569242

  3. Prototyping a GNSS-Based Passive Radar for UAVs: An Instrument to Classify the Water Content Feature of Lands.

    PubMed

    Gamba, Micaela Troglia; Marucco, Gianluca; Pini, Marco; Ugazio, Sabrina; Falletti, Emanuela; Lo Presti, Letizia

    2015-11-10

    Global Navigation Satellite Systems (GNSS) broadcast signals for positioning and navigation, which can be also employed for remote sensing applications. Indeed, the satellites of any GNSS can be seen as synchronized sources of electromagnetic radiation, and specific processing of the signals reflected back from the ground can be used to estimate the geophysical properties of the Earth's surface. Several experiments have successfully demonstrated GNSS-reflectometry (GNSS-R), whereas new applications are continuously emerging and are presently under development, either from static or dynamic platforms. GNSS-R can be implemented at a low cost, primarily if small devices are mounted on-board unmanned aerial vehicles (UAVs), which today can be equipped with several types of sensors for environmental monitoring. So far, many instruments for GNSS-R have followed the GNSS bistatic radar architecture and consisted of custom GNSS receivers, often requiring a personal computer and bulky systems to store large amounts of data. This paper presents the development of a GNSS-based sensor for UAVs and small manned aircraft, used to classify lands according to their soil water content. The paper provides details on the design of the major hardware and software components, as well as the description of the results obtained through field tests.

  4. On the roburtness of GNSS-based tsunami early warning systems

    NASA Astrophysics Data System (ADS)

    Chen, K.; Song, Y. T.; Liu, Z.

    2016-12-01

    Abstract: Recent devastating tsunamis (e.g., the 2004 Sumatra and 2011 Tohoku events) have repeatedly reminded us of the imperfection of existing tsunami early warning systems (TEWS) in such a harsh way and motivated researchers to make them more trustworthy. Realizing the fact that these tragedies were partly caused by the underestimation of earthquake magnitudes in the first few minutes after earthquakes because of the saturation of traditional seismic sensors, Global Navigation Satellites Systems (GNSS), which can measure co-seismic displacements directly, have found increasing applications in TEWS. Generally, there exist two major approaches that project GNSS displacements into tsunami scenario predictions. The conventional one adopts GNSS displacements for seismic source inversion (see, e.g., Ohta et al., 2012; Melgar and Yehuda 2013) while the other one interpolates seafloor deformation based on coastal GNSS station displacements (see, e.g., Song 2007; Xu and Song 2013; Liu et al., 2014). Despite both methods are being embedded into operational systems, no systematic comparisons between these two have been carried out to assess their robustness towards GNSS-based TEWS. To evaluate the reliability of the two methods in TEWS, we employed both approaches and applied them to three selected historical tsunamis caused by 2010 Mw7.8 Mentawai earthquake, the 2011 Mw9.1 Tohoku earthquake and the 2015 Mw8.2 Illapel earthquake. The three earthquakes represent typical tsunamigenic scenarios seen in practice: rare tsunami earthquake (2010 Mentawai case) without dense GNSS network, mega-thrust earthquake (2011 Tohoku case) with very dense GNSS network and medium-size earthquake with relatively dense GNSS network (2015 Illapel case). Through detailed analysis and comparison with tsunami observations, we address the pros and cons of the two methods and potential ways to combine them in GNSS-based tsunami early warning system. Key words: GNSS, tsunami early warning, seismic

  5. Comparison of methods for localizing the source position of deauthentication attacks on WAP 802.11n using Chanalyzer and Wi-Spy 2.4x

    NASA Astrophysics Data System (ADS)

    Bahaweres, R. B.; Mokoginta, S.; Alaydrus, M.

    2017-01-01

    This paper descnbes a comparison of three methods used to locate the position of the source of deauthentication attacks on Wi-Fi using Chanalyzer, and Wi-Spy 2.4x adapter. The three methods are wardriving, absorption and trilateration. The position of constant deauthentication attacks is more easily analyzed compared to that of random attacks. Signal propagation may provide a comparison between signal strength and distance which makes the position of attackers more easily located. The results are shown on the chart patterns generated from the Received Signal Strength Indicator (RSS). And it is proven that these three methods can be used to localize the position of attackers, and can be recommended for use in the environment of organizations using Wi-Fi.

  6. High positive affect shortly after missile attacks and the heightened risk of posttraumatic stress disorder among Israeli adolescents.

    PubMed

    Israel-Cohen, Yael; Kashy-Rosenbaum, Gabriela; Kaplan, Oren

    2014-06-01

    Previous research has demonstrated that positive emotions help build psychological resources and facilitate adaptation to stress, yet few studies have considered the possible negative effects of positive emotions on stress. This study examined the relationship between high arousal, positive and negative affect, and posttraumatic stress disorder (PTSD) symptoms among 503 Israeli adolescents following a period of escalated missile attacks on their city. Our findings revealed that not only negative affect, but also positive affect at very high levels exhibited 2 weeks following missile attacks were independently associated with PTSD symptoms 2½ months later (η(2) = .09, η(2) = .02, respectively). Although the literature recognizes the risk factor of negative affect on the development of PTSD, we suggest that also positive affect at high levels immediately after such experiences may be a case of emotion context insensitivity and thus a maladaptive response to trauma. Further research should examine the mechanisms associated with positive emotions and PTSD. Copyright © 2014 International Society for Traumatic Stress Studies.

  7. Insecurity of position-based quantum-cryptography protocols against entanglement attacks

    SciTech Connect

    Lau, Hoi-Kwan; Lo, Hoi-Kwong

    2011-01-15

    Recently, position-based quantum cryptography has been claimed to be unconditionally secure. On the contrary, here we show that the existing proposals for position-based quantum cryptography are, in fact, insecure if entanglement is shared among two adversaries. Specifically, we demonstrate how the adversaries can incorporate ideas of quantum teleportation and quantum secret sharing to compromise the security with certainty. The common flaw to all current protocols is that the Pauli operators always map a codeword to a codeword (up to an irrelevant overall phase). We propose a modified scheme lacking this property in which the same cheating strategy used to undermine the previous protocols can succeed with a rate of at most 85%. We prove the modified protocol is secure when the shared quantum resource between the adversaries is a two- or three-level system.

  8. Insecurity of position-based quantum-cryptography protocols against entanglement attacks

    NASA Astrophysics Data System (ADS)

    Lau, Hoi-Kwan; Lo, Hoi-Kwong

    2011-01-01

    Recently, position-based quantum cryptography has been claimed to be unconditionally secure. On the contrary, here we show that the existing proposals for position-based quantum cryptography are, in fact, insecure if entanglement is shared among two adversaries. Specifically, we demonstrate how the adversaries can incorporate ideas of quantum teleportation and quantum secret sharing to compromise the security with certainty. The common flaw to all current protocols is that the Pauli operators always map a codeword to a codeword (up to an irrelevant overall phase). We propose a modified scheme lacking this property in which the same cheating strategy used to undermine the previous protocols can succeed with a rate of at most 85%. We prove the modified protocol is secure when the shared quantum resource between the adversaries is a two- or three-level system.

  9. Auto-Titrating Continuous Positive Airway Pressure for Patients with Acute Transient Ischemic Attack: A Randomized Feasibility Trial

    PubMed Central

    Bravata, Dawn M.; Concato, John; Fried, Terri; Ranjbar, Noshene; Sadarangani, Tanesh; McClain, Vincent; Struve, Frederick; Zygmunt, Lawrence; Knight, Herbert J.; Lo, Albert; Richerson, George B.; Gorman, Mark; Williams, Linda S.; Brass, Lawrence M.; Agostini, Joseph; Mohsenin, Vahid; Roux, Francoise; Klar Yaggi, H

    2010-01-01

    Background Transient ischemic attack (TIA) patients are at risk of recurrent vascular events. The primary objectives were to evaluate among TIA patients: the prevalence of sleep apnea, and among patients with sleep apnea auto-titrating continuous positive airway pressure (auto-CPAP) adherence. The secondary objective was to describe among TIA patients with sleep apnea, the recurrent vascular event rate by auto-CPAP use category. Methods All intervention patients received auto-CPAP for two nights, but only intervention patients with evidence of sleep apnea received auto-CPAP for the remainder of the 90-day period. Intervention patients received polysomnography at 90-days post-TIA. Control patients received polysomnography at baseline and at 90-days. Acceptable auto-CPAP adherence was defined as ≥4 hours/night for ≥75% nights. Vascular events included recurrent transient ischemic attack, stroke, hospitalization for congestive heart failure, myocardial infarction or death. Results We enrolled 70 acute TIA patients: intervention N=45 and control N=25. The majority of patients had sleep apnea: 57% at baseline and 59% at 90-days. Among the 30 intervention patients with airflow obstruction, 12 (40%) had acceptable auto-CPAP adherence, 18 (60%) had some use, and none had no use. Three intervention patients (12%) had recurrent events compared with 1 (2%, p=0.13) control patient. The vascular event rate was highest among sleep apnea patients with no CPAP use: none, 16%; some, 5%; acceptable adherence 0%; p=0.08. Conclusions Sleep apnea is common among acute TIA patients. It appears feasible to provide auto-CPAP in the acute TIA period. Larger studies should evaluate whether a strategy of diagnosing and treating sleep apnea can reduce recurrent vascular events after TIA. PMID:20508184

  10. What good are positive emotions in crises? A prospective study of resilience and emotions following the terrorist attacks on the United States on September 11th, 2001.

    PubMed

    Fredrickson, Barbara L; Tugade, Michele M; Waugh, Christian E; Larkin, Gregory R

    2003-02-01

    Extrapolating from B. L. Fredrickson's (1998, 2001) broaden-and-build theory of positive emotions, the authors hypothesized that positive emotions are active ingredients within trait resilience. U.S. college students (18 men and 28 women) were tested in early 2001 and again in the weeks following the September 11th terrorist attacks. Mediational analyses showed that positive emotions experienced in the wake of the attacks--gratitude, interest, love, and so forth--fully accounted for the relations between (a) precrisis resilience and later development of depressive symptoms and (b) precrisis resilience and postcrisis growth in psychological resources. Findings suggest that positive emotions in the aftermath of crises buffer resilient people against depression and fuel thriving, consistent with the broaden-and-build theory. Discussion touches on implications for coping.

  11. The GNSS-based Ground Tracking System (GTS) of GFZ; from GITEWS to PROTECTS and beyond

    NASA Astrophysics Data System (ADS)

    Falck, Carsten; Merx, Alexander; Ramatschi, Markus

    2013-04-01

    Introduction An automatic system for the near real-time determination and visualization of ground motions, respectively co-seismic deformations of the Earth's surface, was developed by GFZ (German Research Centre for Geosciences) within the project GITEWS (German Indonesian Tsunami Early Warning System). The system is capable to deliver 3D-displacement vectors for locations with appropriate GPS-equipment in the vicinity of an earthquake's epicenter with a delay of only a few minutes. These vectors can help to assess the earthquake causing tectonic movements, which must be known to make reliable early warning predictions, e.g., concerning the generation of tsunami waves. The GTS (Ground Tracking System) has been integrated into InaTEWS (Indonesian Tsunami Early Warning System) and is in operation at the national warning center in Jakarta since November 2008. After the end of the project GITEWS GFZ continues to support the GTS in Indonesia within the frame of PROTECTS (Project for Training, Education and Consulting for Tsunami Early Warning Systems) and recently some new developments have been introduced. We now aim to make further use of the achievements made, e.g., by developing a license model for the GTS software package. Motivation After the Tsunami of 26th December 2004 the German government initiated the GITEWS project to develop the main components for a tsunami early warning system in Indonesia. The GFZ, as the consortial leader of GITEWS, had several work packages, most of them related to sensor systems. The geodetic branch (Department 1) of GFZ was assigned to develop a GNSS-based component, which since then is known as the GTS (Ground Tracking System). System benefit The ground motion information delivered by the GTS is a valuable source for a fast understanding of an earthquake's mechanism with a high relevance to assess the probability and magnitude of a potentially following tsunami. The system may detect highest displacement vector values, where

  12. Heart attack

    MedlinePlus

    ... infarction; Non-ST - elevation myocardial infarction; NSTEMI; CAD - heart attack; Coronary artery disease - heart attack ... made up of cholesterol and other cells. A heart attack may occur when: A tear in the ...

  13. 'I was in control of it from the start': A qualitative study of men's experiences of positive adjustment following a heart attack.

    PubMed

    Smith, Fran; Banwell, Elizabeth; Rakhit, Roby

    2017-09-01

    A qualitative design was used to explore the experience of positive adjustment following a heart attack. Ten men attending a cardiac rehabilitation programme completed in-depth semi-structured interviews. An overarching theme: 'I was in control of it from the start' emerged with six subthemes, relating to intrapersonal and interpersonal factors and processes. The subthemes reflected the importance of identifying controllable versus non-controllable factors and employing adaptive coping strategies.

  14. Advances in the GNSS Based Estimation of Atmospheric Water Vapour and its Application in Numerical Weather Prediction in Hungary

    NASA Astrophysics Data System (ADS)

    Juni, I.

    2015-12-01

    In the last decade a CORS network (GNSSnet.hu) has been established in Hungary by FÖMI, incorporating stations from the neighbouring countries as well. The availability of this network enabled us to develop and realize a processing facility to estimate the tropospheric zenith delays from the observations in near real time within the frames of a research project funded by the Hungarian National Research Fund. An automated near-realtime processing facility was established to collect and process the GNSS observations from 54 GNSSnet.hu stations with spatial resolution of approximately 60 kilometres, and it estimates the zenith wet delays (ZWD) and the precipitable water vapour (PW) and validate these values using radiosonde observations. Recently we updated the operational Bernese processing software from version 5.0 to 5.2. The estimation of precipitable water vapour from the zenith wet delays was also further refined and new methods were implemented. The GNSS based zenith total delay and precipitable water vapour estimates are transmitted to EUMETNET's E-GVAP project. Currently the real-time processing of GNSS observations using the PPP technique is experimented to enable the exploitation of GNSS observations for nowcasting applications. The first results and comparisons with the near-realtime estimations are presented on this poster. We contribute to a dedicated project, concentrating around the Transcarpathian region, which targets the real-time monitoring of severe weather events based on GNSS analysis. The first results may expected by the end of this year. The Hungarian Meteorological Service has also conducted the first tests of the zenith total delay assimilation in their AROME numerical weather prediction model. The data assimilation diagnostics showed that the zenit total delays originated from nearly 70 stations have important contribution to AROME analysis (especially to humidity analysis). The verification results of the first test conducted in January

  15. Return of ambiguity attacks

    NASA Astrophysics Data System (ADS)

    Craver, Scott A.

    2002-04-01

    The ambiguity attack, or invertibility attack, was described several years ago as a potential threat to digital watermarking systems. By manipulating the invertibility of watermark embedding, one could negate or subvert the meaning of a copyright mark. These attacks were easily prevented, however, with the appropriate application of one-way functions and cryptographic hashes in watermarking protocols. New research in watermarking, however, has caused the ambiguity attack to resurface as a threat, and this time it will not be as easy averted. Recent work in public-key watermarking create scenarios in which one-way functions may be ineffective against this threat. Furthermore, there are also positive uses for ambiguity attacks, as components in watermarking protocols. This paper provides an overview of the past and possible future of these unusual attacks.

  16. Assessment of GNSS-based height data of multiple ships for measuring and forecasting great tsunamis

    NASA Astrophysics Data System (ADS)

    Inazu, Daisuke; Waseda, Takuji; Hibiya, Toshiyuki; Ohta, Yusaku

    2016-12-01

    Ship height positioning by the Global Navigation Satellite System (GNSS) was investigated for measuring and forecasting great tsunamis. We first examined GNSS height-positioning data of a navigating vessel. If we use the kinematic precise point positioning (PPP) method, tsunamis greater than 10-1 m will be detected by ship height positioning. Based on Automatic Identification System (AIS) data, we found that tens of cargo ships and tankers are usually identified to navigate over the Nankai Trough, southwest Japan. We assumed that a future Nankai Trough great earthquake tsunami will be observed by the kinematic PPP height positioning of an AIS-derived ship distribution, and examined the tsunami forecast capability of the offshore tsunami measurements based on the PPP-based ship height. A method to estimate the initial tsunami height distribution using offshore tsunami observations was used for forecasting. Tsunami forecast tests were carried out using simulated tsunami data by the PPP-based ship height of 92 cargo ships/tankers, and by currently operating deep-sea pressure and Global Positioning System (GPS) buoy observations at 71 stations over the Nankai Trough. The forecast capability using the PPP-based height of the 92 ships was shown to be comparable to or better than that using the operating offshore observatories at the 71 stations. We suppose that, immediately after the occurrence of a great earthquake, stations receiving successive ship information (AIS data) along certain areas of the coast would fail to acquire ship data due to strong ground shaking, especially near the epicenter. Such a situation would significantly deteriorate the tsunami-forecast capability using ship data. On the other hand, operational real-time analysis of seismic/geodetic data would be carried out for estimating a tsunamigenic fault model. Incorporating the seismic/geodetic fault model estimation into the tsunami forecast above possibly compensates for the deteriorated forecast

  17. What Good Are Positive Emotions in Crises? A Prospective Study of Resilience and Emotions Following the Terrorist Attacks on the United States on September 11th, 2001

    PubMed Central

    Fredrickson, Barbara L.; Tugade, Michele M.; Waugh, Christian E.; Larkin, Gregory R.

    2009-01-01

    Extrapolating from B. L. Fredrickson's (1998, 2001) broaden-and-build theory of positive emotions, the authors hypothesized that positive emotions are active ingredients within trait resilience. U.S. college students (18 men and 28 women) were tested in early 2001 and again in the weeks following the September 11th terrorist attacks. Mediational analyses showed that positive emotions experienced in the wake of the attacks— gratitude, interest, love, and so forth—fully accounted for the relations between (a) precrisis resilience and later development of depressive symptoms and (b) precrisis resilience and postcrisis growth in psychological resources. Findings suggest that positive emotions in the aftermath of crises buffer resilient people against depression and fuel thriving, consistent with the broaden-and-build theory. Discussion touches on implications for coping. PMID:12585810

  18. REGARD: A new GNSS-based real-time finite fault modeling system for GEONET

    NASA Astrophysics Data System (ADS)

    Kawamoto, Satoshi; Ohta, Yusaku; Hiyama, Yohei; Todoriki, Masaru; Nishimura, Takuya; Furuya, Tomoaki; Sato, Yudai; Yahagi, Toshihiro; Miyagawa, Kohei

    2017-02-01

    The short-period seismometer-based magnitude saturation problem, especially for events with magnitude > 8, can be improved by a real-time Global Navigation Satellite System (GNSS) positioning technique, which has enabled rapid estimation of a finite fault model for a large earthquake without any saturation. A new real-time fault modeling system based on the GNSS Earth Observation Network (GEONET) is developed and is under experimental operation in Japan. In this paper, we present the newly developed system REGARD (the Real-time GEONET Analysis system for Rapid Deformation monitoring), which consists of real-time GNSS positioning, automatic detection of coseismic displacement by the event, and quasi real-time finite fault model inversion routines. The performance of the automatic event detection system is tested through experimental real-time operation based on GEONET data for 2 months. Furthermore, we also test the reliability of the finite fault model inversion routines using real raw GNSS data observed for past large earthquakes: the 2003 Tokachi-oki earthquake (moment magnitude (Mw) 8.3), the 2011 Tohoku earthquake (Mw 9.0), and the 2011 off-Ibaraki earthquake (Mw 7.7). A simulated 1707 Hoei-type Nankai Trough earthquake (Mw 8.7) is also tested. The real-time experimental operation shows that real-time GNSS positioning is precise enough to detect all the tested earthquakes, and the inversion results demonstrate that the REGARD can reliably estimate the earthquake size and its extent within 3 min after the origin time. These results suggest that the REGARD system will complement the seismometer-based magnitude determination system.

  19. Relative receiver autonomous integrity monitoring for future GNSS-based aircraft navigation

    NASA Astrophysics Data System (ADS)

    Gratton, Livio Rafael

    The Global Positioning System (GPS) has enabled reliable, safe, and practical aircraft positioning for en-route and non-precision phases of flight for more than a decade. Intense research is currently devoted to extending the use of Global Navigation Satellite Systems (GNSS), including GPS, to precision approach and landing operations. In this context, this work is focused on the development, analysis, and verification of the concept of Relative Receiver Autonomous Integrity Monitoring (RRAIM) and its potential applications to precision approach navigation. RRAIM fault detection algorithms are developed, and associated mathematical bounds on position error are derived. These are investigated as possible solutions to some current key challenges in precision approach navigation, discussed below. Augmentation systems serving continent-size areas (like the Wide Area Augmentation System or WAAS) allow certain precision approach operations within the covered region. More and better satellites, with dual frequency capabilities, are expected to be in orbit in the mid-term future, which will potentially allow WAAS-like capabilities worldwide with a sparse ground station network. Two main challenges in achieving this goal are (1) ensuring that navigation fault detection functions are fast enough to alert worldwide users of hazardously misleading information, and (2) minimizing situations in which navigation is unavailable because the user's local satellite geometry is insufficient for safe position estimation. Local augmentation systems (implemented at individual airports, like the Local Area Augmentation System or LAAS) have the potential to allow precision approach and landing operations by providing precise corrections to user-satellite range measurements. An exception to these capabilities arises during ionospheric storms (caused by solar activity), when hazardous situations can exist with residual range errors several orders of magnitudes higher than nominal. Until dual

  20. Real-Time GNSS-Based Attitude Determination in the Measurement Domain.

    PubMed

    Zhao, Lin; Li, Na; Li, Liang; Zhang, Yi; Cheng, Chun

    2017-02-05

    A multi-antenna-based GNSS receiver is capable of providing high-precision and drift-free attitude solution. Carrier phase measurements need be utilized to achieve high-precision attitude. The traditional attitude determination methods in the measurement domain and the position domain resolve the attitude and the ambiguity sequentially. The redundant measurements from multiple baselines have not been fully utilized to enhance the reliability of attitude determination. A multi-baseline-based attitude determination method in the measurement domain is proposed to estimate the attitude parameters and the ambiguity simultaneously. Meanwhile, the redundancy of attitude resolution has also been increased so that the reliability of ambiguity resolution and attitude determination can be enhanced. Moreover, in order to further improve the reliability of attitude determination, we propose a partial ambiguity resolution method based on the proposed attitude determination model. The static and kinematic experiments were conducted to verify the performance of the proposed method. When compared with the traditional attitude determination methods, the static experimental results show that the proposed method can improve the accuracy by at least 0.03° and enhance the continuity by 18%, at most. The kinematic result has shown that the proposed method can obtain an optimal balance between accuracy and reliability performance.

  1. Real-Time GNSS-Based Attitude Determination in the Measurement Domain

    PubMed Central

    Zhao, Lin; Li, Na; Li, Liang; Zhang, Yi; Cheng, Chun

    2017-01-01

    A multi-antenna-based GNSS receiver is capable of providing high-precision and drift-free attitude solution. Carrier phase measurements need be utilized to achieve high-precision attitude. The traditional attitude determination methods in the measurement domain and the position domain resolve the attitude and the ambiguity sequentially. The redundant measurements from multiple baselines have not been fully utilized to enhance the reliability of attitude determination. A multi-baseline-based attitude determination method in the measurement domain is proposed to estimate the attitude parameters and the ambiguity simultaneously. Meanwhile, the redundancy of attitude resolution has also been increased so that the reliability of ambiguity resolution and attitude determination can be enhanced. Moreover, in order to further improve the reliability of attitude determination, we propose a partial ambiguity resolution method based on the proposed attitude determination model. The static and kinematic experiments were conducted to verify the performance of the proposed method. When compared with the traditional attitude determination methods, the static experimental results show that the proposed method can improve the accuracy by at least 0.03° and enhance the continuity by 18%, at most. The kinematic result has shown that the proposed method can obtain an optimal balance between accuracy and reliability performance. PMID:28165434

  2. Heart Attack

    MedlinePlus

    ... test your blood several times during the first 24 hours to 48 hours after yours symptoms start.Other ... do to help prevent heart attack?A healthy lifestyle can help prevent heart attack. This ... your stress.Controlling your blood pressure.Managing your ...

  3. Heart Attack

    MedlinePlus

    ... a million people in the U.S. have a heart attack. About half of them die. Many people have permanent heart damage or die because they don't get ... It's important to know the symptoms of a heart attack and call 9-1-1 if someone ...

  4. Investigations on the Influence of Antenna Near-field Effects and Satellite Obstruction on the Uncertainty of GNSS-based Distance Measurements

    NASA Astrophysics Data System (ADS)

    Zimmermann, Florian; Eling, Christian; Kuhlmann, Heiner

    2016-03-01

    Antenna near-field effects are one of the accuracy limiting factors on GNSS-based distance measurements. In order to analyse these influences, a measurement campaign at an EDM calibration baseline site with optimum GNSS conditions was performed. To vary the distance between the antenna mount and the absolutely calibrated antennas, spacers with different lengths were used. Due to the comparison of the resulting GNSS-based distance measurements to a reference solution, the influences of the antenna near-field could be analyzed. The standard deviations of the differences to the reference solution, i. e., 0.31 mm for the distance and 0.46 mm for the height component, indicate that equal spacer and antenna combinations at both stations lead to a very high accuracy level. In contrast, different spacer and antenna combinations decrease the accuracy level. Thus, an identical set-up at both antenna stations and the usage of individually calibrated antennas minimize the near-field effects during the double-differencing process. Hence, these aspects can be identified as a prerequisite for highly accurate GNSS-measurements. In addition to near-field effects, the influence of satellite obstructions is investigated. Four realistic shadowing scenarios are numerically simulated on the basis of the observations, which were collected in the optimum surrounding of the EDM calibration baseline site. The comparison to nominal values indicates that a shadowing leads only to a slight decreasing of the accuracy. Consequently, there is a strong suspicion that multipath effects and signal distortions seem to have a greater influence on the accuracy of GNSS-based distance measurements than the satellite constellation.

  5. Heart Attack Recovery FAQs

    MedlinePlus

    ... a Heart Attack Treatment of a Heart Attack Life After a Heart Attack Heart Failure About Heart Failure ... a Heart Attack • Treatment of a Heart Attack • Life After a Heart Attack Lifestyle Changes Recovery FAQs • Heart ...

  6. About Heart Attacks

    MedlinePlus

    ... a Heart Attack Treatment of a Heart Attack Life After a Heart Attack Heart Failure About Heart Failure ... a Heart Attack • Treatment of a Heart Attack • Life After a Heart Attack Lifestyle Changes Recovery FAQs • Heart ...

  7. Heart Attack

    MedlinePlus

    ... it as instructed while awaiting emergency help. Take aspirin, if recommended . Taking aspirin during a heart attack could reduce heart damage by helping to keep your blood from clotting. Aspirin can interact with other medications, however, so don' ...

  8. Aspirin-responsive, migraine-like transient cerebral and ocular ischemic attacks and erythromelalgia in JAK2-positive essential thrombocythemia and polycythemia vera.

    PubMed

    Michiels, Jan Jacques; Berneman, Zwi; Gadisseur, Alain; Lam, King H; De Raeve, Hendrik; Schroyens, Wilfried

    2015-01-01

    Migraine-like cerebral transient ischemic attacks (MIAs) and ocular ischemic manifestations were the main presenting features in 10 JAK2(V617F)-positive patients studied, with essential thrombocythemia (ET) in 6 and polycythemia vera (PV) in 4. Symptoms varied and included cerebral ischemic attacks, mental concentration disturbances followed by throbbing headaches, nausea, vomiting, syncope or even seizures. MIAs were frequently preceded or followed by ocular ischemic events of blurred vision, scotomas, transient flashing of the eyes, and sudden transient partial blindness preceded or followed erythromelalgia in the toes or fingers. The time lapse between the first symptoms of aspirin-responsive MIAs and the diagnosis of ET in 5 patients ranged from 4 to 12 years. At the time of erythromelalgia and MIAs, shortened platelet survival, an increase in the levels of the platelet activation markers β-thromboglobulin and platelet factor 4 and also in urinary thromboxane B2 were clearly indicative of the spontaneous in vivo platelet activation of constitutively JAK2(V617F)-activated thrombocythemic platelets. Aspirin relieves the peripheral, cerebral and ocular ischemic disturbances by irreversible inhibition of platelet cyclo-oxygenase (COX-1) activity and aggregation ex vivo. Vitamin K antagonist, dipyridamole, ticlopidine, sulfinpyrazone and sodium salicylate have no effect on platelet COX-1 activity and are ineffective in the treatment of thrombocythemia-specific manifestations of erythromelalgia and atypical MIAs. If not treated with aspirin, ET and PV patients are at a high risk of major arterial thrombosis including stroke, myocardial infarction and digital gangrene. © 2014 S. Karger AG, Basel.

  9. Passive transfer of narcolepsy: anti-TRIB2 autoantibody positive patient IgG causes hypothalamic orexin neuron loss and sleep attacks in mice.

    PubMed

    Katzav, Aviva; Arango, Maria T; Kivity, Shaye; Tanaka, Susumu; Givaty, Gili; Agmon-Levin, Nancy; Honda, Makoto; Anaya, Juan-Manuel; Chapman, Joab; Shoenfeld, Yehuda

    2013-09-01

    Narcolepsy is a sleep disorder characterized by excessive daytime sleepiness and cataplexy (a sudden weakening of posture muscle tone usually triggered by emotion) caused by the loss of orexin neurons in the hypothalamus. Autoimmune mechanisms are implicated in narcolepsy by increased frequency of specific HLA alleles and the presence of specific autoantibody (anti-Tribbles homolog 2 (TRIB2) antibodies) in the sera of patients with narcolepsy. Presently, we passively transferred narcolepsy to naïve mice by injecting intra-cerebra-ventricularly (ICV) pooled IgG positive for anti-TRIB2 antibodies. Narcolepsy-IgG-injected mice had a loss of the NeuN (neuronal marker), synaptophysin (synaptic marker) and orexin-positive neurons in the lateral hypothalamus area in narcolepsy compared to control-IgG-injected mice and these changes were associated with narcolepsy-like immobility attacks at four weeks post injection and with hyperactivity and long term memory deficits in the staircase and novel object recognition tests. Similar behavioral and cognitive deficits are observed in narcoleptic patients. This is the first report of passive transfer of experimental narcolepsy to naïve mice induced by autoantibodies and supports the autoimmune pathogenesis in narcolepsy.

  10. Allergens might trigger migraine attacks.

    PubMed

    Bektas, Hesna; Karabulut, Hayriye; Doganay, Beyza; Acar, Baran

    2017-03-01

    Migraine is a common primary headache disorder. The mechanisms underlying the onset of a migraine attack are not completely understood. Environmental changes and a number of other factors could induce migraine attacks. The aim of this study was to investigate the relationship between the frequency of migraine attacks and allergens. Migraine patients without aura, and healthy individuals similar in age and gender without a history of headache and allergy were prospectively included in the study. The duration of migraine, the frequency of migraine attacks, the medication history, and the symptoms during attacks were questioned. Migraine disability assessment score (MIDAS) and visual analog scale (VAS) scores were obtained. Allergen extracts including dust, fungi, insect, animal epithelium, pollens, and food allergens were applied for allergy tests. 49 migraine patients and 49 healthy individuals were enrolled in the study. There was no significant difference in terms of age and gender. The median migraine disease duration, the number of attacks in a month, and the duration of attacks were, respectively, 5.5 years (1-44), 4 (1-10) day/month, and 24 (4-72) h. The mean MIDAS grade was 2.45 ± 0.14 (1-4), and mean VAS score was 7.89 ± 0.27 (4-10). The positivity of allergy tests was 55.1 % (27/49) in the migraine group and 32.7 % (16/49) in the control group (p < 0.05). The allergy tests were positive for house dust, red birch, hazel tree, olive tree, nettle, and wheat. The frequency of migraine attacks was higher in allergy-test-positive patients than in negative ones in the migraine group (p = 0.001). The migraine patients who had frequent attacks should be examined for allergies.

  11. Heart Attack Symptoms in Women

    MedlinePlus

    ... a Heart Attack Treatment of a Heart Attack Life After a Heart Attack Heart Failure About Heart Failure ... a Heart Attack • Treatment of a Heart Attack • Life After a Heart Attack Lifestyle Changes Recovery FAQs • Heart ...

  12. Investigation of the effect of vehicle, angle-of-attack, and trim elevon position on lateral-directional aerodynamic parameters of the Shuttle Orbiter

    NASA Technical Reports Server (NTRS)

    Schiess, J. R.; Suit, W. T.; Scallion, W. I.

    1984-01-01

    This paper discusses the lateral-directional stability and control coefficients extracted from onboard measurements made during reentry of flights two to eight of the Space Shuttle Orbiters. Maximum likelihood estimation is applied to data derived from accelerometer and rate gyro measurements and trajectory, meteorological and control surface data to estimate these lateral-directional parameters. Comparison of estimated coefficients across the seven flights and two shuttle vehicles is made. The effect of the angle-of-attack, and trim elevon deflection on estimated values of the stability and control derivatives is also studied.

  13. When women attack.

    PubMed

    McLaughlin, Bryan; Davis, Catasha; Coppini, David; Kim, Young Mie; Knisely, Sandra; McLeod, Douglas

    2015-01-01

    The common assumption that female candidates on the campaign trail should not go on the attack, because such tactics contradict gender stereotypes, has not received consistent support. We argue that in some circumstances gender stereotypes will favor female politicians going negative. To test this proposition, this study examines how gender cues affect voter reactions to negative ads in the context of a political sex scandal, a context that should prime gender stereotypes that favor females. Using an online experiment involving a national sample of U.S. adults (N = 599), we manipulate the gender and partisan affiliation of a politician who attacks a male opponent caught in a sex scandal involving sexually suggestive texting to a female intern. Results show that in the context of a sex scandal, a female candidate going on the attack is evaluated more positively than a male. Moreover, while female participants viewed the female sponsor more favorably, sponsor gender had no effect on male participants. Partisanship also influenced candidate evaluations: the Democratic female candidate was evaluated more favorably than her Republican female counterpart.

  14. Psychopathology of panic attacks in panic disorder.

    PubMed

    Uhlenhuth, E H; Leon, Andrew C; Matuzas, William

    2006-05-01

    This study examined the relationships among certain subtypes of panic attacks (full vs. limited symptom; spontaneous vs. situational) and between these subtypes, panic disorder subtypes, and other characteristics of panic disorder, especially agoraphobia. Data were drawn from a large (n = 1,168) treatment study of panic disorder in which panic attacks were carefully subtyped and counted using a diary. Relationships between variables at baseline were examined primarily using non-parametric methods, and the course of improvement for panic subtypes among completers was plotted. The median number of spontaneous panic attacks per week at baseline was similar among patients with panic disorder without agoraphobia (PD), limited phobic avoidance (PDL), and agoraphobia (PDA). The median number of situational attacks and the median agoraphobia ratings rose progressively across diagnostic subtypes. Anticipatory anxiety, HAM-A, HAM-D, and disability scores were higher in PDA than in PD. Full and limited symptom panic attacks were positively correlated. The proportion of total attacks that were limited rose during the first two weeks of treatment, suggesting conversion of full to limited symptom attacks before complete disappearance. Spontaneous and situational attacks were correlated minimally or not at all. Agoraphobia ratings were more positively correlated with situational than with spontaneous panic attacks. Few of the correlations among measures at baseline were high. Full and limited symptom panic attacks differ primarily in severity. Spontaneous and situational attacks are relatively independent, and situational attacks are more closely related to agoraphobia. These findings are consistent with previous work suggesting that spontaneous attacks reflect a biological component, whereas situational attacks reflect a cognitive component in the psychopathology-- and possibly the pathogenesis-- of panic disorder. This provides a rationale for the use of combined

  15. Investigation of GNSS Based ERP-series to Validate Atmospheric and Oceanic Contributions to High Frequency Earth Rotation

    NASA Astrophysics Data System (ADS)

    Weber, R.; Nastula, J.; Boehm, S.

    2009-12-01

    Over the past 25 years several authors have shown that polar motions and variations of Universal Time (UT1) or length of day (LOD), respectively, from seasonal time scales down to one week are forced to a great extent by atmospheric and oceanic angular momentum (AAM and OAM) changes (Barnes, 1983; Rosen and Salstein, 1983; Brzezinski, 1992, 1994; Nastula and Salstein, 1999; Kolaczek et al., 2000; Nastula et al., 2002; Ponte and Ali,2002) and by the solid Earth tides and ocean tides. Oceanic tides also cause variations in UT1/LOD and in polar motion in particular at shorter time scales with diurnal and semi-diurnal periods. Theoretical and semi-empirical models were published by e.g. Gross (1993), Ray et al. (1994). All studies were based on ocean tide models or were using ocean tidal measurements by satellite altimetry. The Ray et al. (1994) model based on TOPEX/Poseidon satellite altimetry data is still the model which is recommended in the IERS Conventions 2003. The high-frequency variations of the Earth rotation parameters due to ocean tides can also be empirically determined from time series derived by space geodetic techniques like Very Long Baseline Interferometry (VLBI) or the Global Positioning System (GPS). Within this investigation high-quality ERP (Earth Rotation Parameter) series, i.e. polar motion (PM), and UT1 or length of day (LOD) with a time resolution of one hour have been established by processing observation data from both active GNSS-systems (GPS+GLONASS). Their correlation with oceanic- (OAM) and atmospheric-induced angular momentum (AAM) acting on the Earth’s surface are investigated. The investigations concentrate on short period variations of Earth rotation with periods of a few days down to a few hours. The amplitudes and phases of these short period tidally and non-tidally induced variations are compared to recent semi-empirical models of the oceanic and atmospheric excitation. Contrary to the standard processing scheme an improved

  16. Positioning.

    ERIC Educational Resources Information Center

    Conone, Ruth M.

    The key to positioning is the creation of a clear benefit image in the consumer's mind. One positioning strategy is creating in the prospect's mind a position that takes into consideration the company's or agency's strengths and weaknesses as well as those of its competitors. Another strategy is to gain entry into a position ladder owned by…

  17. Investigation on the movement of vortex burst position with dynamically changing angle of attack for a schematic deltawing in a watertunnel with correlation to similar studies in windtunnel

    NASA Astrophysics Data System (ADS)

    Wolffelt, Karl W.

    1987-06-01

    The requirements for modern military aircraft to maintain good handling qualities at very high angles of attack is one of many reasons why an increased knowledge is necessary regarding the aerodynamic behavior of vortex flows at nonstationary conditions. Linearized theory as it has been utilized in flight mechanics simulation using damping derivatives derived from forced oscillation technique, for example, may no longer be valid at such conditions. With this background some investigations have been made by SAAB-SCANIA with the aim to study the hysteresis effects for nonstationary vortex flows. A schematic delta-wing model which could also be equipped with a similar canard wing has been tested in a water tunnel. The model was supported in the tunnel by a simple mechanism by which it could be forced to move in one of four different modes, pitching or plunging with either ramp or harmonic motion. The flow over the model was visualized with air bubbles and sequences were recorded on videotape. The sequences were analyzed and the movements of the leading edge vortex burst have been studied with the main interest focused on the hysteresis effects.

  18. Pericarditis - after heart attack

    MedlinePlus

    ... medlineplus.gov/ency/article/000166.htm Pericarditis - after heart attack To use the sharing features on this page, ... occur in the days or weeks following a heart attack . Causes Two types of pericarditis can occur after ...

  19. Heart attack first aid

    MedlinePlus

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  20. Seven Deadliest Network Attacks

    SciTech Connect

    Prowell, Stacy J; Borkin, Michael; Kraus, Robert

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

  1. Traumatic tiger attack.

    PubMed

    Chum, Marvin; Ng, Wai Pui

    2011-11-01

    Attacks on humans by large cats are uncommon occurrences and thus the principles of managing such injuries are not well documented. The authors here report the case of an 11-year-old boy who was mauled by a privately owned tiger. The attack resulted in multiple cranial lacerations and fractures, dissection of the internal carotid artery, and persistent neurological deficits. This case outlines the multiple sources of injury and pathology that can result from such an attack. Discussion is focused on the pattern of injury seen in large feline attacks and the treatment approach.

  2. Depression After Heart Attack

    MedlinePlus

    ... ATVB) Circulation → Circ: Arrhythmia and Electrophysiology → Circ: Cardiovascular Genetics → Circ: Cardiovascular ... Patient Page Depression After Heart Attack Why Should I Be Concerned ...

  3. Network Attack Reference Data Set

    DTIC Science & Technology

    2004-12-01

    change without human intervention, while anomaly detection techniques often result in a high degree of false positives and can sometimes be re-trained...change without human intervention and therefore can introduce false negatives in its reports. Anomaly detection techniques, through systems that detect...attacks) to the best of our knowledge. Us- ing TCPUtils, the IP addresses of this traffic were translated to reflect the chosen class B address ranges

  4. Can You Recognize a Heart Attack? Quiz

    MedlinePlus

    ... a Heart Attack Treatment of a Heart Attack Life After a Heart Attack Heart Failure About Heart Failure ... a Heart Attack • Treatment of a Heart Attack • Life After a Heart Attack Lifestyle Changes Recovery FAQs • Heart ...

  5. Stroke following rottweiler attack.

    PubMed

    Miller, S J; Copass, M; Johansen, K; Winn, H R

    1993-02-01

    A previously healthy 50-year-old man suffered a major right cerebral infarction shortly after receiving head and neck bites in an attack by two rottweilers. Arteriography revealed occlusion of the right middle cerebral artery, an intimal flap and pseudoaneurysm in the high right internal carotid artery just proximal to the skull base, and an obstructed right vertebral artery. The powerful jaw mechanism of rottweilers and other large mastiff-type dogs makes their bites particularly destructive. The predilection of these animals for attacking the head and upper body makes occult crush injury to the extracranial cerebral vessels an important diagnostic consideration following such attacks.

  6. [Atypical panic attacks].

    PubMed

    Boulenger, Jean-Philippe

    2009-04-20

    Panic attacks are acute episodes of severe anxiety characterized by a brutal onset and a progressive ending. When atypical, this symptomatic picture is often the cause of diagnostic errors sometimes costly in terms of clinical work-up and repeated specialized advices. Each of the classical components of panic attacks (psychological, physical, behavioural) being able to give rise to an atypical presentation, these components must be systematically evaluated. The semiological analysis of these attacks, their clinical background and their occurrence in young adults, mostly women, will contribute to the right diagnosis of these emotional reactions so frequent in general practice.

  7. Supply Chain Attack Framework and Attack Patterns

    DTIC Science & Technology

    2013-12-01

    Malware is embedded in a replacement server motherboard (e.g., in the flash memory) in order to alter server functionality from that intended. Attack...Slashdot: Dell Ships Infected Motherboards July 21, 2010(c/o Rick Dove) Threat: An adversary with access to hardware procurement, maintenance, or upgrade...control can embed malware in a critical component server motherboard . Vulnerabilities: The control processes and mechanisms for hardware

  8. Signs of a Heart Attack

    MedlinePlus

    ... attack Heart Health and Stroke Signs of a heart attack Related information Make the Call. Don't Miss ... to top More information on Signs of a heart attack Read more from womenshealth.gov Make the Call, ...

  9. New sensitivity analysis attack

    NASA Astrophysics Data System (ADS)

    El Choubassi, Maha; Moulin, Pierre

    2005-03-01

    The sensitivity analysis attacks by Kalker et al. constitute a known family of watermark removal attacks exploiting a vulnerability in some watermarking protocols: the attacker's unlimited access to the watermark detector. In this paper, a new attack on spread spectrum schemes is designed. We first examine one of Kalker's algorithms and prove its convergence using the law of large numbers, which gives more insight into the problem. Next, a new algorithm is presented and compared to existing ones. Various detection algorithms are considered including correlation detectors and normalized correlation detectors, as well as other, more complicated algorithms. Our algorithm is noniterative and requires at most n+1 operations, where n is the dimension of the signal. Moreover, the new approach directly estimates the watermark by exploiting the simple geometry of the detection boundary and the information leaked by the detector.

  10. A fatal leopard attack.

    PubMed

    Hejna, Petr

    2010-05-01

    A rare case of a big cat fatal attack is presented. A male leopard that had escaped from its unlocked cage attacked a 26-year-old male zoo worker. The man sustained penetrating injuries to the neck with consequent external bleeding. The man died while being transported to the hospital as a result of the injuries sustained. The wounds discovered on the victim's body corresponded with the known methods of leopard attacks and with findings on the carcasses of animals killed by leopards in the wild. The conclusion of the medicolegal investigation was that the underlying cause of death was a bite wound to the neck which lacerated the left internal jugular vein, the two main branches of the left external carotid artery, and the cervical spine. The cause of death was massive external bleeding. Special attention is paid to the general pattern of injuries sustained from big cat attacks.

  11. Transient Ischemic Attack

    MedlinePlus

    A transient ischemic attack (TIA) is a stroke lasts only a few minutes. It happens when the blood supply to part of the brain is briefly blocked. Symptoms of a TIA are like other stroke symptoms, but do not ...

  12. Transient Ischemic Attack

    MedlinePlus Videos and Cool Tools

    ... TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2017, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. The content in this library is for educational purposes only, and therefore is ...

  13. Cooperating attackers in neural cryptography.

    PubMed

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  14. Sleep-disordered breathing in acute ischemic stroke and transient ischemic attack: effects on short- and long-term outcome and efficacy of treatment with continuous positive airways pressure--rationale and design of the SAS CARE study.

    PubMed

    Cereda, Carlo W; Petrini, Liliane; Azzola, Andrea; Ciccone, Alfonso; Fischer, Urs; Gallino, Augusto; Györik, Sandor; Gugger, Matthias; Mattis, Johannes; Lavie, Lena; Limoni, Costanzo; Nobili, Lino; Manconi, Mauro; Ott, Sebastian; Pons, Marco; Bassetti, Claudio L

    2012-10-01

    Sleep-disordered breathing represents a risk factor for cardiovascular morbidity and mortality and negatively affects short-term and long-term outcome after an ischemic stroke or transient ischemic attack. The effect of continuous positive airways pressure in patients with sleep-disordered breathing and acute cerebrovascular event is poorly known. The SAS CARE 1 study assesses the effects of sleep-disordered breathing on clinical evolution, vascular functions, and markers within the first three-months after an acute cerebrovascular event. The SAS CARE 2 assesses the effect of continuous positive airways pressure on clinical evolution, cardiovascular events, and mortality as well as vascular functions and markers at 12 and 24 months after acute cerebrovascular event. SAS CARE 1 is an open, observational multicenter study in patients with acute cerebrovascular event acutely admitted in a stroke unit: a sample of 200 acute cerebrovascular event patients will be included. Vascular functions and markers (blood pressure, heart rate variability, endothelial function by peripheral arterial tonometry and specific humoral factors) will be assessed in the acute phase and at three-months follow-up. SAS CARE 2 will include a sample of patients with acute cerebrovascular event in the previous 60-90 days. After baseline assessments, the patients will be classified according to their apnea hypopnea index in four arms: non-sleep-disordered breathing patients (apnea hypopnea index <10), patients with central sleep-disordered breathing, sleepy patients with obstructive apnea hypopnea index ≥20, which will receive continuous positive airways pressure treatment, nonsleepy patients with obstructive sleep-disordered breathing (apnea hypopnea index ≥20), which will be randomized to receive continuous positive airways pressure treatment or not. The SAS CARE study will improve our understanding of the clinical sleep-disordered breathing in patients with acute cerebrovascular event and

  15. Fatal big cat attacks.

    PubMed

    Cohle, S D; Harlan, C W; Harlan, G

    1990-09-01

    Two cases of fatal attacks by large cats are presented. In the first case, a 30-year-old female zoo worker was attacked by a jaguar that had escaped its cage. In the second case, a 2-year-old girl was fatally injured by her father's pet leopard. The pattern of injuries in these cases is nearly identical to those of these cats' prey in the wild.

  16. What Causes a Heart Attack?

    MedlinePlus

    ... explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, visit www.hearttruth.gov or the Health Topics Heart Attack and Heart Disease in Women articles. What is a heart attack? 05/22/ ...

  17. Collaborative Attack vs. Collaborative Defense

    NASA Astrophysics Data System (ADS)

    Xu, Shouhuai

    We have witnessed many attacks in the cyberspace. However, most attacks are launched by individual attackers even though an attack may involve many compromised computers. In this paper, we envision what we believe to be the next generation cyber attacks — collaborative attacks. Collaborative attacks can be launched by multiple attackers (i.e., human attackers or criminal organizations), each of which may have some specialized expertise. This is possible because cyber attacks can become very sophisticated and specialization of attack expertise naturally becomes relevant. To counter collaborative attacks, we might need collaborative defense because each “chain” in a collaborative attack may be only adequately dealt with by a different defender. In order to understand collaborative attack and collaborative defense, we present a high-level abstracted framework for evaluating the effectiveness of collaborative defense against collaborative attacks. As a first step towards realizing and instantiating the framework, we explore a characterization of collaborative attacks and collaborative defense from the relevant perspectives.

  18. Fatal crocodile attack.

    PubMed

    Chattopadhyay, Saurabh; Shee, Biplab; Sukul, Biswajit

    2013-11-01

    Attacks on human beings by various animals leading to varied types of injuries and even death in some cases are not uncommon. Crocodile attacks on humans have been reported from a number of countries across the globe. Deaths in such attacks are mostly due to mechanical injuries or drowning. Bites by the crocodiles often cause the limbs to be separated from the body. The present case refers to an incident of a fatal attack by a crocodile on a 35 years old female where only the mutilated head of the female was recovered. Multiple lacerated wounds over the face and scalp along with fracture of the cranial bones was detected on autopsy. Two distinct bite marks in the form of punched in holes were noted over the parietal and frontal bones. Injuries on the head with its traumatic amputation from the body were sufficient to cause death. However, the presence of other fatal injuries on the unrecovered body parts could not be ruled out.

  19. Word Attack Model.

    ERIC Educational Resources Information Center

    Follettie, Joseph F.

    A limited analysis of alternative approaches to phonemic-level word attack instruction is provided in this document. The instruction segment begins with training in letter-sound correspondences for which mastery of certain skills is assumed. Instruction ends with the decoding of novel items having a consonant-vowel-consonant construction. Contents…

  20. Heart Attack Coronary Artery Disease

    MedlinePlus

    ... our e-newsletter! Aging & Health A to Z Heart Attack Coronary Artery Disease, Angina Basic Facts & Information What ... and oxygen supply; this is what causes a heart attack. If the damaged area is small, however, your ...

  1. An Attack Surface Metric

    DTIC Science & Technology

    2005-07-01

    Introduction Measurement of security, both qualitatively and quantitatively, has been a long standing challenge to the research community , and is of...our approach to related work in Section 2. We introduce the entry point and exit point framework in Section 3. We present the definitions of...ignores the specific system configuration that gave rise to the vulnerability, and it does not capture a system’s future attackability. Our approach

  2. Plants Under Attack

    PubMed Central

    De Vos, Martin; Van Oosten, Vivian R; Jander, Georg; Dicke, Marcel

    2007-01-01

    To defend themselves, plants activate inducible defense mechanisms that are effective against the invader that is encountered. There is partial overlap in the defense signaling pathways that are induced by insect herbivores and microbial pathogens that may result in cross-resistance. We have previously shown that infestation by tissue-chewing Pieris rapae larvae induces resistance in Arabidopsis thaliana against subsequent attack by the microbial pathogens Pseudomonas syringae pv. tomato (Pst), Xanthomonas campestris pv. armoraciae (Xca) and turnip crinkle virus (TCV). Phloem-feeding aphids, such as the generalist Myzus persicae, have a stealthy feeding strategy that is very different from chewing by lepidopteran larvae. Yet, M. persicae feeding results in a large transcriptomic change. Here, we report on the effectiveness of the defense response that is triggered by M. persicae infestation, as well as the sensitivity of M. persicae to microbially-induced resistance. M. persicae reproduction was not affected by prior conspecific feeding, nor was aphid-induced resistance effective against subsequent attack by Pst, Xca or TCV. Moreover, induced systemic resistance (ISR) triggered by beneficial Pseudomonas fluorescens rhizobacteria was not effective against M. persicae. However, systemic acquired resistance (SAR) induced by prior infection with avirulent Pst was associated with reduced aphid reproduction. These data provide insight into the effectiveness of pathogen and insect resistance and highlight the complexity of the defense responses that are triggered during multitrophic plant-attacker interactions. PMID:19704549

  3. Life After a Heart Attack

    MedlinePlus

    ... explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, visit www.hearttruth.gov or the Health Topics Heart Attack and Heart Disease in Women articles. All of Our Stories Are Red: Jennifer's ...

  4. Maintaining defender's reputation in anomaly detection against insider attacks.

    PubMed

    Zhang, Nan; Yu, Wei; Fu, Xinwen; Das, Sajal K

    2010-06-01

    We address issues related to establishing a defender's reputation in anomaly detection against two types of attackers: 1) smart insiders, who learn from historic attacks and adapt their strategies to avoid detection/punishment, and 2) naïve attackers, who blindly launch their attacks without knowledge of the history. In this paper, we propose two novel algorithms for reputation establishment--one for systems solely consisting of smart insiders and the other for systems in which both smart insiders and naïve attackers are present. The theoretical analysis and performance evaluation show that our reputation-establishment algorithms can significantly improve the performance of anomaly detection against insider attacks in terms of the tradeoff between detection and false positives.

  5. Using residual stacking to mitigate site-specific errors in order to improve the quality of GNSS-based coordinate time series of CORS

    NASA Astrophysics Data System (ADS)

    Knöpfler, Andreas; Mayer, Michael; Heck, Bernhard

    2014-05-01

    Within the last decades, positioning using GNSS (Global Navigation Satellite Systems; e.g., GPS) has become a standard tool in many (geo-) sciences. The positioning methods Precise Point Positioning and differential point positioning based on carrier phase observations have been developed for a broad variety of applications with different demands for example on accuracy. In high precision applications, a lot of effort was invested to mitigate different error sources: the products for satellite orbits and satellite clocks were improved; the misbehaviour of satellite and receiver antennas compared to an ideal antenna is modelled by calibration values on absolute level, the modelling of the ionosphere and the troposphere is updated year by year. Therefore, within processing of data of CORS (continuously operating reference sites), equipped with geodetic hardware using a sophisticated strategy, the latest products and models nowadays enable positioning accuracies at low mm level. Despite the considerable improvements that have been achieved within GNSS data processing, a generally valid multipath model is still lacking. Therefore, site specific multipath still represents a major error source in precise GNSS positioning. Furthermore, the calibration information of receiving GNSS antennas, which is for instance derived by a robot or chamber calibration, is valid strictly speaking only for the location of the calibration. The calibrated antenna can show a slightly different behaviour at the CORS due to near field multipath effects. One very promising strategy to mitigate multipath effects as well as imperfectly calibrated receiver antennas is to stack observation residuals of several days, thereby, multipath-loaded observation residuals are analysed for example with respect to signal direction, to find and reduce systematic constituents. This presentation will give a short overview about existing stacking approaches. In addition, first results of the stacking approach

  6. Replacement Attack: A New Zero Text Watermarking Attack

    NASA Astrophysics Data System (ADS)

    Bashardoost, Morteza; Mohd Rahim, Mohd Shafry; Saba, Tanzila; Rehman, Amjad

    2017-03-01

    The main objective of zero watermarking methods that are suggested for the authentication of textual properties is to increase the fragility of produced watermarks against tampering attacks. On the other hand, zero watermarking attacks intend to alter the contents of document without changing the watermark. In this paper, the Replacement attack is proposed, which focuses on maintaining the location of the words in the document. The proposed text watermarking attack is specifically effective on watermarking approaches that exploit words' transition in the document. The evaluation outcomes prove that tested word-based method are unable to detect the existence of replacement attack in the document. Moreover, the comparison results show that the size of Replacement attack is estimated less accurate than other common types of zero text watermarking attacks.

  7. Modeling Partial Attacks with Alloy

    NASA Astrophysics Data System (ADS)

    Lin, Amerson; Bond, Mike; Clulow, Jolyon

    The automated and formal analysis of cryptographic primitives, security protocols and Application Programming Interfaces (APIs) up to date has been focused on discovering attacks that completely break the security of a system. However, there are attacks that do not immediately break a system but weaken the security sufficiently for the adversary. We term these attacks partial attacks and present the first methodology for the modeling and automated analysis of this genre of attacks by describing two approaches. The first approach reasons about entropy and was used to simulate and verify an attack on the ECB|ECB|OFB triple-mode DES block-cipher. The second approach reasons about possibility sets and was used to simulate and verify an attack on the personal identification number (PIN) derivation algorithm used in the IBM 4758 Common Cryptographic Architecture.

  8. Improving Attack Graph Visualization through Data Reduction and Attack Grouping

    SciTech Connect

    John Homer; Ashok Varikuti; Xinming Ou; Miles A. McQueen

    2008-09-01

    Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions. This paper presents methodologies that can 1) automatically identify portions of an attack graph that do not help a user to understand the core security problems and so can be trimmed, and 2) automatically group similar attack steps as virtual nodes in a model of the network topology, to immediately increase the understandability of the data. We believe both methods are important steps toward improving visualization of attack graphs to make them more useful in configuration management for large enterprise networks. We implemented our methods using one of the existing attack-graph toolkits. Initial experimentation shows that the proposed approaches can 1) significantly reduce the complexity of attack graphs by trimming a large portion of the graph that is not needed for a user to understand the security problem, and 2) significantly increase the accessibility and understandability of the data presented in the attack graph by clearly showing, within a generated visualization of the network topology, the number and type of potential attacks to which each host is exposed.

  9. DNS Rebinding Attacks

    DTIC Science & Technology

    2009-09-01

    action [From 2] The same origin policy is also called Single Origin or Same Site Policy. It was originally released with Netscape Navigator 2.0 and...success Netscape 8.2.1 Windows XP / SP2 success Opera 9.0.2 Windows 2000 / SP4 success Table 6. Satoh’s attack results using Adobe Flash Player...dns/dns-rebinding.pdf. Retrieved May 2009. [4] D. Dean, E. W. Felten, and D. S. Wallach “Java Security: From HotJava to Netscape and Beyond

  10. The Electron Density Features Revealed by the GNSS-Based Radio Tomography in the Different Latitudinal and Longitudinal Sectors of the Ionosphere

    NASA Astrophysics Data System (ADS)

    Andreeva, Elena; Tereshchenko, Evgeniy; Nazarenko, Marina; Nesterov, Ivan; Kozharin, Maksim; Padokhin, Artem; Tumanova, Yulia

    2016-04-01

    requires a dedicated study. We present the examples of the both types of the structures. We show a collection of different ionospheric structures under different space weather conditions: the ionization troughs, with their widely varying shapes, depths, positions, and internal distributions of plasma; isolated spots of the increased or decreased electron density, sharp wall-like density gradients, blobs, wavelike disturbances on different spatiotemporal scales etc. We demonstrate the series of the local isolated irregularities which are observed during both the quiet and disturbed days. We show the examples of the ionospheric plasma distributions strikingly varying during the geomagnetic storms. Some of the RT data are compared to the independent observations by the ionosondes. We also present the examples of RT images comparison with the UV spectroscopy data.

  11. Dog pack attack: hunting humans.

    PubMed

    Avis, S P

    1999-09-01

    Dog bite-related fatalities, although unusual, accounted for 304 deaths in the United States between 1979 and 1996 and 6 fatalities in Canada between 1994 and 1996. Fatal dog pack attacks and attacks involving human predation are less common. The following describes a dog pack attack on a family of four involving 2 fatalities with predation of the victims. Factors previously identified that contribute to pack attacks and predation, including prior group hunting, social feeding, territorial defense, lack of human interaction, and prey stimuli, are discussed.

  12. Sulfate attack expansion mechanisms

    SciTech Connect

    Müllauer, Wolfram Beddoe, Robin E.; Heinz, Detlef

    2013-10-15

    A specially constructed stress cell was used to measure the stress generated in thin-walled Portland cement mortar cylinders caused by external sulfate attack. The effects of sulfate concentration of the storage solution and C{sub 3}A content of the cement were studied. Changes in mineralogical composition and pore size distribution were investigated by X-ray diffraction and mercury intrusion porosimetry, respectively. Damage is due to the formation of ettringite in small pores (10–50 nm) which generates stresses up to 8 MPa exceeding the tensile strength of the binder matrix. Higher sulfate concentrations and C{sub 3}A contents result in higher stresses. The results can be understood in terms of the effect of crystal surface energy and size on supersaturation and crystal growth pressure.

  13. Scenario Graphs and Attack Graphs

    DTIC Science & Technology

    2004-04-14

    46 6.1 Vulnerability Analysis of a Network . . . . . . . . . . . . . . . . . . . . . . . . . 53 6.2 Sandia Red Team Attack Graph...asymptotic bound. The test machine was a 1Ghz Pentium III with 1GB of RAM, running Red Hat Linux 7.3. Figure 4.1(a) plots running time of the implemen...host scanning tools network information vulnerability Attack Graph network Red

  14. [Heart-attack in pregnancy].

    PubMed

    Výtisková, T; Suchá, D; Fučíková, Z

    To describe hear-attack on crystal meth addicted pregnant woman. Case report. Acute heart-attack during pregnancy means unexpected obstetric complication. The consequences could be fatal for the mother and the fetus. Although good delivery management and treatment could reduce morbidity and mortality to a minimum.

  15. Gout attacks and lunar cycle.

    PubMed

    Mikulecký, M; Rovenský, J

    2000-07-01

    The aim was to search for periodical fluctuations in daily occurrence of gout attacks during the synodic lunar cycle. 126 gout attacks were recorded between 1972 and 1994 at known calendar dates. The synodic plexogram, displaying the number of attacks for each day of the cycle, was processed by cosinor regression. A pronounced cycling was found, with highest peaks under the new and full moon (syzygigies). Thus, the maximal occurrence of attacks coincides with the peaking lunisolar tidal effect. Similar relation of attacks to synodic moon was seen in bronchial asthma of children, and a reciprocal one in paroxysmal tachyarrhythmia. Differing pathogenetic backgrounds of these diseases substantiate the observed differences in their putative reactions on the changing cosmogeophysical environment.

  16. Invisible Trojan-horse attack.

    PubMed

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  17. Coronary Artery Dissection: Not Just a Heart Attack

    MedlinePlus

    ... a Heart Attack Treatment of a Heart Attack Life After a Heart Attack Heart Failure About Heart Failure ... a Heart Attack • Treatment of a Heart Attack • Life After a Heart Attack Lifestyle Changes Recovery FAQs • Heart ...

  18. Heart Attack or Sudden Cardiac Arrest: How Are They Different?

    MedlinePlus

    ... a Heart Attack Treatment of a Heart Attack Life After a Heart Attack Heart Failure About Heart Failure ... a Heart Attack • Treatment of a Heart Attack • Life After a Heart Attack Lifestyle Changes Recovery FAQs • Heart ...

  19. WILD PIG ATTACKS ON HUMANS

    SciTech Connect

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  20. Variability of the characteristics of a migraine attack within patients.

    PubMed

    Viana, M; Sances, G; Ghiotto, N; Guaschino, E; Allena, M; Nappi, G; Goadsby, P J; Tassorelli, C

    2016-08-01

    Migraine attacks may present different features in different patients and also within the same patient. The percentage of patients reporting stereotyped attacks and those reporting attacks with different phenotypes has not been the object of specific investigations. The objective of this article is to evaluate the percentage of migraine patients reporting the same characteristics, in terms of phenotype and response to symptomatic medications on three consecutive migraine attacks. Thirty patients with migraine without aura prospectively recorded the features of three consecutive attacks in a headache diary. Characteristics recorded were: pain intensity, presence of nausea, vomiting, photophobia, phonophophia, osmophobia, allodynia, cranial autonomic symptoms (at least one), and premonitory symptoms. Patients were allowed to take frovatriptan as symptomatic medication, whose efficacy was evaluated as the two hours pain-free status. None of the patients presented identical characteristics on the three studied attacks. This was still the case if we reduced the number of variables evaluated from 11 to seven of the eight core features indicated by the ICHD. Considering just six variables: unilaterality and quality of pain, presence/absence of nausea, vomiting, photophobia and phonophobia, only two patients (6%) had identical features on three consecutive attacks.With respect to the response to frovatriptan, 39% of patients had the same response, either positive (i.e. pain free after two hours) or negative (i.e. not pain free after two hours) on three consecutive attacks. Migraine attacks show a high variability not just among patients, but also within the same patient. Our data indicate that stereotypy of attacks is uncommon, and reinforces the underlying logic of the current operational classification system. © International Headache Society 2015.

  1. Understand Your Risk of Heart Attack

    MedlinePlus

    ... the lowdown on: Total Cholesterol: Your total cholesterol score is calculated using the following equation: HDL + LDL + ... Coronary Artery Dissection: Not Just a Heart Attack • Warning Signs of a Heart Attack Heart Attack Symptoms ...

  2. Genetic attack on neural cryptography

    SciTech Connect

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-15

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  3. Genetic attack on neural cryptography.

    PubMed

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  4. Sleep apnea and panic attacks.

    PubMed

    Edlund, M J; McNamara, M E; Millman, R P

    1991-01-01

    A survey of 301 sleep apnea patients demonstrated that obstructive sleep apnea may cause nocturnal panic attack symptoms. Sleep apnea should be considered in the differential diagnosis of nocturnal panic disorder.

  5. Joint Direct Attack Munition (JDAM)

    DTIC Science & Technology

    2013-12-01

    2005 FEB 2005 Selective Availability Anti- Spoofing Module (SAASM)/ GPS Anti-Jam Production Award N/A MAR 2005 SEP 2005 MAR 2005 Change Explanations...Selected Acquisition Report (SAR) RCS: DD-A&T(Q&A)823-503 Joint Direct Attack Munition (JDAM) As of FY 2015 President’s Budget...2013 to 00-00-2013 4. TITLE AND SUBTITLE Joint Direct Attack Munition (JDAM) 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6

  6. Global Mapping of Cyber Attacks

    DTIC Science & Technology

    2014-01-01

    use Symantec’s World Intelligence Network Environment ( WINE ) Intrusion Prevention System 1. REPORT DATE (DD-MM-YYYY) 4. TITLE AND SUBTITLE 13...Symantec’s World Intelligence Network Environment ( WINE ) Intrusion Prevention System (IPS) telemetry data which contain attack reports from more than 10...government. The authors would like to thank Symantec for granting us access to the WINE IPS telemetry data. The cyber-attack data used in the paper is

  7. Duloxetine-related panic attacks.

    PubMed

    Sabljić, Vladimir; Rakun, Radmir; Ružić, Klementina; Grahovac, Tanja

    2011-03-01

    Side-effects arising on the grounds of antidepressant administration pose as a substantial obstacle hindering successful depressive disorder treatment. Side-effects, especially those severe or those manifested through dramatic clinical presentations such as panic attacks, make the treatment far more difficult and shake patients' trust in both the treatment and the treating physician. This case report deals with a patient experiencing a moderately severe depressive episode, who responded to duloxetine treatment administered in the initial dose of 30 mg per day with as many as three panic attacks in two days. Upon duloxetine withdrawal, these panic attacks ceased as well. The patient continued tianeptine and alprazolam treatment during which no significant side-effects had been seen, so that she gradually recovered. Some of the available literature sources have suggested the possibility of duloxetine administration to the end of generalised anxiety disorder and panic attack treatment. However, they are outnumbered by the contributions reporting about duloxetine-related anxiety, aggressiveness and panic attacks. In line with the foregoing, further monitoring of each and every duloxetine-administered patient group needs to be pursued so as to be able to evaluate treatment benefits and weigh them against risks of anxiety or panic attack onset.

  8. Additive attacks on speaker recognition

    NASA Astrophysics Data System (ADS)

    Farrokh Baroughi, Alireza; Craver, Scott

    2014-02-01

    Speaker recognition is used to identify a speaker's voice from among a group of known speakers. A common method of speaker recognition is a classification based on cepstral coefficients of the speaker's voice, using a Gaussian mixture model (GMM) to model each speaker. In this paper we try to fool a speaker recognition system using additive noise such that an intruder is recognized as a target user. Our attack uses a mixture selected from a target user's GMM model, inverting the cepstral transformation to produce noise samples. In our 5 speaker data base, we achieve an attack success rate of 50% with a noise signal at 10dB SNR, and 95% by increasing noise power to 0dB SNR. The importance of this attack is its simplicity and flexibility: it can be employed in real time with no processing of an attacker's voice, and little computation is needed at the moment of detection, allowing the attack to be performed by a small portable device. For any target user, knowing that user's model or voice sample is sufficient to compute the attack signal, and it is enough that the intruder plays it while he/she is uttering to be classiffed as the victim.

  9. Turning the Tables: Using Wireless Communication Against an Attacker

    NASA Astrophysics Data System (ADS)

    Martinovic, Ivan; Schmitt, Jens B.

    In this paper, we propose a system leveraging the peculiarities of the wireless medium, such as the broadcast nature of wireless communication and the unpredictability of indoor signal propagation to achieve effective protection against attacks based on the injection of fake data in wireless sensor networks (WSNs). Using a real-world WSN deployment and a realistic implementation of an attacker, we analyze this protection scheme and demonstrate that neither position change, transmission power manipulation, nor complete knowledge of wireless parameters can help an attacker to successfully attack the network. As a result, this work demonstrates how the chaotic nature of radio communication, which is often considered a disadvantage in regard to security objectives, can be exploited to enhance protection and support implementation of lightweight security mechanisms.

  10. Analytical Characterization of Internet Security Attacks

    ERIC Educational Resources Information Center

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  11. Analytical Characterization of Internet Security Attacks

    ERIC Educational Resources Information Center

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  12. How Is a Heart Attack Diagnosed?

    MedlinePlus

    ... explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, visit www.hearttruth.gov or the Health Topics Heart Attack and Heart Disease in Women articles. What is a heart attack? 05/22/ ...

  13. How Is a Heart Attack Treated?

    MedlinePlus

    ... explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, visit www.hearttruth.gov or the Health Topics Heart Attack and Heart Disease in Women articles. What is a heart attack? 05/22/ ...

  14. Eyespots divert attacks by fish

    PubMed Central

    Kjernsmo, Karin; Merilaita, Sami

    2013-01-01

    Eyespots (colour patterns consisting of concentric rings) are found in a wide range of animal taxa and are often assumed to have an anti-predator function. Previous experiments have found strong evidence for an intimidating effect of eyespots against passerine birds. Some eyespots have been suggested to increase prey survival by diverting attacks towards less vital body parts or a direction that would facilitate escape. While eyespots in aquatic environments are widespread, their function is extremely understudied. Therefore, we investigated the protective function of eyespots against attacking fish. We used artificial prey and predator-naive three-spined sticklebacks (Gasterosteus aculeatus) as predators to test both the diversion (deflection) and the intimidation hypothesis. Interestingly, our results showed that eyespots smaller than the fish’ own eye very effectively draw the attacks of the fish towards them. Furthermore, our experiment also showed that this was not due to the conspicuousness of the eyespot, because attack latency did not differ between prey items with and without eyespots. We found little support for an intimidating effect by larger eyespots. Even though also other markings might misdirect attacks, we can conclude that the misdirecting function may have played an important role in the evolution of eyespots in aquatic environments. PMID:23864602

  15. Eyespots divert attacks by fish.

    PubMed

    Kjernsmo, Karin; Merilaita, Sami

    2013-09-07

    Eyespots (colour patterns consisting of concentric rings) are found in a wide range of animal taxa and are often assumed to have an anti-predator function. Previous experiments have found strong evidence for an intimidating effect of eyespots against passerine birds. Some eyespots have been suggested to increase prey survival by diverting attacks towards less vital body parts or a direction that would facilitate escape. While eyespots in aquatic environments are widespread, their function is extremely understudied. Therefore, we investigated the protective function of eyespots against attacking fish. We used artificial prey and predator-naive three-spined sticklebacks (Gasterosteus aculeatus) as predators to test both the diversion (deflection) and the intimidation hypothesis. Interestingly, our results showed that eyespots smaller than the fish' own eye very effectively draw the attacks of the fish towards them. Furthermore, our experiment also showed that this was not due to the conspicuousness of the eyespot, because attack latency did not differ between prey items with and without eyespots. We found little support for an intimidating effect by larger eyespots. Even though also other markings might misdirect attacks, we can conclude that the misdirecting function may have played an important role in the evolution of eyespots in aquatic environments.

  16. Panic attacks in generalized anxiety disorder.

    PubMed

    Van Ameringen, Michael; Simpson, William; Patterson, Beth; Mancini, Catherine

    2013-01-01

    Panic attacks have been reported by patients with generalized anxiety disorder (GAD) in response to catastrophic worry. This has not been characterized in the literature. We examined the prevalence of GAD panic attacks in an anxiety disorders clinic sample. Charts of 254 patients with DSM-IV GAD were retrospectively evaluated. The presence and type of panic attacks were examined as well as correlates including comorbidity, baseline symptom severity, demographic variables, and family history. Twenty-one percent had GAD panic attacks, 21.7% had situationally predisposed attacks, 15.6% had situationally bound attacks, and 39.4% had unexpected panic attacks. The individuals who had GAD panic attacks had higher scores on the Anxiety Sensitivity Index compared with those who also had other types of panic attacks. One in five patients with GAD reported GAD panic attacks; however, these individuals did not differ significantly on the correlates that were evaluated. These findings require replication and further evaluation.

  17. Evaluation of Word Attack Skills.

    ERIC Educational Resources Information Center

    Follettie, Joseph F.

    A framework for more apt and sensitive evaluation of generalized word attack skill--the heart of oral reading skill--is presented. The paper envisions the design and development of oral reading instruction as bounded by a fully-specified evaluation scheme. (Author)

  18. Mitigating Higher Ed Cyber Attacks

    ERIC Educational Resources Information Center

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  19. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    PubMed

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  20. Attack Vulnerability of Network Controllability

    PubMed Central

    2016-01-01

    Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison. It is found that the node-based strategies are often more harmful to the network controllability than the edge-based ones, and so are the recalculated strategies than their counterparts. The Barabási-Albert scale-free model, which has a highly biased structure, proves to be the most vulnerable of the tested model networks. In contrast, the Erdős-Rényi random model, which lacks structural bias, exhibits much better robustness to both node-based and edge-based attacks. We also survey the control robustness of 25 real-world networks, and the numerical results show that most real networks are control robust to random node failures, which has not been observed in the model networks. And the recalculated betweenness-based strategy is the most efficient way to harm the controllability of real-world networks. Besides, we find that the edge degree is not a good quantity to measure the importance of an edge in terms of network controllability. PMID:27588941

  1. Crony Attack: Strategic Attack’s Silver Bullet

    DTIC Science & Technology

    2006-11-01

    5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Air University Press,Maxwell AFB,AL...or implied within are solely those of the author and do not necessarily represent the views of Air University, the United States Air Force, the...methodology, and investigates a prom- inent case where the United States apparently used this strategy. This thesis treats crony attack primarily as a form

  2. The effect of asymmetric attack on trim angle of attack

    NASA Technical Reports Server (NTRS)

    Kruse, R. L.

    1983-01-01

    Ballistic range tests were conducted to determine the effect of an asymmetrically ablated heat shield on the trim angle of attack of an entry vehicle. The tests, which were in support of Project Galileo, were conducted in atmospheric air at Mach numbers from 0.7 to 2.0. For the results for the configuration that was tested, the deduced trim angle varied between 13 deg and 21 deg.

  3. Timing Is Everything with Heart Attacks

    MedlinePlus

    ... news/fullstory_167205.html Timing Is Everything With Heart Attacks These crises tend to be more frequent on ... new research that suggests these periods are when heart attacks are most likely to occur. On the flip ...

  4. Being active after a heart attack (image)

    MedlinePlus

    ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ...

  5. Can Vitamins Help Prevent a Heart Attack?

    MedlinePlus

    ... taking vitamins help prevent heart disease or a heart attack? Answers from Rekha Mankad, M.D. It's not yet clear ... risk of developing heart disease or having a heart attack. But, what is known is that no vitamin ...

  6. Silent Heart Attack: What Are the Risks?

    MedlinePlus

    ... those for a heart attack with symptoms. The risk factors include: Smoking or chewing tobacco Family history of heart disease Age High cholesterol High blood pressure Diabetes Lack of exercise Being overweight Having a silent heart attack puts ...

  7. Beware Heart Attack Risk from Shoveling Snow

    MedlinePlus

    ... https://medlineplus.gov/news/fullstory_163566.html Beware Heart Attack Risk From Shoveling Snow Canadian study finds cases ... why men are more likely to suffer a heart attack after a heavy snowfall, researchers report. In a ...

  8. Terror attacks influence driving behavior in Israel

    PubMed Central

    Stecklov, Guy; Goldstein, Joshua R.

    2004-01-01

    Terror attacks in Israel produce a temporary lull in light accidents followed by a 35% spike in fatal accidents on Israeli roads 3 days after the attack. Our results are based on time-series analysis of Israeli traffic flows, accidents, and terror attacks from January 2001 through June 2002. Whereas prior studies have focused on subjective reports of posttraumatic stress, our study shows a population-level behavioral response to violent terror attacks. PMID:15448203

  9. Terror attacks influence driving behavior in Israel.

    PubMed

    Stecklov, Guy; Goldstein, Joshua R

    2004-10-05

    Terror attacks in Israel produce a temporary lull in light accidents followed by a 35% spike in fatal accidents on Israeli roads 3 days after the attack. Our results are based on time-series analysis of Israeli traffic flows, accidents, and terror attacks from January 2001 through June 2002. Whereas prior studies have focused on subjective reports of posttraumatic stress, our study shows a population-level behavioral response to violent terror attacks.

  10. High Angle of Attack Aerodynamics

    DTIC Science & Technology

    1979-01-01

    describe the behaviour of the air. The Symposium made it clear that the present state of knowledge in the area of high angle-of-attack aerodynamics...TESTING EXPERIENCE by C.W. Smith and C.A.Anderson S FOREBODY-WING VORTEX INTERACTIONS AND THEIR INFLUENCE ON DEPARTURE AND SPIN RESISTANCE by A.MSkow...Figure 6) caused by asymmetric flow conditions. ., s already mentioned, asymmetric flow occurs not only when an air- craft flies at non-zero sideslip

  11. Biomechanics of knife stab attacks.

    PubMed

    Chadwick, E K; Nicol, A C; Lane, J V; Gray, T G

    1999-10-25

    Equipment, materials and methods for the measurement of the biomechanical parameters governing knife stab attacks have been developed and data have been presented that are relevant to the improvement of standards for the testing of stab-resistant materials. A six-camera Vicon motion analysis system was used to measure velocity, and derive energy and momentum during the approach phase of the attack and a specially developed force-measuring knife was used to measure three-dimensional forces and torque during the impact phase. The body segments associated with the knife were modelled as a series of rigid segments: trunk, upper arm, forearm and hand. The velocities of these segments, together with knowledge of the mass distribution from biomechanical tables, allowed the calculation of the individual segment energy and momentum values. The instrumented knife measured four components of load: axial force (along the length of the blade), cutting force (parallel to the breadth of the blade), lateral force (across the blade) and torque (twisting action) using foil strain gauges. Twenty volunteers were asked to stab a target with near maximal effort. Three styles of stab were used: a short thrust forward, a horizontal style sweep around the body and an overhand stab. These styles were chosen based on reported incidents, providing more realistic data than had previously existed. The 95th percentile values for axial force and energy were 1885 N and 69 J, respectively. The ability of current test methods to reproduce the mechanical parameters measured in human stab attacks has been assessed. It was found that current test methods could reproduce the range of energy and force values measured in the human stab attacks, although the simulation was not accurate in some respects. Non-axial force and torque values were also found to be significant in the human tests, but these are not reproduced in the standard mechanical tests.

  12. The Reverse Statistical Disclosure Attack

    NASA Astrophysics Data System (ADS)

    Mallesh, Nayantara; Wright, Matthew

    Statistical disclosure is a well-studied technique that an attacker can use to uncover relations between users in mix-based anonymity systems. Prior work has focused on finding the receivers to whom a given targeted user sends. In this paper, we investigate the effectiveness of statistical disclosure in finding all of a users' contacts, including those from whom she receives messages. To this end, we propose a new attack called the Reverse Statistical Disclosure Attack (RSDA). RSDA uses observations of all users sending patterns to estimate both the targeted user's sending pattern and her receiving pattern. The estimated patterns are combined to find a set of the targeted user's most likely contacts. We study the performance of RSDA in simulation using different mix network configurations and also study the effectiveness of cover traffic as a countermeasure. Our results show that that RSDA outperforms the traditional SDA in finding the user's contacts, particularly as the amounts of user traffic and cover traffic rise.

  13. Flashbulb memories of Paris attacks

    PubMed Central

    El Haj, Mohamad; Gandolphe, Marie-Charlotte; Wawrziczny, Emilie; Antoine, Pascal

    2016-01-01

    Abstract Rationale: Flashbulb memories are detailed and vivid memories of attributes of the reception context of surprising and emotionally arousing public events. Patient concerns and diagnosis: This paper offers a fine-grained view of flashbulb memories in a patient with mild Alzheimer's disease (AD). Interventions: The patient underwent a directed interview about the 13 November 2015 attacks in Paris. Outcomes: Unlike her memory about the date and month of the attacks, the patient provided accurate information about the year, time and places they occurred. The patient also provided accurate information about how she first became aware of the attacks, where she was, with whom, what she was doing, and what time it was when she learned about them. As for the affective characteristics of these memories, she tended to have high ratings of vividness and rehearsal. Negative emotional states and great surprise and novelty were also reported. Lessons: By assessing the impact of flashbulb memories in this patient with AD, this paper offers a unique view into how such memories may trigger a considerable recall of context as well much subjective reliving. PMID:27861395

  14. Review of Existing Wormhole Attack Discovery Techniques

    DTIC Science & Technology

    2006-08-01

    Review of Existing Wormhole Attack Discovery Techniques Maria Alexandrovna Gorlatova The scientific or...DATES COVERED - 4. TITLE AND SUBTITLE Review of Existing Wormhole Attack Discovery Techniques 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c...ABSTRACT unclassified c. THIS PAGE unclassified Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18 Review of Existing Wormhole Attack

  15. On Mitigating Distributed Denial of Service Attacks

    ERIC Educational Resources Information Center

    Gao, Zhiqiang

    2006-01-01

    Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…

  16. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    ERIC Educational Resources Information Center

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  17. On Mitigating Distributed Denial of Service Attacks

    ERIC Educational Resources Information Center

    Gao, Zhiqiang

    2006-01-01

    Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…

  18. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    ERIC Educational Resources Information Center

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  19. Current characteristics associated with hereditary angioedema attacks and treatment: the home infusion based patient experience.

    PubMed

    Tachdjian, Raffi; Banerji, Aleena; Guyer, Autumn; Morphew, Tricia

    2015-01-01

    This article presents a current perspective on the characteristics of hereditary angioedema (HAE) attacks and treatment as captured by a home infusion service. Retrospective data on 158 HAE patients who were enrolled in this acute treatment program were analyzed for factors surrounding an attack. The majority of patients had a high level of disease severity at baseline (88%), with a higher than expected likelihood of having a positive family history (87.8%). The most likely times for patients to call for home treatment were just before and during working hours (6:00 A.M.-5:00 P.M.). Eighty-three percent had more than one alternate mode of medication. Factors associated with a severe attack included an overall severe rating of HAE attacks in the previous year, an abdominal attack alone or a combination of peripheral and abdominal attacks versus a peripheral attack alone, and the use of two doses rather than one for treatment of the current attack. Average time to relief onset was 43.5 minutes. One dose of ecallantide was sufficient to treat the majority of attacks, and a second dose was needed in 23.6% of patients experiencing a severe attack. However, patients who reported both a severe attack rating during the previous year and experiencing only a peripheral current attack were more likely to experience a severe current attack. Acute treatment paradigms for HAE remain diverse. Understanding factors driving these decisions could help alleviate the overall burden of this disease and help overcome some of the challenges faced by the patients and their caretakers and improve their quality of life. Enhanced capture and analysis of prodromal factors in future studies should help us further alleviate the burden of this disease.

  20. Ballistic Beloniformes attacking through Snell's Window.

    PubMed

    Day, R D; Mueller, F; Carseldine, L; Meyers-Cherry, N; Tibbetts, I R

    2016-02-01

    Needlefishes (Beloniformes) were observed employing a range of stalking and attacking behaviours to attack schools of bait fishes ranging from the use of tactics common to predatory fishes to a novel behaviour: the use of leaping, aerial attacks. These aerial attacks are suggested to serve two purposes: to extend the attack range of the needlefishes and to reduce their prey's potential for evasion. Furthermore, a third purpose is hypothesized that the needlefishes are taking advantage of Snell's Window, an optical effect which may mask their approach to their prey. © 2015 The Fisheries Society of the British Isles.

  1. Lightweight Distance Bounding Protocol against Relay Attacks

    NASA Astrophysics Data System (ADS)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  2. Orthostatic panic attacks among Vietnamese refugees.

    PubMed

    Hinton, Devon E; Hinton, Ladson; Tran, Minh; Nguyen, Men; Nguyen, Lim; Hsia, Curtis; Pollack, Mark H

    2007-12-01

    Viewed historically and cross-culturally, orthostatic-induced dizziness, i.e., dizziness caused by standing up from a sitting or a lying position, forms a key aspect of many syndromes: irritable heart (American Civil War), effort syndrome (World War I and World War II), chronic fatigue syndrome (contemporary USA), Gulf War syndrome (contemporary USA), and orthostatic dysregulation (contemporary Japan). Among Vietnamese refugees attending a psychiatric clinic, this study documents a high rate of orthostatic panic (OP), as well as certain processes seemingly generating these panic attacks, viz., flashbacks and culturally specific catastrophic cognitions. Case examples are used to demonstrate OP's phenomenology and relevance to clinical care. To illustrate the mechanisms producing OP, we adduce the multiplex model of panic generation. Culturally appropriate care of Vietnamese refugees should include assessment and treatment of OP.

  3. Association between terror attacks and suicide attempts.

    PubMed

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-08-01

    Based on Durkheim's 'Control theory,' we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the variables, with the exception of one 11-month segment within it (December 2000-October 2001) that did show a statistically significant positive correlation, and in opposition to Durkeim's hypothesis. It is suggested that suicide attempts as a phenomena should be seen as a product of a multivariate model, in which the social context plays a role as well.

  4. Psychological interventions following terrorist attacks.

    PubMed

    Mansdorf, Irwin J

    2008-01-01

    Psychological reactions to terror attacks have been documented as ranging from no symptoms to transient behavioural symptoms to more serious posttraumatic stress. A review of representative studies is presented, with a critical analysis of the salient points of the various psychological intervention strategies for terrorist attacks. Common aspects of both most intervention approaches include multifaceted models that foster social support and include a preparatory phase, a phase of 'psychological first aid' and a follow-up phase of referral for more severe cases. The notion of intervention for all who may show some symptoms is not universally accepted. Where treatment or intervention is used, the debriefing aspect of CISM (Critical Incident Stress Management) remains highly disputed, with the focus on intrusively revisiting the trauma appearing to have questionable value at best. Some data questions whether formal treatment or intervention is necessary or even desirable. For many who choose not to seek out any help following a trauma, clinical data shows no negative results. Moreover, the preponderance of data shows that conventional 'debriefing' is not recommended. If the debriefing mechanism is refined so that intrusive emotional rehashing of the traumatic event is eliminated, the resultant interventions resemble resilience based approaches. Further defining when intervention is called for and refining the mechanisms of intervention in multi-stage intervention.

  5. Migraine attacks the Basal Ganglia

    PubMed Central

    2011-01-01

    Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month). The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human) brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF) to a matched (gender, age, age of onset and type of medication) group of patients whose migraine episodes progressed (HF). Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine. PMID:21936901

  6. Cervical spine injury: tiger attack.

    PubMed

    Anderson, Meredith; Utter, Philip; Szatkowski, Jan; Patrick, Todd; Duncan, William; Turner, Norman; Dekutoski, Mark

    2008-12-01

    Reports of tiger attacks in the United States are rare. This article presents a case of a young woman who was violently attacked by a Siberian tiger and sustained penetrating trauma to the neck, cervical spine, and bilateral lower extremities. This article presents both diagnostic and therapeutic management of patients who may present with similar injuries. Animal bites from large animals are prone to infection in 10% to 20% of cases. Most infections are polymicrobial, with Pasteurella multicida being the most common isolate. Animal bites also mandate consideration of tetanus and rabies prophylaxis. The decision to administer postexposure rabies prophylaxis is dependent on the type of animal involved, whether the exposure was provoked, the local epidemiology of rabies, and the availability of the animal for observation or testing. Assessment of patients with cervical spine injury requires knowledge of possible associated injuries. Evaluation involves assessment of plain radiographs and computed tomography for evaluation of the cervical spine for bony injury. Furthermore, computed angiography is advantageous to noninvasively evaluate carotid or vertebral artery injury at the same setting in patients with deep cervical puncture wounds. Surgical treatment of unstable cervical spine fractures with lateral mass screw and rod fixation has been reported in the literature to have superior biomechanical properties compared to anterior and posterior instrumentation and fusion. In recent clinical studies, the use of lateral mass screws for traumatic injury of the cervical spine has been associated with excellent maintenance of alignment and minimal complications.

  7. Shoulder injuries from attacking motion

    NASA Astrophysics Data System (ADS)

    Yanagi, Shigeru; Nishimura, Tetsu; Itoh, Masaru; Wada, Yuhei; Watanabe, Naoki

    1997-03-01

    Sports injuries have bothered professional players. Although many medical doctors try to treat injured players, to prevent sports injuries is more important. Hence, it is required to clear a kinematic mechanism of the sport injuries. A shoulder of volleyball attacker or baseball pitcher is often inured by playing motion. The injuries are mainly caused at the end of long head tendon, which is located in the upper side of scapula. Generally, a muscle and tendon have enough strength against tensile force, however, it seems that they are sometimes defeated by the lateral force. It is imagined that the effect of the lateral force has a possibility of injuring the tendon. If we find the influence of the lateral force on the injured portion, the mechanism of injuries must be cleared. In our research, volleyball attacking motion is taken by high speed video cameras. We analyze the motion as links system and obtain an acceleration of an arm and a shoulder from video image data. The generated force at a shoulder joint is calculated and resolved into the lateral and longitudinal forces. Our final goal is to discuss a possibility that the lateral force causes the injuries.

  8. VoIP attacks detection engine based on neural network

    NASA Astrophysics Data System (ADS)

    Safarik, Jakub; Slachta, Jiri

    2015-05-01

    The security is crucial for any system nowadays, especially communications. One of the most successful protocols in the field of communication over IP networks is Session Initiation Protocol. It is an open-source project used by different kinds of applications, both open-source and proprietary. High penetration and text-based principle made SIP number one target in IP telephony infrastructure, so security of SIP server is essential. To keep up with hackers and to detect potential malicious attacks, security administrator needs to monitor and evaluate SIP traffic in the network. But monitoring and following evaluation could easily overwhelm the security administrator in networks, typically in networks with a number of SIP servers, users and logically or geographically separated networks. The proposed solution lies in automatic attack detection systems. The article covers detection of VoIP attacks through a distributed network of nodes. Then the gathered data analyze aggregation server with artificial neural network. Artificial neural network means multilayer perceptron network trained with a set of collected attacks. Attack data could also be preprocessed and verified with a self-organizing map. The source data is detected by distributed network of detection nodes. Each node contains a honeypot application and traffic monitoring mechanism. Aggregation of data from each node creates an input for neural networks. The automatic classification on a centralized server with low false positive detection reduce the cost of attack detection resources. The detection system uses modular design for easy deployment in final infrastructure. The centralized server collects and process detected traffic. It also maintains all detection nodes.

  9. Defending networks against denial-of-service attacks

    NASA Astrophysics Data System (ADS)

    Gelenbe, Erol; Gellman, Michael; Loukas, George

    2004-11-01

    Denial of service attacks, viruses and worms are common tools for malicious adversarial behavior in networks. Experience shows that over the last few years several of these techniques have probably been used by governments to impair the Internet communications of various entities, and we can expect that these and other information warfare tools will be used increasingly as part of hostile behavior either independently, or in conjunction with other forms of attack in conventional or asymmetric warfare, as well as in other forms of malicious behavior. In this paper we concentrate on Distributed Denial of Service Attacks (DDoS) where one or more attackers generate flooding traffic and direct it from multiple sources towards a set of selected nodes or IP addresses in the Internet. We first briefly survey the literature on the subject, and discuss some examples of DDoS incidents. We then present a technique that can be used for DDoS protection based on creating islands of protection around a critical information infrastructure. This technique, that we call the CPN-DoS-DT (Cognitive Packet Networks DoS Defence Technique), creates a self-monitoring sub-network surrounding each critical infrastructure node. CPN-DoS-DT is triggered by a DDoS detection scheme, and generates control traffic from the objects of the DDoS attack to the islands of protection where DDOS packet flows are destroyed before they reach the critical infrastructure. We use mathematical modelling, simulation and experiments on our test-bed to show the positive and negative outcomes that may result from both the attack, and the CPN-DoS-DT protection mechanism, due to imperfect detection and false alarms.

  10. Percolation of localized attack on complex networks

    NASA Astrophysics Data System (ADS)

    Shao, Shuai; Huang, Xuqing; Stanley, H. Eugene; Havlin, Shlomo

    2015-02-01

    The robustness of complex networks against node failure and malicious attack has been of interest for decades, while most of the research has focused on random attack or hub-targeted attack. In many real-world scenarios, however, attacks are neither random nor hub-targeted, but localized, where a group of neighboring nodes in a network are attacked and fail. In this paper we develop a percolation framework to analytically and numerically study the robustness of complex networks against such localized attack. In particular, we investigate this robustness in Erdős-Rényi networks, random-regular networks, and scale-free networks. Our results provide insight into how to better protect networks, enhance cybersecurity, and facilitate the design of more robust infrastructures.

  11. Are global terrorist attacks time-correlated?

    NASA Astrophysics Data System (ADS)

    Telesca, Luciano; Lovallo, Michele

    2006-04-01

    Is there any kind of “memory” in the sequence of terror attacks worldwide? Are the terrorist attacks non-randomly time distributed? Our analysis suggests that they are correlated, which means that a terror event is not independent from the time elapsed since the previous event. But, if we consider terror attacks with a large severity index (number of fatalities or injured), the phenomenon is unpredictable, since it approaches a Poisson process (random, independent and uncorrelated).

  12. A Study of Gaps in Attack Analysis

    DTIC Science & Technology

    2016-10-12

    This problem also hinders classification, taxonomy generation, malware labeling, and information sharing. In fact, it has been shown that the majority...be developed to conceal predictions and to confuse the adversary. Gap: Lack well-accepted attack taxonomies Likelihood: L Impact: L Cost: L 21...Description Improving the analysis of attacks requires well-developed taxonomies that capture the steps, requirements, and dependencies of attack components

  13. Security under Uncertainty: Adaptive Attackers Are More Challenging to Human Defenders than Random Attackers

    PubMed Central

    Moisan, Frédéric; Gonzalez, Cleotilde

    2017-01-01

    Game Theory is a common approach used to understand attacker and defender motives, strategies, and allocation of limited security resources. For example, many defense algorithms are based on game-theoretic solutions that conclude that randomization of defense actions assures unpredictability, creating difficulties for a human attacker. However, many game-theoretic solutions often rely on idealized assumptions of decision making that underplay the role of human cognition and information uncertainty. The consequence is that we know little about how effective these algorithms are against human players. Using a simplified security game, we study the type of attack strategy and the uncertainty about an attacker's strategy in a laboratory experiment where participants play the role of defenders against a simulated attacker. Our goal is to compare a human defender's behavior in three levels of uncertainty (Information Level: Certain, Risky, Uncertain) and three types of attacker's strategy (Attacker's strategy: Minimax, Random, Adaptive) in a between-subjects experimental design. Best defense performance is achieved when defenders play against a minimax and a random attack strategy compared to an adaptive strategy. Furthermore, when payoffs are certain, defenders are as efficient against random attack strategy as they are against an adaptive strategy, but when payoffs are uncertain, defenders have most difficulties defending against an adaptive attacker compared to a random attacker. We conclude that given conditions of uncertainty in many security problems, defense algorithms would be more efficient if they are adaptive to the attacker actions, taking advantage of the attacker's human inefficiencies. PMID:28690557

  14. Do Unexpected Panic Attacks Occur Spontaneously?

    PubMed Central

    Meuret, Alicia E.; Rosenfield, David; Wilhelm, Frank H.; Zhou, Enlu; Conrad, Ansgar; Ritz, Thomas; Roth, Walton T.

    2012-01-01

    Background Spontaneous or unexpected panic attacks, per definition, occur out-of-the blue, in absence of cues or triggers. Accordingly, physiological arousal or instability should occur at the onset of or during the attack, but not preceding it. To test this hypothesisweexaminedif points of significant autonomic changes preceded the onset of spontaneous panic attacks. Methods Forty-three panic disorder patients underwent repeated 24-hour ambulatory monitoring. Thirteen naturally panic attacks were recorded during 1,960 hours of monitoring. Minute-by-minute epochs beginning 60 minutes before, and continuing to 10 minutes after, the onset of individual attacks were examined for respiration, heart rate, and skin conductance level. Measures were controlled for physical activity and vocalization, and compared to time matched control periods within the same person. Results Significant patterns of instability across a numberof autonomic and respiratory variables were detected as early as 47 minutes before panic onset. The final minutes prior to onset were dominated by respiratory changes, with significant decreases in tidal volume followed by abrupt PCO2 increases. Panic attack onset was characterized by heart rate and tidal volume increases and a drop in PCO2. Symptom report was consistent with these changes. Skin conductance levels were generally elevated in the hour before and duringthe attacks. Changes in the matched control periods were largely absent. Conclusions Significant autonomic irregularities preceded the onset of attacks that were reported as abrupt and unexpected. The findings invite reconsideration of the current diagnostic distinction betweenuncuedand cued panic attacks. PMID:21783179

  15. Colon motility during a panic attack.

    PubMed

    Hyman, Paul E; Cocjin, Jose

    2005-01-01

    To document the temporal relationship between a panic attack and high amplitude propagating contractions. Colon manometry was used to discriminate between functional defecation problems and colon neuromuscular disease. By chance, the patent developed a panic attack during the test session. Coincident with the panic attack, there was a continuous series of high amplitude propagating contractions. There were 15 high amplitude propagating contractions over 45 minutes, initially at a rate of 4 per 10 minutes, gradually slowing to 1.5 per 10 minutes. These data may explain the cause for gastrointestinal distress and diarrhea in some patients with panic attacks.

  16. Detecting Denial of Service Attacks in Tor

    NASA Astrophysics Data System (ADS)

    Danner, Norman; Krizanc, Danny; Liberatore, Marc

    Tor is currently one of the more popular systems for anonymizing near real-time communications on the Internet. Recently, Borisov et al. proposed a denial of service based attack on Tor (and related systems) that significantly increases the probability of compromising the anonymity provided. In this paper, we propose an algorithm for detecting such attacks and examine the effectiveness of the obvious approach to evading such detection. We implement a simplified version of the detection algorithm and study whether the attack may be in progress on the current Tor network. Our preliminary measurements indicate that the attack was probably not implemented during the period we observed the network.

  17. Cougar attacks on humans: a case report.

    PubMed

    McKee, Denise

    2003-01-01

    Cougar attacks on humans are increasing. Presented is a case report of a nonfatal 2-year-old male cougar attack on an 8-year-old girl in British Columbia. Discussions of wound management, rabies postexposure prophylaxis (RPEP), and the possible psychologic ramifications of such an attack are presented. Also reviewed are recommendations on actions that may be helpful in preventing an attack following a sudden encounter with a cougar. Humans must learn to coexist with cougars, which present a small but real threat to people.

  18. Cement composition and sulfate attack

    SciTech Connect

    Shanahan, Natalya; Zayed, Abla . E-mail: zayed@eng.usf.edu

    2007-04-15

    Four cements were used to address the effect of tricalcium silicate content of cement on external sulfate attack in sodium sulfate solution. The selected cements had similar fineness and Bogue-calculated tricalcium aluminate content but variable tricalcium silicates. Durability was assessed using linear expansion and compressive strength. Phases associated with deterioration were examined using scanning electron microscopy and X-ray diffraction. Mineralogical phase content of the as-received cements was studied by X-ray diffraction using two methods: internal standard and Rietveld analysis. The results indicate that phase content of cements determined by X-ray mineralogical analysis correlates better with the mortar performance in sulfate environment than Bogue content. Additionally, it was found that in cements containing triclacium aluminate only in the cubic form, the observed deterioration is affected by tricalcium silicate content. Morphological similarities between hydration products of high tricalcium aluminate and high tricalcium silicate cements exposed to sodium sulfate environment were also observed.

  19. 'Crescendo' transient ischemic attacks: clinical and angiographic correlations.

    PubMed

    Rothrock, J F; Lyden, P D; Yee, J; Wiederholt, W C

    1988-02-01

    Forty-seven consecutive patients presenting acutely with repetitive symptoms indicative of anterior circulation ischemia ("crescendo" transient ischemic attacks) were evaluated to identify clinical features that might reliably predict the presence of significant stenosis, ulceration, or both in the presumably symptomatic internal carotid artery. Angiographic or intraoperative correlation was obtained in all patients, and 26 (55%) were found to have anatomically significant disease. Of 20 patients with signs or symptoms suggestive of cortical ischemia, amaurosis fugax, or both, 17 (85%) had "positive" angiograms; of 18 with numbness/weakness only, 9 (50%) had positive angiograms; of 9 whose symptoms suggested lacunar ischemia, none had positive angiograms.

  20. Cued panic attacks in body dysmorphic disorder.

    PubMed

    Phillips, Katharine A; Menard, William; Bjornsson, Andri S

    2013-05-01

    Body dysmorphic disorder (BDD) is a common and often severe disorder. Clinical observations suggest that panic attacks triggered by BDD symptoms may be common. However, to our knowledge, no study has examined such panic attacks in BDD. We investigated the prevalence, clinical features, and correlates of BDD- triggered panic attacks in individuals with this disorder. Panic attacks and other variables were assessed using reliable and valid measures in 76 individuals with lifetime DSM-IV BDD. 28.9% (95% CI, 18.5%-39.4%) of participants reported lifetime panic attacks triggered by BDD symptoms. The most common triggers of such attacks were feeling that others were looking at or scrutinizing the perceived appearance defects (61.9%), looking in the mirror at perceived defects (38.1%), and being in bright light where perceived defects would be more visible (23.8%). The most common panic attack symptoms were palpitations (86.4%), sweating (66.7%), shortness of breath (63.6%), trembling or shaking (63.6%), and fear of losing control or going crazy (63.6%). Compared to participants without such panic attacks, those with BDD-triggered panic attacks had more severe lifetime BDD, social anxiety, and depressive symptoms, as well as poorer functioning and quality of life on a number of measures. They were also less likely to be employed and more likely to have been psychiatrically hospitalized and to have had suicidal ideation due to BDD. Panic attacks triggered by BDD-related situations appear com- mon in individuals with this disorder. BDD-triggered panic attacks were associated with greater symptom severity and morbidity.

  1. Cued Panic Attacks in Body Dysmorphic Disorder

    PubMed Central

    Phillips, Katharine A.; Menard, William; Bjornsson, Andri S.

    2013-01-01

    Background Body dysmorphic disorder (BDD) is a common and often severe disorder. Clinical observations suggest that panic attacks triggered by BDD symptoms may be common. However, to our knowledge, no study has examined such panic attacks in BDD. We investigated the prevalence, clinical features, and correlates of BDD-triggered panic attacks in individuals with this disorder. Methods Panic attacks and other variables were assessed using reliable and valid measures in 76 individuals with lifetime DSM-IV BDD. Results 28.9% (95% CI, 18.5%–39.4%) of participants reported lifetime panic attacks triggered by BDD symptoms. The most common triggers of such attacks were feeling that others were looking at or scrutinizing the perceived appearance defects (61.9%), looking in the mirror at perceived defects (38.1%), and being in bright light where perceived defects would be more visible (23.8%). The most common panic attack symptoms were palpitations (86.4%), sweating (66.7%), shortness of breath (63.6%), trembling or shaking (63.6%), and fear of losing control or going crazy (63.6%). Compared to participants without such panic attacks, those with BDD-triggered panic attacks had more severe lifetime BDD, social anxiety, and depressive symptoms, as well as poorer functioning and quality of life on a number of measures. They were also less likely to be employed and more likely to have been psychiatrically hospitalized and to have had suicidal ideation due to BDD. Conclusions Panic attacks triggered by BDD-related situations appear common in individuals with this disorder. BDD-triggered panic attacks were associated with greater symptom severity and morbidity. PMID:23653076

  2. The cost of attack in competing networks

    PubMed Central

    Podobnik, B.

    2015-01-01

    Real-world attacks can be interpreted as the result of competitive interactions between networks, ranging from predator–prey networks to networks of countries under economic sanctions. Although the purpose of an attack is to damage a target network, it also curtails the ability of the attacker, which must choose the duration and magnitude of an attack to avoid negative impacts on its own functioning. Nevertheless, despite the large number of studies on interconnected networks, the consequences of initiating an attack have never been studied. Here, we address this issue by introducing a model of network competition where a resilient network is willing to partially weaken its own resilience in order to more severely damage a less resilient competitor. The attacking network can take over the competitor's nodes after their long inactivity. However, owing to a feedback mechanism the takeovers weaken the resilience of the attacking network. We define a conservation law that relates the feedback mechanism to the resilience dynamics for two competing networks. Within this formalism, we determine the cost and optimal duration of an attack, allowing a network to evaluate the risk of initiating hostilities. PMID:26490628

  3. [Panic attacks simulate presence of somatic illnesses].

    PubMed

    Latas, Milan; Soldatović, Ivan; Stamenović, Marko; Starcević, Vladan

    2009-01-01

    Panic attacks are characterized with sudden attacks of anxiety with numerous somatic symptoms, such as palpitations, tachycardia, tachypnea, nausea, vertigo. The objective of this study was to analyze symptoms of panic attacks in patients with panic disorder, especially, to determine the specific relationship of somatic and neurological symptoms of panic attacks in boundaries of somatic systems. The study sample consisted of 97 patients with primary diagnosis of panic disorder, without any acute, severe and unstable somatic illness. The presence and frequency of symptoms of panic attacks were estimated by the Panic Disorder Questionnaire. The study results indicate that the most frequent symptoms of panic attacks were cardiological signs (heart pounding or racing) and trembling, followed by unsteady and fainting feeling symptoms, sweating, respiratory symptoms and gastroenterological symptoms. The results of correlation analyses indicate that symptoms of panic attacks classified into cardiovascular, gastro-enterological, respiratory and neurootological systems show statistically significant correlations. The results of analyses of symptoms of panic attacks point to their intercorrelation. This specific association of the symptoms, if they are examined on their own in the patients, could lead to false clinical manifestation of some somatic illness. Therefore, it is necessary to analyze adequately and make the proper differential diagnosis of patients with panic disorder.

  4. British used Congreve Rockets to Attack Napoleon

    NASA Technical Reports Server (NTRS)

    2004-01-01

    Sir William Congreve developed a rocket with a range of about 9,000 feet. The incendiary rocket used black powder, an iron case, and a 16-foot guide stick. In 1806, British used Congreve rockets to attack Napoleon's headquarters in France. In 1807, Congreve directed a rocket attack against Copenhagen.

  5. British used Congreve Rockets to Attack Napoleon

    NASA Technical Reports Server (NTRS)

    2004-01-01

    Sir William Congreve developed a rocket with a range of about 9,000 feet. The incendiary rocket used black powder, an iron case, and a 16-foot guide stick. In 1806, British used Congreve rockets to attack Napoleon's headquarters in France. In 1807, Congreve directed a rocket attack against Copenhagen.

  6. Preventive attack in the 1990s

    SciTech Connect

    Prebeck, S.R.

    1993-05-28

    The decline of the Soviet Union upset the world`s balance of power and opened the door to third world proliferation since the superpowers no longer have tight control over their client-states. This increase in proliferation raised the issue of how the United States (US) should respond to a third world nation that is acquiring nuclear weapons. Should the United States depend on preventive attacks to stop the proliferation of nuclear weapons. This is not a new issue. Proliferation and preventive war have both been issues since the end of World War II. The United States considered a preventive attack against the Soviet Union in the postwar years. The Soviet Union considered preventive attacks against the People`s Republic of China in 1969. Israel conducted a preventive attack in 1981 against the Osiraq nuclear reactor in Iraq. Preventive attacks are politically untenable and are not militarily possible. Without perfect political conditions, it is unacceptable for the only remaining superpower to attack a second-rate power. It is militarily impossible for the United States to guarantee the removal of all nuclear weapons in a single preventive attack. This study concludes that the United States should not depend on preventive attacks to stop proliferation of nuclear weapons.

  7. 47 CFR 76.1612 - Personal attack.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Personal attack. 76.1612 Section 76.1612 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE Notices § 76.1612 Personal attack. (a) When, during origination cablecasting of...

  8. The effect of nursing professional pay structures and pay levels on hospitals' heart attack outcomes.

    PubMed

    Brown, Mark P

    2006-01-01

    The effect of nursing professionals (i.e., nurse aid/orderly, licensed practical nurse, registered nurse) pay structures and pay levels on hospitals risk-adjusted heart attack outcomes was determined. Operationalizing hospitals' heart attack outcomes as their thirty-day risk-adjusted mortality rates, a positive curvilinear relation is hypothesized between pay dispersion and hospitals' heart attack outcomes, whereas a direct relation is hypothesized between pay level and hospitals' heart attack outcomes. Pay level is also hypothesized as a moderator of the relation between pay dispersion and hospitals' heart attack outcomes. Using a sample of 138 California hospitals, support is not found for either the curvilinear relation between hospitals' nursing professionals pay dispersion and hospitals' heart attack outcomes, or the direct relation between nursing professionals' pay level and hospitals' heart attack outcomes. Support is found for the moderation hypothesis in which nursing professionals' pay level moderates the relation between hospitals' nursing professionals pay dispersion and hospitals' heart attack outcomes. Implications for practice are discussed in light of the study's results.

  9. Proto-cooperation: group hunting sailfish improve hunting success by alternating attacks on grouping prey.

    PubMed

    Herbert-Read, James E; Romanczuk, Pawel; Krause, Stefan; Strömbom, Daniel; Couillaud, Pierre; Domenici, Paolo; Kurvers, Ralf H J M; Marras, Stefano; Steffensen, John F; Wilson, Alexander D M; Krause, Jens

    2016-11-16

    We present evidence of a novel form of group hunting. Individual sailfish (Istiophorus platypterus) alternate attacks with other group members on their schooling prey (Sardinella aurita). While only 24% of attacks result in prey capture, multiple prey are injured in 95% of attacks, resulting in an increase of injured fish in the school with the number of attacks. How quickly prey are captured is positively correlated with the level of injury of the school, suggesting that hunters can benefit from other conspecifics' attacks on the prey. To explore this, we built a mathematical model capturing the dynamics of the hunt. We show that group hunting provides major efficiency gains (prey caught per unit time) for individuals in groups of up to 70 members. We also demonstrate that a free riding strategy, where some individuals wait until the prey are sufficiently injured before attacking, is only beneficial if the cost of attacking is high, and only then when waiting times are short. Our findings provide evidence that cooperative benefits can be realized through the facilitative effects of individuals' hunting actions without spatial coordination of attacks. Such 'proto-cooperation' may be the pre-cursor to more complex group-hunting strategies. © 2016 The Author(s).

  10. The influence of weather on migraine – are migraine attacks predictable?

    PubMed Central

    Hoffmann, Jan; Schirra, Tonio; Lo, Hendra; Neeb, Lars; Reuter, Uwe; Martus, Peter

    2015-01-01

    Objective The study aimed at elucidating a potential correlation between specific meteorological variables and the prevalence and intensity of migraine attacks as well as exploring a potential individual predictability of a migraine attack based on meteorological variables and their changes. Methods Attack prevalence and intensity of 100 migraineurs were correlated with atmospheric pressure, relative air humidity, and ambient temperature in 4-h intervals over 12 consecutive months. For each correlation, meteorological parameters at the time of the migraine attack as well as their variation within the preceding 24 h were analyzed. For migraineurs showing a positive correlation, logistic regression analysis was used to assess the predictability of a migraine attack based on meteorological information. Results In a subgroup of migraineurs, a significant weather sensitivity could be observed. In contrast, pooled analysis of all patients did not reveal a significant association. An individual prediction of a migraine attack based on meteorological data was not possible, mainly as a result of the small prevalence of attacks. Interpretation The results suggest that only a subgroup of migraineurs is sensitive to specific weather conditions. Our findings may provide an explanation as to why previous studies, which commonly rely on a pooled analysis, show inconclusive results. The lack of individual attack predictability indicates that the use of preventive measures based on meteorological conditions is not feasible. PMID:25642431

  11. Phase-remapping attack in practical quantum-key-distribution systems

    NASA Astrophysics Data System (ADS)

    Fung, Chi-Hang Fred; Qi, Bing; Tamaki, Kiyoshi; Lo, Hoi-Kwong

    2007-03-01

    Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain loopholes that may lead to the generated secret keys being compromised. In this paper, we propose a phase-remapping attack targeting two practical bidirectional QKD systems (the “plug-and-play” system and the Sagnac system). We showed that if the users of the systems are unaware of our attack, the final key shared between them can be compromised in some situations. Specifically, we showed that, in the case of the Bennett-Brassard 1984 (BB84) protocol with ideal single-photon sources, when the quantum bit error rate (QBER) is between 14.6% and 20%, our attack renders the final key insecure, whereas the same range of QBER values has been proved secure if the two users are unaware of our attack; also, we demonstrated three situations with realistic devices where positive key rates are obtained without the consideration of Trojan horse attacks but in fact no key can be distilled. We remark that our attack is feasible with only current technology. Therefore, it is very important to be aware of our attack in order to ensure absolute security. In finding our attack, we minimize the QBER over individual measurements described by a general POVM, which has some similarity with the standard quantum state discrimination problem.

  12. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method

    PubMed Central

    Dhamodharan, Udaya Suriya Raj Kumar; Vayanaperumal, Rajamani

    2015-01-01

    Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method) with MAP (message authentication and passing) for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting. PMID:26236773

  13. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method.

    PubMed

    Dhamodharan, Udaya Suriya Raj Kumar; Vayanaperumal, Rajamani

    2015-01-01

    Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method) with MAP (message authentication and passing) for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting.

  14. Aftermath of bustamante attack on genomic beacon service.

    PubMed

    Aziz, Md Momin Al; Ghasemi, Reza; Waliullah, Md; Mohammed, Noman

    2017-07-26

    With the enormous need for federated eco-system for holding global genomic and clinical data, Global Alliance for Genomic and Health (GA4GH) has created an international website called beacon service which allows a researcher to find out whether a specific dataset can be utilized to his or her research beforehand. This simple webservice is quite useful as it allows queries like whether a certain position of a target chromosome has a specific nucleotide. However, the increased integration of individuals genomic data into clinical practice and research raised serious privacy concern. Though the answer of such queries are yes or no in Bacon network, it results in serious privacy implication as demonstrated in a recent work from Shringarpure and Bustamante. In their attack model, the authors demonstrated that with a limited number of queries, presence of an individual in any dataset can be determined. We propose two lightweight algorithms (based on randomized response) which captures the efficacy while preserving the privacy of the participants in a genomic beacon service. We also elaborate the strength and weakness of the attack by explaining some of their statistical and mathematical models using real world genomic database. We extend their experimental simulations for different adversarial assumptions and parameters. We experimentally evaluated the solutions on the original attack model with different parameters for better understanding of the privacy and utility tradeoffs provided by these two methods. Also, the statistical analysis further elaborates the different aspects of the prior attack which leads to a better risk management for the participants in a beacon service. The differentially private and lightweight solutions discussed here will make the attack much difficult to succeed while maintaining the fundamental motivation of beacon database network.

  15. Terrorist Attacks Escalate in Frequency and Fatalities Preceding Highly Lethal Attacks

    PubMed Central

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G.; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates–both in the number of people killed per attack and in the frequency of attacks–leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack. PMID:24755753

  16. Hill-Climbing Attacks and Robust Online Signature Verification Algorithm against Hill-Climbing Attacks

    NASA Astrophysics Data System (ADS)

    Muramatsu, Daigo

    Attacks using hill-climbing methods have been reported as a vulnerability of biometric authentication systems. In this paper, we propose a robust online signature verification algorithm against such attacks. Specifically, the attack considered in this paper is a hill-climbing forged data attack. Artificial forgeries are generated offline by using the hill-climbing method, and the forgeries are input to a target system to be attacked. In this paper, we analyze the menace of hill-climbing forged data attacks using six types of hill-climbing forged data and propose a robust algorithm by incorporating the hill-climbing method into an online signature verification algorithm. Experiments to evaluate the proposed system were performed using a public online signature database. The proposed algorithm showed improved performance against this kind of attack.

  17. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    SciTech Connect

    Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

    2011-10-01

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

  18. Protecting complex infrastructures against multiple strategic attackers

    NASA Astrophysics Data System (ADS)

    Hausken, Kjell

    2011-01-01

    Infrastructures are analysed subject to defence by a strategic defender and attack by multiple strategic attackers. A framework is developed where each agent determines how much to invest in defending versus attacking each of multiple targets. A target can have economic, human and symbolic values, which generally vary across agents. Investment expenditure functions for each agent can be linear in the investment effort, concave, convex, logistic, can increase incrementally, or can be subject to budget constraints. Contest success functions (e.g., ratio and difference forms) determine the probability of a successful attack on each target, dependent on the relative investments of the defender and attackers on each target, and on characteristics of the contest. Targets can be in parallel, in series, interlinked, interdependent or independent. The defender minimises the expected damage plus the defence expenditures. Each attacker maximises the expected damage minus the attack expenditures. The number of free choice variables equals the number of agents times the number of targets, or lower if there are budget constraints. Each agent is interested in how his investments vary across the targets, and the impact on his utilities. Alternative optimisation programmes are discussed, together with repeated games, dynamic games and incomplete information. An example is provided for illustration.

  19. Adaptive cyber-attack modeling system

    NASA Astrophysics Data System (ADS)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  20. Attack detection in unattended sensor networks

    NASA Astrophysics Data System (ADS)

    Wu, Curt; Monnier, Camille; Fry, Gerald; Girod, Lewis; Luke, Jahn

    2010-04-01

    Because sensor networks are often deployed in hostile environments where their security and integrity may be compromised, it is essential to maximize the reliability and trustworthiness of existing and envisioned sensor networks. During operations, the sensor network must be robust to deception, node compromise, and various other attacks, while maintaining the operator's situational awareness regarding the health and integrity of the system. To address these needs, we have designed a Framework to Ensure and Assess Trustworthiness in Sensor systems (FEATS) to identify attacks on sensor system integrity and inform the operator of sensor data trustworthiness. We have developed and validated unsupervised anomaly detection algorithms for sensor data captured from an experimental acoustic sensor platform under a number of attack scenarios. The platform, which contains four audio microphones, was exposed to two physical attacks (audio filtering and audio playback) as well as a live replay attack (replaying live audio data that is captured at a remote location), which is analogous to a wormhole attack in the routing layer. With our unsupervised learning algorithms, we were able to successfully identify the presence of various attacks.

  1. Situational awareness of a coordinated cyber attack

    NASA Astrophysics Data System (ADS)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  2. Do unexpected panic attacks occur spontaneously?

    PubMed

    Meuret, Alicia E; Rosenfield, David; Wilhelm, Frank H; Zhou, Enlu; Conrad, Ansgar; Ritz, Thomas; Roth, Walton T

    2011-11-15

    Spontaneous or unexpected panic attacks, per definition, occur "out of the blue," in the absence of cues or triggers. Accordingly, physiological arousal or instability should occur at the onset of, or during, the attack, but not preceding it. To test this hypothesis, we examined if points of significant autonomic changes preceded the onset of spontaneous panic attacks. Forty-three panic disorder patients underwent repeated 24-hour ambulatory monitoring. Thirteen natural panic attacks were recorded during 1960 hours of monitoring. Minute-by-minute epochs beginning 60 minutes before and continuing to 10 minutes after the onset of individual attacks were examined for respiration, heart rate, and skin conductance level. Measures were controlled for physical activity and vocalization and compared with time matched control periods within the same person. Significant patterns of instability across a number of autonomic and respiratory variables were detected as early as 47 minutes before panic onset. The final minutes before onset were dominated by respiratory changes, with significant decreases in tidal volume followed by abrupt carbon dioxide partial pressure increases. Panic attack onset was characterized by heart rate and tidal volume increases and a drop in carbon dioxide partial pressure. Symptom report was consistent with these changes. Skin conductance levels were generally elevated in the hour before, and during, the attacks. Changes in the matched control periods were largely absent. Significant autonomic irregularities preceded the onset of attacks that were reported as abrupt and unexpected. The findings invite reconsideration of the current diagnostic distinction between uncued and cued panic attacks. Copyright © 2011 Society of Biological Psychiatry. Published by Elsevier Inc. All rights reserved.

  3. CPAD: Cyber-Physical Attack Detection

    SciTech Connect

    Ferragut, Erik M; Laska, Jason A

    2016-06-02

    The CPAD technology relates to anomaly detection and more specifically to cyber physical attack detection. It infers underlying physical relationships between components by analyzing the sensor measurements of a system. It then uses these measurements to detect signs of a non-physically realizable state, which is indicative of an integrity attack on the system. CPAD can be used on any highly-instrumented cyber-physical system to detect integrity attacks and identify the component or components compromised. It has applications to power transmission and distribution, nuclear and industrial plants, and complex vehicles.

  4. Dead or Alive? Factors Affecting the Survival of Victims during Attacks by Saltwater Crocodiles (Crocodylus porosus) in Australia

    PubMed Central

    Fukuda, Yusuke

    2015-01-01

    Conflicts between humans and crocodilians are a widespread conservation challenge and the number of crocodile attacks is increasing worldwide. We identified the factors that most effectively decide whether a victim is injured or killed in a crocodile attack by fitting generalized linear models to a 42-year dataset of 87 attacks (27 fatal and 60 non-fatal) by saltwater crocodiles (Crocodylus porosus) in Australia. The models showed that the most influential factors were the difference in body mass between crocodile and victim, and the position of victim in relation to the water at the time of an attack. In-water position (for diving, swimming, and wading) had a higher risk than on-water (boating) or on-land (fishing, and hunting near the water's edge) positions. In the in-water position a 75 kg person would have a relatively high probability of survival (0.81) if attacked by a 300 cm crocodile, but the probability becomes much lower (0.17) with a 400 cm crocodile. If attacked by a crocodile larger than 450 cm, the survival probability would be extremely low (<0.05) regardless of the victim’s size. These results indicate that the main cause of death during a crocodile attack is drowning and larger crocodiles can drag a victim more easily into deeper water. A higher risk associated with a larger crocodile in relation to victim’s size is highlighted by children’s vulnerability to fatal attacks. Since the first recently recorded fatal attack involving a child in 2006, six out of nine fatal attacks (66.7%) involved children, and the average body size of crocodiles responsible for these fatal attacks was considerably smaller (384 cm, 223 kg) than that of crocodiles that killed adults (450 cm, 324 kg) during the same period (2006–2014). These results suggest that culling programs targeting larger crocodiles may not be an effective management option to improve safety for children. PMID:25961294

  5. Dead or Alive? Factors Affecting the Survival of Victims during Attacks by Saltwater Crocodiles (Crocodylus porosus) in Australia.

    PubMed

    Fukuda, Yusuke; Manolis, Charlie; Saalfeld, Keith; Zuur, Alain

    2015-01-01

    Conflicts between humans and crocodilians are a widespread conservation challenge and the number of crocodile attacks is increasing worldwide. We identified the factors that most effectively decide whether a victim is injured or killed in a crocodile attack by fitting generalized linear models to a 42-year dataset of 87 attacks (27 fatal and 60 non-fatal) by saltwater crocodiles (Crocodylus porosus) in Australia. The models showed that the most influential factors were the difference in body mass between crocodile and victim, and the position of victim in relation to the water at the time of an attack. In-water position (for diving, swimming, and wading) had a higher risk than on-water (boating) or on-land (fishing, and hunting near the water's edge) positions. In the in-water position a 75 kg person would have a relatively high probability of survival (0.81) if attacked by a 300 cm crocodile, but the probability becomes much lower (0.17) with a 400 cm crocodile. If attacked by a crocodile larger than 450 cm, the survival probability would be extremely low (<0.05) regardless of the victim's size. These results indicate that the main cause of death during a crocodile attack is drowning and larger crocodiles can drag a victim more easily into deeper water. A higher risk associated with a larger crocodile in relation to victim's size is highlighted by children's vulnerability to fatal attacks. Since the first recently recorded fatal attack involving a child in 2006, six out of nine fatal attacks (66.7%) involved children, and the average body size of crocodiles responsible for these fatal attacks was considerably smaller (384 cm, 223 kg) than that of crocodiles that killed adults (450 cm, 324 kg) during the same period (2006-2014). These results suggest that culling programs targeting larger crocodiles may not be an effective management option to improve safety for children.

  6. After Cancer, Higher Risk of Severe Heart Attack

    MedlinePlus

    ... this type of heart attack, called ST-elevation myocardial infarction (STEMI). One in 10 had a history of ... that cancer survivors had a higher rate of heart attack, not all of those attacks proved fatal. In ...

  7. The association between abdominal obesity and characteristics of migraine attacks in Iranian adults

    PubMed Central

    Sadeghi, Omid; Askari, Gholamreza; Maghsoudi, Zahra; Ghiasvand, Reza; Khorvash, Fariborz

    2016-01-01

    Background: Migraine is a primary headache disorder that affects the neurovascular system. Recent studies have shown that migraine patients with general obesity have higher characteristics of migraine attacks compared with normal weight patients, but data on central obesity are scarce. This study was done to assess the relationship between central obesity and the characteristics of migraine attacks in migraine patients. Materials and Methods: This cross-sectional study was conducted on 129 migraine patients (28 men and 101 women), aged 15–67 years, in Isfahan, Iran. Anthropometric measurements such as waist circumference (WC), hip circumference (HC), waist–hip ratio (WHR) and waist–height ratio (WHtR), as well as characteristics of migraine attacks such as severity, frequency, duration, and headache diary result (HDR) was determined for each participant. Linear regression was used to examine the association between anthropometric measurements and characteristics of migraine attacks. P value less than 0.05 was considered significant. Results: WC, WHR, and WHtR were positively associated with the severity (P-value: WC: 0.002, WHR: 0.002, WHtR: 0.001) and frequency (P-value: WC: 0.006, WHR: 0.01, WHtR: 0.002) of migraine attacks. Moreover, we found a significant association between WC (P = 0.001), WHR (P = 0.004), and WHtR (P < 0.001) with HDR. No significant relationship was observed between central obesity indicators and duration of migraine attacks. Conclusions: Central obesity indicators were positively associated with the severity and frequency of migraine attacks as well as HDR, but not with duration of attacks. Based on our findings, it can be concluded that weight loss may decrease the characteristics of migraine attacks. PMID:27186204

  8. Recovery of infrastructure networks after localised attacks

    PubMed Central

    Hu, Fuyu; Yeung, Chi Ho; Yang, Saini; Wang, Weiping; Zeng, An

    2016-01-01

    The stability of infrastructure network is always a critical issue studied by researchers in different fields. A lot of works have been devoted to reveal the robustness of the infrastructure networks against random and malicious attacks. However, real attack scenarios such as earthquakes and typhoons are instead localised attacks which are investigated only recently. Unlike previous studies, we examine in this paper the resilience of infrastructure networks by focusing on the recovery process from localised attacks. We introduce various preferential repair strategies and found that they facilitate and improve network recovery compared to that of random repairs, especially when population size is uneven at different locations. Moreover, our strategic repair methods show similar effectiveness as the greedy repair. The validations are conducted on simulated networks, and on real networks with real disasters. Our method is meaningful in practice as it can largely enhance network resilience and contribute to network risk reduction. PMID:27075559

  9. Diabetes - preventing heart attack and stroke

    MedlinePlus

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  10. Outdoor Air Pollution, Heart Attack and Stroke

    EPA Science Inventory

    Elevated outdoor ambient air particle pollution triggers heart attacks, strokes, and abnormal heart rhythms and worsens heart failure in individuals at high risk due to underlying medical conditions. Emergency Medical Services in communities are the first responders to these eme...

  11. Recovery of infrastructure networks after localised attacks.

    PubMed

    Hu, Fuyu; Yeung, Chi Ho; Yang, Saini; Wang, Weiping; Zeng, An

    2016-04-14

    The stability of infrastructure network is always a critical issue studied by researchers in different fields. A lot of works have been devoted to reveal the robustness of the infrastructure networks against random and malicious attacks. However, real attack scenarios such as earthquakes and typhoons are instead localised attacks which are investigated only recently. Unlike previous studies, we examine in this paper the resilience of infrastructure networks by focusing on the recovery process from localised attacks. We introduce various preferential repair strategies and found that they facilitate and improve network recovery compared to that of random repairs, especially when population size is uneven at different locations. Moreover, our strategic repair methods show similar effectiveness as the greedy repair. The validations are conducted on simulated networks, and on real networks with real disasters. Our method is meaningful in practice as it can largely enhance network resilience and contribute to network risk reduction.

  12. Women's Heart Disease: Heart Attack Symptoms

    MedlinePlus

    ... this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter 2014 Table ... NHLBI has uncovered some of the causes of heart diseases and conditions, as well as ways to prevent ...

  13. Identifying and Analyzing Web Server Attacks

    SciTech Connect

    Seifert, Christian; Endicott-Popovsky, Barbara E.; Frincke, Deborah A.; Komisarczuk, Peter; Muschevici, Radu; Welch, Ian D.

    2008-08-29

    Abstract: Client honeypots can be used to identify malicious web servers that attack web browsers and push malware to client machines. Merely recording network traffic is insufficient to perform comprehensive forensic analyses of such attacks. Custom tools are required to access and analyze network protocol data. Moreover, specialized methods are required to perform a behavioral analysis of an attack, which helps determine exactly what transpired on the attacked system. This paper proposes a record/replay mechanism that enables forensic investigators to extract application data from recorded network streams and allows applications to interact with this data in order to conduct behavioral analyses. Implementations for the HTTP and DNS protocols are presented and their utility in network forensic investigations is demonstrated.

  14. On localization attacks against cloud infrastructure

    NASA Astrophysics Data System (ADS)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  15. Study Shows How Zika Attacks Infant Brain

    MedlinePlus

    ... gov/news/fullstory_162514.html Study Shows How Zika Attacks Infant Brain Virus can copy itself thousands ... New research paints a chilling portrait of how Zika ravages the infant brain. Scientists from the U.S. ...

  16. Evaluation of the Single Keybit Template Attack

    DTIC Science & Technology

    2011-03-01

    27 v Page 3.5 Measures of Performance...17 MOP Measures of Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 x...include en- cryption standards, leakage models, correlation, classification theory, previous tem- plate attacks and measures of performance. 2.1

  17. Visualizing Risks: Icons for Information Attack Scenarios

    DTIC Science & Technology

    2000-10-01

    Visualizing Risks : Icons for Information Attack Scenarios Hilary H. Hosmer Data Security, Inc. Bedford, MA 01730 Email: hosmer@datasecinc.com...and omissions, thus speeding up risk analysis, requirements gathering, safeguard selection, cryptographic protocol analysis, and INFOSEC training...

  18. Using agility to combat cyber attacks.

    PubMed

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  19. Detecting GNSS spoofing attacks using INS coupling

    NASA Astrophysics Data System (ADS)

    Tanil, Cagatay

    Vulnerability of Global Navigation Satellite Systems (GNSS) users to signal spoofing is a critical threat to positioning integrity, especially in aviation applications, where the consequences are potentially catastrophic. In response, this research describes and evaluates a new approach to directly detect spoofing using integrated Inertial Navigation Systems (INS) and fault detection concepts based on integrity monitoring. The monitors developed here can be implemented into positioning systems using INS/GNSS integration via 1) tightly-coupled, 2) loosely-coupled, and 3) uncoupled schemes. New evaluation methods enable the statistical computation of integrity risk resulting from a worst-case spoofing attack - without needing to simulate an unmanageably large number of individual aircraft approaches. Integrity risk is an absolute measure of safety and a well-established metric in aircraft navigation. A novel closed-form solution to the worst-case time sequence of GNSS signals is derived to maximize the integrity risk for each monitor and used in the covariance analyses. This methodology tests the performance of the monitors against the most sophisticated spoofers, capable of tracking the aircraft position - for example, by means of remote tracking or onboard sensing. Another contribution is a comprehensive closed-loop model that encapsulates the vehicle and compensator (estimator and controller) dynamics. A sensitivity analysis uses this model to quantify the leveraging impact of the vehicle's dynamic responses (e.g., to wind gusts, or to autopilot's acceleration commands) on the monitor's detection capability. The performance of the monitors is evaluated for two safety-critical terminal area navigation applications: 1) autonomous shipboard landing and 2) Boeing 747 (B747) landing assisted with Ground Based Augmentation Systems (GBAS). It is demonstrated that for both systems, the monitors are capable of meeting the most stringent precision approach and landing

  20. Panic attack history and smoking topography.

    PubMed

    Farris, Samantha G; Brown, Lily A; Goodwin, Renee D; Zvolensky, Michael J

    2017-02-01

    Little is known about panic attacks and puffing topography, a behavioral index of the value of smoking reinforcement. This study examined smoking style during the course of smoking of a single cigarette among adult daily smokers with and without a history of panic attacks. Participants (n=124, Mage=43.9, SD=9.7; 44.4% female) were non-treatment seeking daily smokers. Lifetime panic attack history was assessed via diagnostic assessment; 28.2% (n=35) of the sample had a panic attack history. Participants smoked one cigarette during an ad libitum smoking trial. Puff volume, duration, and inter-puff interval were measured using the Clinical Research Support System (CReSS) pocket device. Regression analyses revealed that panic attack status was not associated with significant differences in average puff volume, duration, or inter-puff interval. Multi-level modeling was used to examine puffing trajectories. Puff-level data revealed that there was a significant quadratic time x panic effect for puff volume and duration. Those with a panic attack history demonstrated relatively sustained levels of both puff volume and duration over time, whereas those without a history of panic attacks demonstrated an increase followed by a decrease in volume and duration over time. These effects were not accounted for by the presence of general psychopathology. Smokers with a panic attack history demonstrate more persistent efforts to self-regulate the delivery of nicotine, and thus may be at risk for continued smoking and dependence. Tailored treatment may be needed to address unique vulnerabilities among this group. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  1. Cyber Security Audit and Attack Detection Toolkit

    SciTech Connect

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  2. Attack by Pyemotes johnmoseri (Acari: Pyemotidae)

    Treesearch

    Tulin Askit; Ibrahim Cakmak; John Moser

    2007-01-01

    The Aegean Region of Turkey is one of the largest dried fig producers in the world. A Turkish cultivar sarilop (Ficus carica cv. Calimyrna L.) possesses good qualities for drying process, and has been grown extensively for many years in Turkey. Hypoborus ficus is the most common xylophagous insect attacking fig trees in Aydin (Aks¸it et al. 2003). This pest attacks...

  3. Heart Attack - Multiple Languages: MedlinePlus

    MedlinePlus

    ... Arabic) النوبة القلبية - العربية Bilingual PDF Health Information Translations Bosnian (Bosanski) Heart Attack Srčani udar - Bosanski (Bosnian) Bilingual PDF Health Information Translations Chinese - Simplified (简体中文) Heart Attack 心脏病发作 - 简体中文 (Chinese - ...

  4. Analysis of Effects of Interceptor Roll Performance and Maneuverability on Success of Collision-Course Attack

    NASA Technical Reports Server (NTRS)

    Phillips, William H.

    1961-01-01

    An attempt has been made to determine the importance of rolling performance and other factors in the design of an interceptor which uses collision-course tactics. A graphical method is presented for simple visualization of attack situations. By means of diagrams showing vectoring limits, that is, the ranges of interceptor position and heading from which attacks may be successfully completed, the relative importance of rolling performance and normal-acceleration capability in determining the success of attacks is illustrated. The results indicate that the reduction in success of attacks due to reduced rolling performance (within the limits generally acceptable from the pilots' standpoint) is very small, whereas the benefits due to substantially increasing the normal-acceleration capability are large. Additional brief analyses show that the optimum speed for initiating a head-on attack is often that corresponding to the upper left-hand corner of the V-g diagram. In these cases, increasing speed beyond this point for given values of normal acceleration and radar range rapidly decreases the width of the region from which successful attacks can be initiated. On the other hand, if the radar range is increased with a variation somewhere between the first and second power of the interceptor speed, the linear dimensions of the region from which successful attacks can be initiated vary as the square of the interceptor speed.

  5. Severe attacks by dogs: characteristics of the dogs, the victims, and the attack settings.

    PubMed

    Wright, J C

    1985-01-01

    Sixteen incidents involving dog bites fitting the description "severe" were identified among 5,711 dog bite incidents reported to health departments in five South Carolina counties (population 750,912 in 1980) between July 1, 1979, and June 30, 1982. A "severe" attack was defined as one in which the dog "repeatedly bit or vigorously shook its victim, and the victim or the person intervening had extreme difficulty terminating the attack." Information from health department records was clarified by interviews with animal control officers, health and police officials, and persons with firsthand knowledge of the events. Investigation disclosed that the dogs involved in the 16 severe attacks were reproductively intact males. The median age of the dogs was 3 years. A majority of the attacks were by American Staffordshire terriers, St. Bernards, and cocker spaniels. Ten of the dogs had been aggressive toward people or other dogs before the incident that was investigated. Ten of the 16 victims of severe attacks were 10 years of age or younger; the median age of all 16 victims was 8 years. Twelve of the victims either were members of the family that owned the attacking dog or had had contact with the dog before the attack. Eleven of the victims were bitten on the head, neck, or shoulders. In 88 percent of the cases, the attacks took place in the owner's yard or home, or in the adjoining yard. In 10 of the 16 incidents, members of the victims' families witnessed the attacks. The characteristics of these attacks, only one of which proved fatal, were similar in many respects to those that have been reported for other dog bite incidents that resulted in fatalities. On the basis of this study, the author estimates that a risk of 2 fatalities per 1,000 reported dog bites may exist nationwide. Suggestions made for the prevention of severe attacks focus on changing the behavior of both potential canine attackers and potential victims.

  6. Mediation of herbivore attack and induced resistance by plant vigor and ontogeny

    NASA Astrophysics Data System (ADS)

    Santos, Jean Carlos; Fernandes, G. Wilson

    2010-11-01

    A large number of insect galls induced by Contarinia sp. (Cecidomyiidae) on cashew plants, Anacardium occidentale L. (Anacardiaceae), and induced resistance (hypersensitivity) against galling were observed in five restored different-aged stands in the Amazonian tropical rain forest. We tested three hypotheses: (1) the effect of age-dependent changes on the attack by Contarinia sp. and on induced resistance of A. occidentale to herbivory (plant ontogeny - herbivory hypothesis); (2) the effect of leaf size on the oviposition preference by the gall-midge (plant vigor hypothesis), and (3) whether past attack could influence future attack and induced resistance (attack prediction hypothesis). Tree age positively influenced attack levels and gall density. The leaves of older trees experienced four-fold greater attack and supported two-fold more galls. Hypersensitive response was also positively affected by tree age. This induced resistance was six-fold higher on older trees. Therefore, we suggest that induced resistance in A. occidentale was age-dependent, hence supporting the plant ontogeny - herbivory hypothesis. Higher preference of Contarinia sp. on larger sized leaves of A. occidentale was only observed in old stands, hence providing support for the plant vigor hypothesis. The same trend was observed in hypersensitive response. Only two older plots (5-7-year-old) were better predictors of current attack and resistance of A. occidentale, hence supporting the attack prediction hypothesis. Our results suggest that plant development is an important factor that contributes to the structuring of interactions between host plant and insect herbivores. However, more information about ontogenetic changes and regeneration processes is needed to understand plant-herbivore interactions in the Amazonian forest.

  7. A Game Theoretic Approach to Cyber Attack Prediction

    SciTech Connect

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  8. Who Is at Risk for a Heart Attack?

    MedlinePlus

    ... explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, visit www.hearttruth.gov or the Health Topics Heart Attack and Heart Disease in Women articles. What is a heart attack? 05/22/ ...

  9. What Are the Symptoms of a Heart Attack?

    MedlinePlus

    ... explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, visit www.hearttruth.gov or the Health Topics Heart Attack and Heart Disease in Women articles. What is a heart attack? 05/22/ ...

  10. Know the Warning Signs of a Heart Attack

    MedlinePlus

    ... No. 22 Know the Warning Signs of a Heart Attack What is a heart attack? Aheart attack happens when the blood vessels that ... hurting your heart muscle. Another name for a heart attack is myocardial infarction, or MI. If you have ...

  11. Joint Direct Attack Munition (JDAM)

    DTIC Science & Technology

    2015-12-01

    kit using a Global Positioning System Aided Inertial Navigation System. JDAM provides an accurate, adverse weather capability. JDAM is integrated...with the B-52H, B-2A, B-1B, F-16C/D, F/A-18A+/ C /D/E/F, F-15E, A-10C, AV-8B and F-22A aircraft. Follow-on integration with the MQ-9 and F-35 Joint...definitize the contract and increase the current production capacity ceiling from 15,000 tail kits per lot to 36,500 tail kits per lot. An updated APB

  12. Performance Evaluation of AODV with Blackhole Attack

    NASA Astrophysics Data System (ADS)

    Dara, Karuna

    2010-11-01

    A Mobile Ad Hoc Network (MANET) is a temporary network set up by a wireless mobile computers moving arbitrary in the places that have no network infrastructure. These nodes maintain connectivity in a decentralized manner. Since the nodes communicate with each other, they cooperate by forwarding data packets to other nodes in the network. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, mobile ad-hoc networks are unprotected to attacks of the malicious nodes. One of these attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. In this paper, we simulated the black hole attack in various mobile ad-hoc network scenarios using AODV routing protocol of MANET and have tried to find a effect if number of nodes are increased with increase in malicious nodes.

  13. Periorbital trauma from pit bull terrier attacks.

    PubMed

    Wladis, Edward J; Dewan, Mohit A

    2012-06-01

    To report the nature of periorbital trauma after pit bull attacks. While these attacks have been well-characterized in the popular media, no case series has documented the ophthalmic manifestations of this trauma. We retrospectively reviewed all cases of pit bull terrier attacks that presented to the oculoplastic and orbital surgery service at Albany Medical Center between 2008 and 2011. The age, gender, extent of the injuries, care provided, follow up interval, and complication rate were evaluated for each patient. Seven patients were identified, with a mean age of 17.2 years. Six of the seven patients were in the pediatric age group. All patients suffered eyelid lacerations, and only one patient had additional injuries. Four patients (57.2%) suffered a canalicular laceration. Despite the lack of post-operative oral antibiotic use, no patient developed a wound infection. In the ophthalmic setting, pit bull terrier attacks most frequently involve children and result in eyelid lacerations. Canalicular injuries are common after these attacks.

  14. Subclinical endophthalmitis following a rooster attack.

    PubMed

    Lekse Kovach, Jaclyn; Maguluri, Srilakshmi; Recchia, Franco M

    2006-12-01

    Ocular injury resulting from rooster attacks is rarely reported in the literature. Sadly, the target of these attacks is most often children younger than 3 years old, whose naiveté of the aggressive, territorial behavior of birds can place them at risk. Acute sequelae of these attacks can result in a lifetime of visual impairment. The possibility of a subacute or occult infection is an unusual occurrence that must always be considered. In an effort to prevent future attacks and ocular casualties, we present a case of a 12-month-old boy who suffered an open globe following a rooster attack. The open globe was emergently repaired. One week later, a white cataract was noticed on examination in the absence of systemic or ocular signs of inflammation. Traumatic endophthalmitis and lenticular abscess were suspected during examination under anesthesia. Vitrectomy, lensectomy, and injection of intravitreal antibiotics were performed. Culture of lenticular and vitreous aspirates grew alpha-streptococcus. Alpha-streptococcal endophthalmitis can result from ocular injuries caused by rooster pecking. The infection may present insidiously and without typical ocular or systemic symptoms or signs. Management is challenging and may require surgery.

  15. High angle of attack hypersonic aerodynamics

    NASA Technical Reports Server (NTRS)

    Harloff, Gary J.

    1987-01-01

    A new aerodynamics force model is presented which is based on modified Newtonian theory and empirical correlations. The algebraic model was developed for complete vehicles from take off to orbital speeds and for large angles of attack. Predictions are compared to results for a wind tunnel model at a Mach number of 20, and the full scale Shuttle Orbiter for Mach numbers from 0.25 to 20 for angles of attack from 0 to 50 deg. The maximum shuttle orbiter lift/drag at Mach 10 and 20 is 1.85 at 20-deg angle-of-attack. Aerodynamic force predictions are made for a transatmospheric vehicle, which is a derivative of the Shuttle Orbiter, for Mach numbers from 4 to 27 at angles of attack from 5 to 40 deg. Predicted aerodynamic force data indicate that lift/drag ratios of 5.2 at Mach number 10 and 3.6 at Mach number 26 are obtainable. Changes in force coefficients with changes in: nose angle, sweep angle, and (volume exp 2/3)/planform area are quantified for Mach numbers of 10 and 26. Lift/drag ratios increase with decreasing nose angle and (volume exp 2/3)/planform area and increasing wing sweep angle. Lift/drag ratios are independent of these variables for angles of attack in excess of 20 deg at Mach 10 and 30 deg at Mach 26.

  16. [Hyperventilation: not a cause of panic attacks].

    PubMed

    Spinhoven, P; Onstein, E J; Sterk, P J

    1993-11-06

    To investigate the importance of hyperventilation in the pathogenesis of panic attacks. Descriptive. The Jelgersma Outpatient Clinic at Oegstgeest and the University Hospital Leiden, the Netherlands. In 57 psychiatric patients with a panic disorder and 96 somatic patients with unexplained somatic complaints suggestive of hyperventilation, a Hyperventilation Provocation Test (HVPT) was conducted. Of the somatic patients, 33 had recently experienced a panic attack. During the test, various physiological and symptom criteria for the Hyperventilation Syndrome were assessed. Several measures for concomitant psychopathology were collected as well. No significant differences were found in physiological criteria for the Hyperventilation Syndrome between psychiatric patients with a panic disorder (PD) and somatic patients with (PA+) or without (PA-) a recent panic attack. On all symptom criteria, however, PD and PA+ patients obtained comparable scores, while both groups scored higher than PA- patients. On most measures for concomitant psychopathology, PD patients scored higher than PA+ patients, who on their part scored higher than PA- patients. Hyperventilation is of secondary importance in the pathogenesis of panic attacks and an early diagnosis of panic attacks or panic disorder may be conducive to more adequate treatment.

  17. Individual triptan selection in migraine attack therapy.

    PubMed

    Belvís, Robert; Pagonabarraga, Javier; Kulisevsky, Jaime

    2009-01-01

    About 6% of men and 18% of women suffer migraine attacks. Migraine can induce a great impact in the quality of life of the patient and the costs of medical care and lost productivity can be also high. There are two therapeutic approaches in the treatment of migraine: preventive therapy and acute treatment of migraine attack. Immediate treatment with selective serotonin [5-HT1B/1T] receptor agonists (so-called triptans) is the first-line option in the acute treatment of moderate-severe migraine attacks. The introduction in early nineties of triptans was a revolution in migraine therapy and evidences about their efficacy are at present irrefutable. At the moment, there are seven marketed molecules: sumatriptan, rizatriptan, zolmitriptan, eletriptan, naratriptan, almotriptan and frovatriptan. Obviously, every molecule has different pharmacokinetic and pharmacodinamic properties and, moreover, some triptans have several formulations: tablets, dissolvable tablets, nasal and injections. The prescription of one of these seven triptans for a specified patient is based in the drug profile: efficacy, safety, pharmacokinetics and pharmacodynamics. Despite there are a lot of published studies using triptans, no clinical trial has analyzed all the molecules at the same time. Other data to take account in the final prescription are clinical characteristics of the migraine attack and patient characteristics: labour aspects, style of life and the patient medical history. We present a state-of-the-art of the triptan selection in treatment of moderate-severe migraine attacks.

  18. Attack-tolerant networked control system: an approach for detection the controller stealthy hijacking attack

    NASA Astrophysics Data System (ADS)

    Atta Yaseen, Amer; Bayart, Mireille

    2017-01-01

    In this work, a new approach will be introduced as a development for the attack-tolerant scheme in the Networked Control System (NCS). The objective is to be able to detect an attack such as the Stuxnet case where the controller is reprogrammed and hijacked. Besides the ability to detect the stealthy controller hijacking attack, the advantage of this approach is that there is no need for a priori mathematical model of the controller. In order to implement the proposed scheme, a specific detector for the controller hijacking attack is designed. The performance of this scheme is evaluated be connected the detector to NCS with basic security elements such as Data Encryption Standard (DES), Message Digest (MD5), and timestamp. The detector is tested along with networked PI controller under stealthy hijacking attack. The test results of the proposed method show that the hijacked controller can be significantly detected and recovered.

  19. Distance Bounding Protocols: Authentication Logic Analysis and Collusion Attacks

    DTIC Science & Technology

    2006-01-01

    than preventing or deterring, collusion attacks. We show that colluding verifiers who are capable of implementing wormhole attacks can defeat even...away. We will illustrate this using (a) standard collusion and also (b) wormhole in Figure 2. A wormhole attack is one in which a fast link is set up...be- tween the victims and an attacker who is outside of the normal range. The wormhole attack may appear to be an overkill for this problem since

  20. Discovering Collaborative Cyber Attack Patterns Using Social Network Analysis

    NASA Astrophysics Data System (ADS)

    Du, Haitao; Yang, Shanchieh Jay

    This paper investigates collaborative cyber attacks based on social network analysis. An Attack Social Graph (ASG) is defined to represent cyber attacks on the Internet. Features are extracted from ASGs to analyze collaborative patterns. We use principle component analysis to reduce the feature space, and hierarchical clustering to group attack sources that exhibit similar behavior. Experiments with real world data illustrate that our framework can effectively reduce from large dataset to clusters of attack sources exhibiting critical collaborative patterns.

  1. Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    SciTech Connect

    Chatterjee, Samrat; Halappanavar, Mahantesh; Tipireddy, Ramakrishna; Oster, Matthew R.; Saha, Sudip

    2015-04-15

    Representation and propagation of uncertainty in cyber attacker payoffs is a key aspect of security games. Past research has primarily focused on representing the defender’s beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and intervals. Within cyber-settings, continuous probability distributions may still be appropriate for addressing statistical (aleatory) uncertainties where the defender may assume that the attacker’s payoffs differ over time. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attacker’s payoff generation mechanism. Such epistemic uncertainties are more suitably represented as probability boxes with intervals. In this study, we explore the mathematical treatment of such mixed payoff uncertainties.

  2. Robustness of interdependent networks under targeted attack

    NASA Astrophysics Data System (ADS)

    Huang, Xuqing; Gao, Jianxi; Buldyrev, Sergey; Havlin, Shlomo; Stanley, H. Eugene

    2012-02-01

    When an initial failure of nodes occurs in interdependent networks, a cascade of failure between the networks occurs. Earlier studies focused on random initial failures. Here we study the robustness of interdependent networks under targeted attack on high or low degree nodes. We introduce a general technique which maps the targeted-attack problem in interdependent networks to the random-attack problem in a transformed pair of interdependent networks. We find that when the highly connected nodes are protected and have lower probability to fail, in contrast to single scale-free (SF) networks where the percolation threshold pc=0, coupled SF networks are significantly more vulnerable with pc significantly larger than zero. The result implies that interdependent networks are difficult to defend by strategies such as protecting the high degree nodes that have been found useful to significantly improve robustness of single networks.

  3. Robustness of interdependent networks under targeted attack

    NASA Astrophysics Data System (ADS)

    Huang, Xuqing; Gao, Jianxi; Buldyrev, Sergey V.; Havlin, Shlomo; Stanley, H. Eugene

    2011-06-01

    When an initial failure of nodes occurs in interdependent networks, a cascade of failure between the networks occurs. Earlier studies focused on random initial failures. Here we study the robustness of interdependent networks under targeted attack on high or low degree nodes. We introduce a general technique which maps the targeted-attack problem in interdependent networks to the random-attack problem in a transformed pair of interdependent networks. We find that when the highly connected nodes are protected and have lower probability to fail, in contrast to single scale-free (SF) networks where the percolation threshold pc=0, coupled SF networks are significantly more vulnerable with pc significantly larger than zero. The result implies that interdependent networks are difficult to defend by strategies such as protecting the high degree nodes that have been found useful to significantly improve robustness of single networks.

  4. Death due to attack from chow dog.

    PubMed

    Bux, R C; McDowell, J D

    1992-12-01

    It is estimated that between one and four million persons per year are bitten by dogs in the United States. While most injuries associated with the bites are minor, serious sequelae, and even death, may occur. Most victims of fatal dog attacks are children < 1 year of age or elderly women. The most frequent cause of death is hemorrhage and shock from major vessel damage. A case is reported in which an elderly woman was attacked by her pet Chow dog. The victim received multiple superficial abrasions, contusions, and lacerations from the dog attack. A large perforation of the right external pudendal vein and three perforations of the left superficial femoral vein resulted in exsanguination and death. Fractures of the left 2nd through 4th ribs with underlying pulmonary contusion were also found.

  5. BFT replication resistant to MAC attacks

    NASA Astrophysics Data System (ADS)

    Zbierski, Maciej

    2016-09-01

    Over the last decade numerous Byzantine fault-tolerant (BFT) replication protocols have been proposed in the literature. However, the vast majority of these solutions reuse the same authentication scheme, which makes them susceptible to a so called MAC attack. Such vulnerability enables malicious clients to undetectably prevent the replicated service from processing incoming client requests, and consequently making it permanently unavailable. While some BFT protocols attempted to address this issue by using different authentication mechanisms, they at the same time significantly degraded the performance achieved in correct environments. This article presents a novel adaptive authentication mechanism which can be combined with practically any Byzantine fault-tolerant replication protocol. Unlike previous solutions, the proposed scheme dynamically switches between two operation modes to combine high performance in correct environments and liveness during MAC attacks. The experiment results presented in the article demonstrate that the proposed mechanism can sufficiently tolerate MAC attacks without introducing any observable overhead whenever no faults are present.

  6. A Traceability Attack against e-Passports

    NASA Astrophysics Data System (ADS)

    Chothia, Tom; Smirnov, Vitaliy

    Since 2004, many nations have started issuing "e-passports" containing an RFID tag that, when powered, broadcasts information. It is claimed that these passports are more secure and that our data will be protected from any possible unauthorised attempts to read it. In this paper we show that there is a flaw in one of the passport's protocols that makes it possible to trace the movements of a particular passport, without having to break the passport's cryptographic key. All an attacker has to do is to record one session between the passport and a legitimate reader, then by replaying a particular message, the attacker can distinguish that passport from any other. We have implemented our attack and tested it successfully against passports issued by a range of nations.

  7. Responding to chemical attack. Final report

    SciTech Connect

    Bagley, R.W.

    1991-02-11

    In view of Iraq's stated intention of using chemical weapons in the Persian Gulf War, the Coalition forces must be prepared to respond. Iraq is capable of conducting such an attack. While the use of chemical weapons may not be militarily significant, the political effect of the use and the response to it may be very significant. Responses including the use of chemical and nuclear weapons are assessed in terms of their legality, political cost, and military effectiveness and found unacceptable. Reliance on diplomatic protests and on post-war criminal sanctions are judged ineffective. A response in the form of increased conventional attack on the Iraqi chemical infrastructure is recommended because that response will preserve the present Coalition, effectively counter the chemical attack, contribute to regional stability, and enhance the reputation of the United States for lawfulness and dependability.

  8. Attack optimization for unequal moderate forces

    SciTech Connect

    Canavan, G.H.

    1997-06-01

    Attack allocation optimizations produce stability indices for unsymmetrical forces that indicate significant regions of both stability and instability and that have their minimum values roughly when the two sides have equal forces. This note derives combined stability indices for unsymmetrical offensive force configurations. The indices are based on optimal allocations of offensive missiles between vulnerable missiles and value based on the minimization of first strike cost, which is done analytically. Exchanges are modeled probabalistically and their results are converted into first and second strike costs through approximations to the damage to the value target sets held at risk. The stability index is the product of the ratio of first to second strike costs seen by the two sides. Optimal allocations scale directly on the opponent`s vulnerable missiles, inversely on one`s own total weapons, and only logarithmically on the attacker`s damage preference, kill probability, and relative target set. The defender`s allocation scales in a similar manner on the attacker`s parameters. First and second strike magnitudes increase roughly linearly for the side with greater forces and decrease linearly for the side with fewer. Conversely, the first and second strike magnitudes decrease for the side with greater forces and increase for the side with fewer. These trends are derived and discussed analytically. The resulting stability indices exhibit a minimum where the two sides have roughly equal forces. If one side has much larger forces than the other, his costs drop to levels low enough that he is relatively insensitive to whether he strikes first or second. These calculations are performed with the analytic attack allocation appropriate for moderate forces, so some differences could be expected for the largest of the forces considered.

  9. A likelihood ratio anomaly detector for identifying within-perimeter computer network attacks

    SciTech Connect

    Grana, Justin; Wolpert, David; Neil, Joshua; Xie, Dongping; Bhattacharya, Tanmoy; Bent, Russell

    2016-03-11

    The rapid detection of attackers within firewalls of enterprise computer networks is of paramount importance. Anomaly detectors address this problem by quantifying deviations from baseline statistical models of normal network behavior and signaling an intrusion when the observed data deviates significantly from the baseline model. But, many anomaly detectors do not take into account plausible attacker behavior. As a result, anomaly detectors are prone to a large number of false positives due to unusual but benign activity. Our paper first introduces a stochastic model of attacker behavior which is motivated by real world attacker traversal. Then, we develop a likelihood ratio detector that compares the probability of observed network behavior under normal conditions against the case when an attacker has possibly compromised a subset of hosts within the network. Since the likelihood ratio detector requires integrating over the time each host becomes compromised, we illustrate how to use Monte Carlo methods to compute the requisite integral. We then present Receiver Operating Characteristic (ROC) curves for various network parameterizations that show for any rate of true positives, the rate of false positives for the likelihood ratio detector is no higher than that of a simple anomaly detector and is often lower. Finally, we demonstrate the superiority of the proposed likelihood ratio detector when the network topologies and parameterizations are extracted from real-world networks.

  10. A likelihood ratio anomaly detector for identifying within-perimeter computer network attacks

    DOE PAGES

    Grana, Justin; Wolpert, David; Neil, Joshua; ...

    2016-03-11

    The rapid detection of attackers within firewalls of enterprise computer networks is of paramount importance. Anomaly detectors address this problem by quantifying deviations from baseline statistical models of normal network behavior and signaling an intrusion when the observed data deviates significantly from the baseline model. But, many anomaly detectors do not take into account plausible attacker behavior. As a result, anomaly detectors are prone to a large number of false positives due to unusual but benign activity. Our paper first introduces a stochastic model of attacker behavior which is motivated by real world attacker traversal. Then, we develop a likelihoodmore » ratio detector that compares the probability of observed network behavior under normal conditions against the case when an attacker has possibly compromised a subset of hosts within the network. Since the likelihood ratio detector requires integrating over the time each host becomes compromised, we illustrate how to use Monte Carlo methods to compute the requisite integral. We then present Receiver Operating Characteristic (ROC) curves for various network parameterizations that show for any rate of true positives, the rate of false positives for the likelihood ratio detector is no higher than that of a simple anomaly detector and is often lower. Finally, we demonstrate the superiority of the proposed likelihood ratio detector when the network topologies and parameterizations are extracted from real-world networks.« less

  11. Identifying inference attacks against healthcare data repositories

    PubMed Central

    Vaidya, Jaideep; Shafiq, Basit; Jiang, Xiaoqian; Ohno-Machado, Lucila

    Health care data repositories play an important role in driving progress in medical research. Finding new pathways to discovery requires having adequate data and relevant analysis. However, it is critical to ensure the privacy and security of the stored data. In this paper, we identify a dangerous inference attack against naive suppression based approaches that are used to protect sensitive information. We base our attack on the querying system provided by the Healthcare Cost and Utilization Project, though it applies in general to any medical database providing a query capability. We also discuss potential solutions to this problem. PMID:24303279

  12. Predation: Prey plumage adaptation against falcon attack.

    PubMed

    Palleroni, Alberto; Miller, Cory T; Hauser, Marc; Marler, Peter

    2005-04-21

    Several plumage types are found in feral pigeons (Columba livia), but one type imparts a clear survival advantage during attacks by the swiftest of all predators--the peregrine falcon (Falco peregrinus). Here we use quantitative field observations and experiments to demonstrate both the selective nature of the falcon's choice of prey and the effect of plumage coloration on the survival of feral pigeons. This plumage colour is an independently heritable trait that is likely to be an antipredator adaptation against high-speed attacks in open air space.

  13. Attacks and infections in percolation processes

    NASA Astrophysics Data System (ADS)

    Janssen, Hans-Karl; Stenull, Olaf

    2017-08-01

    We discuss attacks and infections at propagating fronts of percolation processes based on the extended general epidemic process. The scaling behavior of the number of the attacked and infected sites in the long time limit at the ordinary and tricritical percolation transitions is governed by specific composite operators of the field-theoretic representation of this process. We calculate corresponding critical exponents for tricritical percolation in mean-field theory and for ordinary percolation to 1-loop order. Our results agree well with the available numerical data.

  14. A treatment for the acute migraine attack.

    PubMed

    Adam, E I

    1987-01-01

    A compound analgesic/anti-emetic formulation was significantly effective in reducing the severity of acute attacks of migraine, in a double-blind, randomized, crossover trial of 34 patients referred to a migraine clinic. The preparation contained paracetamol (acetaminophen) 500 mg, codeine phosphate 8 mg, buclizine hydrochloride 6.25 mg and dioctyl sodium sulphosuccinate 10 mg. The dosage was two tablets taken as early as possible in the acute attack. No specific factors could be identified which influenced response to treatment. Patients with a long history of migraine (more than 10 years) responded as well as those with a recent onset of the condition.

  15. Staying Out of Range: Increasing Attacking Distance in Fencing.

    PubMed

    Turner, Anthony N; Marshall, Geoff; Noto, Angelo; Chavda, Shyam; Atlay, Nathan; Kirby, David

    2017-03-14

    To avoid being hit, fencers typically adopt an out of range position, which was hypothesized to be governed by body- and action-scaled affordances. This theory was measured in elite and national level junior (u20) fencers. Associations between "reachability" of lunging and step-lunging attacks, was assessed against height, arm-span, leg-span, body mass and lower-body power, and then compared across level. Reachability was determined as the distance covered by fencers during these attacks and was reported as actual and estimated distances. Elite fencers are better at estimating their lunging and step-lunge distance compared to national ranked junior fencers (-0.9 vs. 7.3 % and 5.4 vs. 10.9 % respectively). Surprisingly, elite fencers' actual and estimated distances for these was less than the junior fencers' (222.6 vs. 251.5 cm and 299.3 vs. 360.2 cm respectively), and significantly so in the former. Finally only arm (r = .81) and leg span (r = .71) were significantly correlated to estimated lunging distance and this was only in elite fencers. Findings suggest that better fencers can accurately predict their attack range and that reachability appears to be positively influenced by arm and leg-span; these may feed in to talent identification. Given that distances were less in elite fencers, findings suggests that timing and distance estimation are key skills to master, and that the mastery of these in offensive actions can mitigate to a large extent, the physical benefits of an opponent's greater height.

  16. GNSS-based bistatic SAR: a signal processing view

    NASA Astrophysics Data System (ADS)

    Antoniou, Michail; Cherniakov, Mikhail

    2013-12-01

    This article presents signal processing algorithms used as a new remote sensing tool, that is passive bistatic SAR with navigation satellites (e.g. GPS, GLONASS or Galileo) as transmitters of opportunity. Signal synchronisation and image formation algorithms are described for two system variants: one where the receiver is moving and one where it is fixed on the ground. The applicability and functionality of the algorithms described is demonstrated through experimental imagery that ultimately confirms the feasibility of the overall technology.

  17. Panic attacks and panic disorder in chronic obstructive pulmonary disease: a cognitive behavioral perspective.

    PubMed

    Livermore, Nicole; Sharpe, Louise; McKenzie, David

    2010-09-01

    The prevalence of panic disorder in patients with chronic obstructive pulmonary disease (COPD) is up to 10 times greater than the overall population prevalence of 1.5-3.5%, and panic attacks are commonly experienced. When present, clinically significant anxiety decreases quality of life for COPD patients, and also increases health care costs. Therefore, understanding why COPD patients have such high rates of panic attacks and panic disorder is important for optimal management of COPD. The cognitive model of panic anxiety is the most widely accepted theory of panic attacks and panic disorder in physically healthy adults. According to this model, panic attacks occur when catastrophic misinterpretations of ambiguous physical sensations (such as shortness of breath or increased heart rate) increase arousal, creating a positive feedback loop that results in panic. As the major symptom of a terminal illness that threatens our most basic physical requirement, dyspnea in COPD is open to catastrophic misinterpretation. There is some experimental and clinical evidence for the applicability of the cognitive model of panic anxiety in COPD, and of the utility of cognitive behavior therapy (CBT), based on this model, for treating anxiety symptoms and panic attacks in COPD patients. However, there is much need for further studies. Evidence is increasing that mental health professionals, in collaboration with multi-disciplinary pulmonary teams, potentially have key roles to play in preventing and treating panic attacks and panic disorder in COPD patients. This review addresses diagnosis, epidemiology, theoretical conceptualizations, treatment, and recommendations for future research.

  18. Characteristics of individuals meeting criteria for new onset panic attacks following exposure to a typhoon.

    PubMed

    Roberson-Nay, Roxann; Berenz, Erin C; Acierno, Ron; Tran, Trinh Luong; Trung, Lam Tu; Tam, Nguyen Thanh; Tuan, Tran; Buoi, La Thi; Ha, Tran Thu; Thach, Tran Duc; Amstadter, Ananda B

    2013-10-30

    The association between trauma exposure and panic attacks has received increased attention over the past decade, with mounting evidence suggesting an overlapping etiologic pathway. This study examined the incidence of new onset panic attacks in 775 Vietnamese individuals in the 2-3 months following Typhoon Xangsane. Pre-typhoon (Wave 1) and post-typhoon (Wave 2) assessments were conducted, allowing for consideration of factors occurring prior to the typhoon in addition to typhoon-relevant responding. Of the 775 participants, 11.6% (n=90) met criteria for lifetime panic attack pre-typhoon and 2.8% (n=22) met post-typhoon panic attack criteria. Individuals with pre-typhoon panic were significantly older and reported less education compared to the no-panic group. Individuals in both panic groups were more likely to screen positive on a Wave1 psychiatric screening measure, endorse greater typhoon exposure and prior traumatic event exposure and were significantly more likely to meet DSM-IV criteria for posttraumatic stress disorder (PTSD) and major depression (MDD) post-typhoon compared with persons reporting no history of panic attacks. Pre and post-typhoon panic exhibited similar patterns across variables and both panic conditions were associated with the development of PTSD and MDD, suggesting that persons experiencing panic attacks may represent a vulnerable population in need of early intervention services. © 2013 Elsevier Ireland Ltd. All rights reserved.

  19. Characteristics of individuals meeting criteria for new onset panic attacks following exposure to a typhoon

    PubMed Central

    Roberson-Nay, Roxann; Berenz, Erin C.; Acierno, Ron; Tran, Trinh Luong; Trung, Lam Tu; Tam, Nguyen Thanh; Tuan, Tran; Buoi, La Thi; Ha, Tran Thu; Thach, Tran Duc; Amstadter, Ananda B.

    2013-01-01

    The association between trauma exposure and panic attacks has received increased attention over the past decade, with mounting evidence suggesting an overlapping etiologic pathway. This study examined the incidence of new onset panic attacks in 775 Vietnamese individuals in the 2–3 months following Typhoon Xangsane. Pre-typhoon (Wave 1) and post-typhoon (Wave 2) assessments were conducted, allowing for consideration of factors occurring prior to the typhoon in addition to typhoon-relevant responding. Of the 775 participants, 11.6% (n=90) met criteria for lifetime panic attack pre-typhoon and 2.8% (n=22) met post-typhoon panic attack criteria. Individuals with pre-typhoon panic were significantly older and reported less education compared to the no-panic group. Individuals in both panic groups were more likely to screen positive on a Wave1 psychiatric screening measure, endorse greater typhoon exposure and prior traumatic event exposure and were significantly more likely to meet DSM-IV criteria for posttraumatic stress disorder (PTSD) and major depression (MDD) post-typhoon compared with persons reporting no history of panic attacks. Pre and post-typhoon panic exhibited similar patterns across variables and both panic conditions were associated with the development of PTSD and MDD, suggesting that persons experiencing panic attacks may represent a vulnerable population in need of early intervention services. PMID:23778303

  20. Computational study on the attack of ·OH radicals on aromatic amino acids.

    PubMed

    Mujika, J I; Uranga, J; Matxain, J M

    2013-05-17

    The attack of hydroxyl radicals on aromatic amino acid side chains, namely phenylalanine, tyrosine, and tryptophan, have been studied by using density functional theory. Two reaction mechanisms were considered: 1) Addition reactions onto the aromatic ring atoms and 2) hydrogen abstraction from all of the possible atoms on the side chains. The thermodynamics and kinetics of the attack of a maximum of two hydroxyl radicals were studied, considering the effect of different protein environments at two different dielectric values (4 and 80). The obtained theoretical results explain how the radical attacks take place and provide new insight into the reasons for the experimentally observed preferential mechanism. These results indicate that, even though the attack of the first (·)OH radical on an aliphatic C atom is energetically favored, the larger delocalization and concomitant stabilization that are obtained by attack on the aromatic side chain prevail. Thus, the obtained theoretical results are in agreement with the experimental evidence that the aromatic side chain is the main target for radical attack and show that the first (·)OH radical is added onto the aromatic ring, whereas a second radical abstracts a hydrogen atom from the same position to obtain the oxidized product. Moreover, the results indicate that the reaction can be favored in the buried region of the protein. Copyright © 2013 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  1. Angular relationships regulate coordination tendencies of performers in attacker-defender dyads in team sports.

    PubMed

    Esteves, Pedro T; Araújo, Duarte; Vilar, Luís; Travassos, Bruno; Davids, Keith; Esteves, Carlos

    2015-04-01

    This study examined the continuous interpersonal interactions of performers in dyadic systems in team sports, as a function of changing information constraints. As a task vehicle, we investigated how attackers attained success in 1v1 sub-phases of basketball by exploring angular relations with immediate opponents and the basket. We hypothesized that angular relations would convey information for the attackers to dribble past defenders. Four basketball players performed as an attacker and defender in 1v1 sub-phases of basketball, in which the co-positioning and orientation of participants relative to the basket was manipulated. After video recording performance behaviors, we digitized participant movement displacement trajectories and categorized trials as successful or unsuccessful (from the attackers' viewpoint). Results revealed that, to successfully dribble past a defender, attackers tended to explore the left hand side of the space by defenders by increasing their angular velocity and decreasing their angular variability, especially in the center of the court. Interpersonal interactions and goal-achievement in attacker-defender dyads appear to have been constrained by the angular relations sustained between participants relative to the scoring target. Results revealed the functionality of exploratory behaviors of participants attempting re-align spatial relations with an opponent in 1v1 sub-phases of team games.

  2. Panic attacks 10 years after heart transplantation successfully treated with low-dose citalopram: a case report.

    PubMed

    Ye, Chenyu; Zhuang, Yamin; Ji, Jianlin; Chen, Hao

    2015-12-25

    Panic attacks are common among patients who have undergone heart transplantation, but there are no clinical guidelines for the treatment of panic attacks in this group of patients. This report describes a 22-year-old woman who experienced panic attacks 10 years after heart transplant surgery. The attacks started after she discovered that the average post-transplantation survival is 10 years. Treated with citalopram 10 mg/d, her symptoms improved significantly after 2 weeks and had completely resolved after 8 weeks. A positive physician-patient relationship with the doctors who regularly followed her medical condition was crucial to encouraging her to adhere to the treatment with citalopram. She continued taking the citalopram for 7 months without any adverse effects. When followed up 3 months after stopping the citalopram, she had had no recurrence of the panic attacks.

  3. Host preference and attack pattern of Dendroctonus rhizophagus (Coleoptera: Curculionidae: Scolytinae): a bark beetle specialist on pine regeneration.

    PubMed

    Sánchez-Martínez, Guillermo; Wagner, Michael R

    2009-08-01

    Pine seedlings and saplings are seldom attacked by bark beetles of the genus Dendroctonus. However, Dendroctonus rhizophagus (Coleoptera: Curculionidae: Scolytinae) Thomas and Bright specifically attacks pine seedlings and causes conspicuous mortality in naturally regenerated stands in the Sierra Madre Occidental, northern Mexico. We evaluated the host preference and attack of D. rhizophagus under field conditions. We tried to establish any relationship between tree growth or host size and the number of attacking beetles. Generally, only one pair of beetles attacked each of the seedlings regardless of host size; however, a significant positive linear relationship between host size and adult brood size was observed. We found that this species preferred the best growing seedlings in our study sites.

  4. Media participation and mental health in terrorist attack survivors.

    PubMed

    Thoresen, Siri; Jensen, Tine K; Dyb, Grete

    2014-12-01

    Terrorism and disasters receive massive media attention, and victims are often approached by reporters. Not much is known about how terror and disaster victims perceive the contact with media and whether such experiences influence mental health. In this study, we describe how positive and negative experiences with media relate to posttraumatic stress (PTS) reactions among survivors of the 2011 Utøya Island terrorist attack in Norway. Face-to-face interviews were conducted with 285 survivors (47.0% female and 53.0% male) 14-15 months after the terrorist attack. Most survivors were approached by reporters (94%), and participated in media interviews (88%). The majority of survivors evaluated their media contact and participation as positive, and media participation was unrelated to PTS reactions. Survivors who found media participation distressing had more PTS reactions (quite distressing: B = 0.440, extremely distressing: B = 0.611, p = .004 in adjusted model). Perceiving media participation as distressing was slightly associated with lower levels of social support (r = -.16, p = .013), and regretting media participation was slightly associated with feeling let down (r = .18, p = .004). Reporters should take care when interviewing victims, and clinicians should be aware of media exposure as a potential additional strain on victims.

  5. Correlation of forebody pressures and aircraft yawing moments on the X-29A aircraft at high angles of attack

    NASA Technical Reports Server (NTRS)

    Fisher, David F.; Richwine, David M.; Landers, Stephen

    1992-01-01

    In-flight pressure distributions at four fuselage stations on the forebody of the X-29A aircraft have been reported at angles of attack from 15 to 66 deg and at Mach numbers from 0.22 to 0.60. At angles of attack of 20 deg and higher, vortices shed from the nose strake caused suction peaks in the pressure distributions that generally increased in magnitude with angle of attack. Above 30 deg-angle of attack, the forebody pressure distributions became asymmetrical at the most forward station, while they remained nearly symmetrical until 50 to 55 deg-angle of attack for the aft stations. Between 59 to 66 deg-angle of attack, the asymmetry of the pressure distributions changed direction. Yawing moments for the forebody alone were obtained by integrating the forebody pressure distributions. At 45 deg-angle of attack, the aircraft yaws to the right and at 50 deg and higher, the aircraft yaws to the left. The forebody yawing moments correlated well with the aircraft left yawing moment at an angle of attack of 50 deg or higher. At a 45 deg-angle of attack, the forebody yawing moments did not correlate well with the aircraft yawing moment, but it is suggested that this was due to asymmetric pressures on the cockpit region of the fuselage which was not instrumented. The forebody was also shown to provide a positive component of directional stability of the aircraft at angles of attack of 25 deg or higher. A Mach number effect was noted at angles of attack of 30 deg or higher at the station where the nose strake was present. At this station, the suction peaks in the pressure distributions at the highest Mach number were reduced and much more symmetrical as compared to the lower Mach number pressure distributions.

  6. Rhode Island School Terrorist Attack Preparedness

    ERIC Educational Resources Information Center

    Dube, Michael W. M.

    2012-01-01

    This study examined the state of safety and terrorist attack preparedness in Rhode Island Schools as determined by Rhode Island school leader perceptions. The study is descriptive in nature as it gathers data to describe a particular event or situation. Using a researcher generated survey based on terrorist preparedness guidelines and suggestions…

  7. CASE STUDY: DIELDRIN ATTACK IN DALYAN LAGOON

    EPA Science Inventory

    During the first two weeks of December 2005, NATO sponsored an Advanced Study Institute (ASI) in Istanbul, Turkey. Part of this ASI involved a case study of a terrorist attack, where a chemical was assumed to be dumped into Sulunger Lake in Turkey. This chapter documents the re...

  8. Responses to the September 11, 2001 Attacks.

    ERIC Educational Resources Information Center

    Anderson, Frances E.

    2001-01-01

    This editorial introduces a special section devoted to chronicling the responses of art therapists after the September 11th attacks. The section contains 10 articles from therapists in New York City, New Jersey, Long Island, Washington, DC, and California. Articles include stories of the reactions of the therapists as well as their work with…

  9. Adversarial Feature Selection Against Evasion Attacks.

    PubMed

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  10. Plant defences against herbivore and insect attack

    USDA-ARS?s Scientific Manuscript database

    Plants deploy a number of defences against attack by insects and other herbivores. Direct defence is conferred by plant products and structures that deter or kill the herbivores. Chemical toxins and deterrents vary widely among plant species, and some typical toxins include alkaloids, terpenoids, st...

  11. Panic attacks after treatment with zuclopenthixol decanoate.

    PubMed

    Srivastava, Anil; Soni, Jorge

    2007-01-01

    The association between neuroleptics and anxiety is unclear: neuroleptics have been used to treat anxiety though may also themselves be anxiogenic. We present the case of a man who developed new onset panic attacks after treatment with zuclopenthixol decanoate, a commonly administered depot antipsychotic. We review the literature on the association between antipsychotics and anxiety and present possible pathophysiological mechanisms.

  12. Attack Classification Schema for Smart City WSNs

    PubMed Central

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2017-01-01

    Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN. PMID:28379192

  13. Prescribing patterns in agoraphobia with panic attacks.

    PubMed

    Evans, L E; Oei, T P; Hoey, H

    1988-01-18

    Although medication is used commonly in the treatment of agoraphobia with panic attacks, the actual drug-prescribing patterns of the medical profession have not been well studied in this condition. The present study compares the prescribing patterns of general practitioners and psychiatrists in their treatment of agoraphobia with panic attacks. The medical records of 111 agoraphobic patients with panic attacks were analysed and divided into those who were referred by general practitioners and those who were referred by psychiatrists. Over all, in the treatment of agoraphobia with panic attacks, general practitioners prescribed drugs less often than did psychiatrists. They used fewer combinations of drugs and tended to prescribe tricyclic antidepressant agents in doses which generally are considered to be below the therapeutic range. This finding would suggest that general practitioners are less effective than are psychiatrists in prescribing for this condition as judged by current practice, although they are less likely to prescribe combinations of drugs--a practice which might well be to their credit.

  14. Southern Pine Beetles Attack Felled Green Timber

    Treesearch

    John C. Moser; Robert A. Sommers; Peter L. Lorio; J. Robert Bridges; Jeffrey J. Witcosky

    1987-01-01

    Southern pine beetles attacked green, uninfested downed trees and logs, as well as nearby standing trees. Beetles infesting horizontal trees and decked logs reproduced sufficiently to indicate that in some circumstances freshly cut, green trees may provide a utilizable resource for beetle populations.

  15. Association between Terror Attacks and Suicide Attempts

    ERIC Educational Resources Information Center

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the…

  16. Rhode Island School Terrorist Attack Preparedness

    ERIC Educational Resources Information Center

    Dube, Michael W. M.

    2012-01-01

    This study examined the state of safety and terrorist attack preparedness in Rhode Island Schools as determined by Rhode Island school leader perceptions. The study is descriptive in nature as it gathers data to describe a particular event or situation. Using a researcher generated survey based on terrorist preparedness guidelines and suggestions…

  17. Shark Attack! Sinking Your Teeth into Anatomy.

    ERIC Educational Resources Information Center

    House, Herbert

    2002-01-01

    Presents a real life shark attack story and studies arm reattachment surgery to teach human anatomy. Discusses how knowledge of anatomy can be put to use in the real world and how the arm functions. Includes teaching notes and suggestions for classroom management. (YDS)

  18. Categorizing Network Attacks Using Pattern Classification Algorithms

    DTIC Science & Technology

    2002-03-01

    attacks into predefined categories such as Flooding Denial of Service, Distributed Denial of Service, Nukers, and Portscans . Such categorization decreases...Detection of Stealthy Portscans . Tech- nical Report, Silicon Defense, 2000. [Stevens94] Stevens, W. Richard. TCP/IP Illustrated Volume 1 . Reading: Addison

  19. CASE STUDY: DIELDRIN ATTACK IN DALYAN LAGOON

    EPA Science Inventory

    During the first two weeks of December 2005, NATO sponsored an Advanced Study Institute (ASI) in Istanbul, Turkey. Part of this ASI involved a case study of a terrorist attack, where a chemical was assumed to be dumped into Sulunger Lake in Turkey. This chapter documents the re...

  20. Shark Attack! Sinking Your Teeth into Anatomy.

    ERIC Educational Resources Information Center

    House, Herbert

    2002-01-01

    Presents a real life shark attack story and studies arm reattachment surgery to teach human anatomy. Discusses how knowledge of anatomy can be put to use in the real world and how the arm functions. Includes teaching notes and suggestions for classroom management. (YDS)

  1. Triage of casualties after nuclear attack.

    PubMed

    Pledger, H G

    1986-09-20

    Casualties from a nuclear attack on the United Kingdom would overwhelm the health services, and health workers would be faced with many more people seeking help than could be offered treatment. Discussion is needed to determine which methods of medical and non-medical triage would be acceptable and feasible.

  2. Association between Terror Attacks and Suicide Attempts

    ERIC Educational Resources Information Center

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the…

  3. Survival of child after lion attack

    PubMed Central

    Dabdoub, Carlos F.; Dabdoub, Carlos B.; Chavez, Mario; Molina, Felipe

    2013-01-01

    Background: Injuries to humans caused by attacks from large predators are very rare, especially in the United States, Europe, or Latin America. A few cases were reported on accidents in zoos or animal farms, being very uncommon in children. The purposes of this report include describing the case of a child who sustained an attack by a lion named “Bang-Bang”, which resulted in injuries to the head, chest, and abdomen, as well as the subsequent neurosurgical treatment and providing a review of the literature. Case Description: We report the case of an 8-year-old boy who was attacked by a lion during a circus show. The patient underwent an emergent neurosurgical procedure, including parietal craniectomy, cleaning, and extensive surgical debridement of the wounds. Despite open severe head trauma with brain damage as well as thorax and abdomen trauma, the child survived, with minimal neurological sequelae. Conclusions: Human injury resulting from encounters with nondomesticated animals is increasingly rising throughout the world. This case highlights the potentially violent and aggressive nature of wild mammals held in captivity. Unusual wild animal attacks and the complex injuries that result may pose a challenge to surgeons practicing in resource-limited settings. In this sense, the best treatment in the mentioned case is the prevention of human injuries by these animals. In addition, to attend to these infrequent cases, the authors emphasize the importance of a multidisciplinary approach to achieve the best cosmetic and functional results. PMID:23869277

  4. Intrusion-Tolerant Replication under Attack

    ERIC Educational Resources Information Center

    Kirsch, Jonathan

    2010-01-01

    Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…

  5. Intrusion-Tolerant Replication under Attack

    ERIC Educational Resources Information Center

    Kirsch, Jonathan

    2010-01-01

    Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…

  6. Improvement of Hungarian Joint Terminal Attack Program

    DTIC Science & Technology

    2013-06-13

    Forward Looking Infrared GLTD Ground Laser Target Designator HDF Hungarian Defense Force JFO Joint Fires Observer JTAC Joint Terminal Attack Controller......FLIR at least. Laser capability is another important material requirement for CAS aircraft. Laser systems contain two important components. A low

  7. Attack Classification Schema for Smart City WSNs.

    PubMed

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2017-04-05

    Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  8. Wrap-Attack Pack: Product Packaging Exercise

    ERIC Educational Resources Information Center

    Lee, Seung Hwan; Hoffman, K. Douglas

    2016-01-01

    Although many marketing courses discuss traditional concepts pertaining to product strategy, concepts specifically relating to packaging are often glossed over. This exercise, "Wrap-Attack Pack," teaches students about the utilitarian and hedonic design elements of packaging. More specifically, the primary objective is to creatively…

  9. Error and attack vulnerability of temporal networks

    NASA Astrophysics Data System (ADS)

    Trajanovski, S.; Scellato, S.; Leontiadis, I.

    2012-06-01

    The study of real-world communication systems via complex network models has greatly expanded our understanding on how information flows, even in completely decentralized architectures such as mobile wireless networks. Nonetheless, static network models cannot capture the time-varying aspects and, therefore, various temporal metrics have been introduced. In this paper, we investigate the robustness of time-varying networks under various failures and intelligent attacks. We adopt a methodology to evaluate the impact of such events on the network connectivity by employing temporal metrics in order to select and remove nodes based on how critical they are considered for the network. We also define the temporal robustness range, a new metric that quantifies the disruption caused by an attack strategy to a given temporal network. Our results show that in real-world networks, where some nodes are more dominant than others, temporal connectivity is significantly more affected by intelligent attacks than by random failures. Moreover, different intelligent attack strategies have a similar effect on the robustness: even small subsets of highly connected nodes act as a bottleneck in the temporal information flow, becoming critical weak points of the entire system. Additionally, the same nodes are the most important across a range of different importance metrics, expressing the correlation between highly connected nodes and those that trigger most of the changes in the optimal information spreading. Contrarily, we show that in randomly generated networks, where all the nodes have similar properties, random errors and intelligent attacks exhibit similar behavior. These conclusions may help us in design of more robust systems and fault-tolerant network architectures.

  10. A Case of Syncope Induced in the Supine Position

    PubMed Central

    Eguchi, Kazuo; Tsujita, Akihiro; Ono, Syoji; Kario, Kazuomi

    2011-01-01

    We experienced a reproducible supine syncope followed by upper abdominal pain. A 66-year-old man was transferred to our hospital after an episode of syncope during sleep. He had a history of acute pancreatitis, diabetes, hypertension, and dyslipidemia, but no history of presyncopal attack. One night, his wife noticed he was snoring abnormally in bed, and he did not respond to her voice until after she tried many times to wake him. The same attack was reproduced three times in the same situation. One of the attacks was recorded under a continuous ECG and radial tonometry. In this case, a presyncopal attack and a sense of ill-feeling were provoked by the patient lying in a prolonged supine position. He was eventually diagnosed as metastatic liver tumor 5 months after the first attack. Because few cases of syncopal attack have been reported in the supine position, its underlying mechanisms deserve consideration. PMID:21629866

  11. FLoc: Dependable Link Access for Legitimate Traffic in Flooding Attacks

    DTIC Science & Technology

    2011-11-23

    Constant Bit Rate (CBR), Shrew [14], and covert [15] attacks) and by comparing the FLoc results with those of other approaches (e.g., Pushback [5...Bit Rate (CBR) attack (Fig. 10 6(b)), and a Shrew attack (Fig. 6(c)) [6]. The aim of the high- population TCP attack is to reduce the bandwidth of...and are rate-limited accordingly. In the Shrew attack, each attack source sends 2.0 Mbps traffic only during 0.25RTT seconds within an interval of

  12. FLoc : Dependable Link Access for Legitimate Traffic in Flooding Attacks

    DTIC Science & Technology

    2011-11-23

    Constant Bit Rate (CBR), Shrew [14], and covert [15] attacks) and by comparing the FLoc results with those of other approaches (e.g., Pushback [5...Bit Rate (CBR) attack (Fig. 10 6(b)), and a Shrew attack (Fig. 6(c)) [6]. The aim of the high- population TCP attack is to reduce the bandwidth of...MTDs and are rate-limited accordingly. In the Shrew attack, each attack source sends 2.0 Mbps traffic only during 0.25RTT seconds within an interval of

  13. Vulnerability of impulse attack-free four random phase mask cryptosystems to chosen-plaintext attack

    NASA Astrophysics Data System (ADS)

    Li, Tuo; Shi, Yishi

    2016-03-01

    An attack-free four random phase mask cryptosystem is breached in the paper. The decryption key of the system can be easily accessed by the opponent by using a new type of powerful three-dimensional phase retrieval method. Our result, to the best of our knowledge, is the first work to show this security flaw in the attack-free four random phase mask cryptosystem. Meanwhile, a set of numerical simulations is provided to demonstrate the robustness of the presented method.

  14. Hope, Meaning, and Growth Following the September 11, 2001, Terrorist Attacks

    ERIC Educational Resources Information Center

    Ai, Amy; Cascio, Toni; Santangelo, Linda K.; Evans-Campbell, Teresa

    2005-01-01

    Positive psychologists found the increase of seven character strengths that encompass the so-called theological virtues, including hope and spirituality, in Americans after the September 11, 2001, attacks. Little is known about how they may affect post-September 11, 2001, mental health. Using multivariate analysis, this study investigated the…

  15. Optimal Attack Strategy in Random Scale-Free Networks Based on Incomplete Information

    NASA Astrophysics Data System (ADS)

    Li, Jun; Wu, Jun; Li, Yong; Deng, Hong-Zhong; Tan, Yue-Jin

    2011-06-01

    We introduce an attack model based on incomplete information, which means that we can obtain the information from partial nodes. We investigate the optimal attack strategy in random scale-free networks both analytically and numerically. We show that the attack strategy can affect the attack effect remarkably and the OAS can achieve better attack effect than other typical attack strategies. It is found that when the attack intensity is small, the attacker should attack more nodes in the “white area" in which we can obtain attack information; when the attack intensity is greater, the attacker should attack more nodes in the “black area" in which we can not obtain attack information. Moreover, we show that there is an inflection point in the curve of optimal attack proportion. For a given magnitude of attack information, the optimal attack proportion decreases with the attack intensity before the inflection point and then increases after the inflection point.

  16. CT Scans Might Help Gauge Heart Attack Risk

    MedlinePlus

    ... fullstory_167148.html CT Scans Might Help Gauge Heart Attack Risk Researchers aim to identify vulnerable patients before ... into irreversible plaque could potentially help cardiologists prevent heart attacks, the scientists said. "Currently, CT only tells you ...

  17. Calcium Supplements: A Risk Factor for Heart Attack?

    MedlinePlus

    ... that calcium supplements may increase the risk of heart attack. Is this true? Answers from Rekha Mankad, M. ... calcium supplements may increase your risk of a heart attack. Other doctors believe that calcium supplements have little ...

  18. Fatal First-Time Heart Attacks More Common in Blacks

    MedlinePlus

    ... gov/news/fullstory_167101.html Fatal First-Time Heart Attacks More Common in Blacks: Study Black men are ... likely than whites to die of a first heart attack, a new analysis suggests. Two out of three ...

  19. Aspirin to Prevent a First Heart Attack or Stroke

    MedlinePlus

    ... Share this page from the NHLBI on Twitter. Aspirin to Prevent a First Heart Attack or Stroke ... immediate medical attention. What if I’m taking aspirin to prevent another heart attack or stroke? The ...

  20. High Pain Tolerance Tied to 'Silent' Heart Attack Risk

    MedlinePlus

    ... 162666.html High Pain Tolerance Tied to 'Silent' Heart Attack Risk Unusual symptoms include upper back or jaw ... be at increased risk of having a "silent" heart attack, a new study hints. Chest pain is one ...

  1. Trans Fat Bans May Have Cut Heart Attack, Stroke Rate

    MedlinePlus

    ... 164605.html Trans Fat Bans May Have Cut Heart Attack, Stroke Rate Pending FDA regulations should remove nearly ... Could the contents of your cupcake affect your heart attack risk? It seems so, according to a new ...

  2. Calcium Buildup in Young Arteries May Signal Heart Attack Risk

    MedlinePlus

    ... html Calcium Buildup in Young Arteries May Signal Heart Attack Risk Even small amount in 30s, 40s appears ... their arteries are already at risk of a heart attack, a new study finds. Among those 32 to ...

  3. Nonlinear optical cryptosystem resistant to standard and hybrid attacks

    NASA Astrophysics Data System (ADS)

    Sinha, Aloka

    2016-06-01

    We propose a nonlinear optical cryptosystem that is resistant to amplitude-phase retrieval attacks, known-plaintext attack and chosen-plaintext attack. A squaring operation is introduced in the encryption path, which thwarts the iterative attacks. This nonlinear operation tends to amplify the error in the estimation during an iterative attack. The decryption process requires the use of a square-root operation. Thus, in the reverse path also, the attacks encounter the nonlinear square-root operation. These two nonlinearities make the iterative attacks unstable, thereby leading to non-convergence of the mean square error (MSE). Our technique is also resistant to hybrid attacks. The technique is general and is shown to work on a variety of images of the type grayscale and binary. Numerical simulation results corroborate the effectiveness of the proposed cryptosystem.

  4. Two fatal tiger attacks in zoos.

    PubMed

    Tantius, Britta; Wittschieber, Daniel; Schmidt, Sven; Rothschild, Markus A; Banaschak, Sibylle

    2016-01-01

    Two captive tiger attacks are presented that took place in Cologne and Münster zoos. Both attacks occurred when the handlers, intent on cleaning the enclosures, entered whilst the tigers accidently retained access to the location, and thus defended their territory against the perceived intruders. Both victims suffered fatal neck injuries from the bites. At Münster, colleagues managed to lure the tiger away from its victim to enable treatment, whilst the Cologne zoo tiger had to be shot in order to allow access to be gained. Whilst it was judged that human error led to the deaths of the experienced zookeepers, the investigation in Münster was closed as no third party was found to be at fault, whereas the Cologne zoo director was initially charged with being negligent. These charges were subsequently dismissed as safety regulations were found to be up to date.

  5. Identifying and treating patients with panic attacks.

    PubMed

    Pary, R; Lewis, S

    1992-09-01

    Panic disorder occurs in up to 3 percent of the population and can be socially, emotionally and occupationally disabling. A thorough clinical evaluation is crucial to exclude illnesses with similar presentations, particularly acute cardiac, gastrointestinal or neurologic disease. The noradrenergic nervous system is involved in panic attacks. These attacks are described as sudden, unexpected episodes of intense fear or discomfort, usually lasting five to 30 minutes. Appropriate medications include benzodiazepines, tricyclic antidepressants and monoamine oxidase inhibitors. Alprazolam and clonazepam are quickly effective in alleviating panic, but they cause significant symptoms upon discontinuation. The best-studied drug in the treatment of panic disorder is imipramine; like other tricyclic antidepressants, it can cause increased jitteriness early in treatment. Monoamine oxidase inhibitors may be particularly helpful in patients with panic disorder who exhibit social avoidance. Behavior therapy, an important component of treatment, involves the patient's confrontation of fears or phobias.

  6. Cell phone camera ballistics: attacks and countermeasures

    NASA Astrophysics Data System (ADS)

    Steinebach, Martin; Liu, Huajian; Fan, Peishuai; Katzenbeisser, Stefan

    2010-01-01

    Multimedia forensics deals with the analysis of multimedia data to gather information on its origin and authenticity. One therefore needs to distinguish classical criminal forensics (which today also uses multimedia data as evidence) and multimedia forensics where the actual case is based on a media file. One example for the latter is camera forensics where pixel error patters are used as fingerprints identifying a camera as the source of an image. Of course multimedia forensics can become a tool for criminal forensics when evidence used in a criminal investigation is likely to be manipulated. At this point an important question arises: How reliable are these algorithms? Can a judge trust their results? How easy are they to manipulate? In this work we show how camera forensics can be attacked and introduce a potential countermeasure against these attacks.

  7. Making MANET secured against malicious attack

    NASA Astrophysics Data System (ADS)

    Kush, Ashwani; Taneja, Sunil; Kush, Shagun

    2011-12-01

    A Mobile Adhoc Network (MANET) is characterized by mobile nodes, multihop wireless connectivity, infrastructureless environment and dynamic topology. A recent trend in Ad Hoc network routing is the reactive ondemand philosophy where routes are established only when required. Stable Routing is of major concern in Ad hoc routing. Security and Power efficiency are the major concerns in this field. This paper is an effort to use security to achieve more reliable routing. The ad hoc environment is accessible to both legitimate network users and malicious attackers. The proposed scheme is intended to incorporate security aspect on existing protocols. The study will help in making protocol more robust against attacks to achieve stable routing in routing protocols.

  8. Satellite Threat Warning and Attack Reporting

    SciTech Connect

    Hilland, D.; Phipps, G.; Jingle, C.; Newton, G.

    1997-12-31

    The Air Force Research Laboratory`s Satellite Threat Warning and Attack Reporting (STW/AR) program will provide technologies for advanced threat warning and reporting of radio frequency (RF) and laser threats. The STW/AR program objectives are: (a) develop cost- effective technologies to detect, identify, locate, characterize, and report attacks or interference against U.S. and Allied satellites. (b) demonstrate innovative, light-weight, low-power, laser and RF sensors. The program focuses on the demonstration of RF and laser sensors. The RF sensor effort includes the investigation of interferometric antenna arrays, multi-arm spiral and butler matrix antennas, wideband receivers, adaptive processors, and improved processing algorithms. The laser sensor effort includes the investigation of alternative detectors, broadband grating and optical designs, active pixel sensing, and improved processing algorithms.

  9. RISK DISCLOSURE AGAINST ATTACK ON CRITICAL INFRASTRUCTURES

    NASA Astrophysics Data System (ADS)

    Yoshida, Mamoru; Kobayashi, Kiyoshi

    This paper analyzes the government's defensive and disclosure strategies to reduce the damage caused by terrorists that attack critical infrastructures using subjective game theory. The government recognizes a terrorist as a hidden opponent and the government's decision making about the policies against terror attacks depends on the belief about the existence of terrorist. In addition, it is not necessarily true that the government and the terrorist play the common game and make their decisions. Considering these points, the paper formulates the model in which the government and the terrorist formulate the subjective games respectively, and they induce the strategies using the equilibriums of their subjective games. The paper concluded that the government's disclosure about the implementation of the countermeasure, rather than the disclosure of warning level related with the belief about the existence of terrorist, brings about the higher increment of the subjective payoffs of the government.

  10. America under attack: ACHE affiliates respond.

    PubMed

    Lanser, Ellen G

    2002-01-01

    In the midst of the horror and uncertainty that swept over America on September 11, the healthcare sector helped to keep our nation firmly anchored. Within moments of the terrorist attacks, healthcare organizations in New York, Washington, D.C., and the surrounding areas responded swiftly, calmly, and effectively. Many of these hospitals are led by ACHE affiliates. Following are their accounts of that day, lessons they learned, and plans for the future.

  11. Strategic Attack of National Electrical Systems

    DTIC Science & Technology

    1994-10-01

    subsystem the step-up transformers are the most lu­ crative targets. According to a study by the Office of Technology Assessment (OTA), the step-up...the Army Air Forces, to analyze the dete­ rioration of the German economy through bombing and determine the “date when deterioration will have...German economy , and steel production essential to war production, these industries would only be slightly affected by an attack on power facilities

  12. Computer Network Attack: An Operational Tool?

    DTIC Science & Technology

    2003-01-17

    Spectrum of Conflict, Cyber Warfare , Preemptive Strike, Effects Based Targeting. 15. Abstract: Computer Network Attack (CNA) is defined as...great deal of attention as the world’s capabilities in cyber - warfare grow. 11 Although addressing the wide ranging legal aspects of CNA is beyond the...the notion of cyber - warfare has not yet developed to the point that international norms have been established.15 These norms will be developed in

  13. Replication Does Survive Information Warfare Attacks

    DTIC Science & Technology

    1997-01-01

    warfare, storage jamming, unauthorized modification, Trojan horse 1 INTRODUCTION Ammann, Jajodia, McCollum, and Blaustein define information warfare as the...information warfare, and we adopt the latter term. To provide context, Amman et al. specifically do not consider Trojan horses within the database system...called internal jammers (McDermott and Goldschalg, 1996b)), but instead consider a wide range of attacks other than Trojan horses . Both groups agree that

  14. Armed Deterrence: Countering Soft Target Attacks

    DTIC Science & Technology

    2016-02-06

    for Reserve Officer Training Corps (ROTC) detachments because it provides a visual “deterrent” against soft target attacks. Further, if perceptual...deterrence should fail, an “open carry” firearms policy is most often the only viable means to stop (deny) an active shooter in order to safeguard...problem by first examining current terrorist trends and active shooters events, to include their motivations. The paper then exposes the hazards affecting

  15. Securing iris recognition systems against masquerade attacks

    NASA Astrophysics Data System (ADS)

    Galbally, Javier; Gomez-Barrero, Marta; Ross, Arun; Fierrez, Julian; Ortega-Garcia, Javier

    2013-05-01

    A novel two-stage protection scheme for automatic iris recognition systems against masquerade attacks carried out with synthetically reconstructed iris images is presented. The method uses different characteristics of real iris images to differentiate them from the synthetic ones, thereby addressing important security flaws detected in state-of-the-art commercial systems. Experiments are carried out on the publicly available Biosecure Database and demonstrate the efficacy of the proposed security enhancing approach.

  16. Baiting Inside Attackers using Decoy Documents

    DTIC Science & Technology

    2008-09-16

    viruses and worm attacks as the most reported security incident according to a report from the US Computer Security Institute (CSI) [20]. The annual...incidents were cited by 59 percent of respondents, while only 52 percent said they had encountered a conventional virus in the previous year. The state...their own legitimate credentials). One possible solution for masquerade detection involves anomaly detection [19]. In this approach, users actions are

  17. Word Attack Skills, "Making Phonics Reasonable."

    ERIC Educational Resources Information Center

    O'Brien, Patti Lynn

    A word attack program that begins with phonics and incorporates various aspects of a linguistics approach is described in this paper. Regardless of the material that is used, there are 13 consonant sounds which are easier to learn than others: b, d, j, f, k, p, t, l, m, n, r, v, and z. W and h would be introduced next because in isolation they…

  18. Trichobothrial mediation of an aquatic escape response: Directional jumps by the fishing spider, Dolomedes triton, foil frog attacks

    PubMed Central

    Suter, Robert. B.

    2003-01-01

    Fishing spiders (Pisauridae) frequent the surfaces of ponds and streams and thereby expose themselves to predation by a variety of aquatic and semi-aquatic vertebrates. To assess the possibility that the impressive jumps of fishing spiders from the water surface function in evading attacks by frogs, attacks by bullfrogs (Rana catesbiana) and green frogs (R. clamitans) on Dolomedes triton were studied. Both the attack dynamics of the frogs and the evasive behaviors of the spiders were recorded at 250 frames per second. A freeze-dried bullfrog, propelled toward spiders with acceleration, posture, and position that approximated the natural attack posture and dynamics, was used to assess the spiders' behavior. Qualitatively, the spiders responded to these mock-attacks just as they had to attacks by live frogs: jumping (N=29 jumps, 56.9% of instances), rearing the legs nearest the attacking frog (N=15, 29.4%), or showing no visible response (N=7, 13.7%). Spiders that jumped always did so away (in the vertical plane) from the attack (mean =137° vs. vertical at 90° or horizontally toward the frog at 0°). The involvement of the trichobothria (leg hairs sensitive to air movements), and the eyes as sensory mediators of the evasion response was assessed. Spiders with deactivated trichobothria were significantly impaired relative to intact and sham-deactivated spiders, and relative to spiders in total darkness. Thus, functional trichobothria, unlike the eyes, are both necessary and sufficient mediators of the evasion response. Measurements of air flow during frog attacks suggest that an exponential rise in flow velocity is the airborne signature of an attack. Abbreviation: a acceleration (m s−2) fps frames per second HS high-speed video v velocity (m s−1) PMID:15841235

  19. Comparison of Angle of Attack Measurements for Wind Tunnel Testing

    NASA Technical Reports Server (NTRS)

    Jones, Thomas, W.; Hoppe, John C.

    2001-01-01

    Two optical systems capable of measuring model attitude and deformation were compared to inertial devices employed to acquire wind tunnel model angle of attack measurements during the sting mounted full span 30% geometric scale flexible configuration of the Northrop Grumman Unmanned Combat Air Vehicle (UCAV) installed in the NASA Langley Transonic Dynamics Tunnel (TDT). The overall purpose of the test at TDT was to evaluate smart materials and structures adaptive wing technology. The optical techniques that were compared to inertial devices employed to measure angle of attack for this test were: (1) an Optotrak (registered) system, an optical system consisting of two sensors, each containing a pair of orthogonally oriented linear arrays to compute spatial positions of a set of active markers; and (2) Video Model Deformation (VMD) system, providing a single view of passive targets using a constrained photogrammetric solution whose primary function was to measure wing and control surface deformations. The Optotrak system was installed for this test for the first time at TDT in order to assess the usefulness of the system for future static and dynamic deformation measurements.

  20. Effect of target change during the simple attack in fencing.

    PubMed

    Gutiérrez-Dávila, Marcos; Rojas, F Javier; Caletti, Matteo; Antonio, Raquel; Navarro, Enrique

    2013-01-01

    The aim of this study was to test the effect that changing targets during a simple long lunge attack in fencing exerts on the temporal parameters of the reaction response, the execution speed, and the precision and the coordination of the movement pattern. Thirty fencers with more than 10 years of experience participated in this study. Two force platforms were used to record the horizontal components of the reaction forces and thereby to determine the beginning of the movement. A three-dimensional (3D) system recorded the spatial positions of the 9 markers situated on the fencer plus the epee, while a moving target was projected on a screen, enabling the control of the target change. The results indicated that when a target change is provoked the reaction time (RT), movement time (MT), and the time used in the acceleration phase of the centre of mass (CM) increases significantly with respect to the attack executed with a straight thrust. The speed and horizontal distance reached by the CM at the end of the acceleration phase (VX(CM) and SX(CM), respectively) significantly decreased, while the errors increased. However, the temporal sequence of the movement pattern did not appreciably change.

  1. Hereditary angioedema: management of laryngeal attacks.

    PubMed

    Christiansen, Sandra C; Zuraw, Bruce L

    2011-01-01

    Hereditary angioedema (HAE) patients suffering from laryngeal attacks in the United States faced severely limited treatment options until 2008. These potentially life-threatening episodes occur in over one-half of the patients affected by HAE during their lifetimes. Acute therapy had been relegated to supportive care, intubation, and consideration of fresh frozen plasma (FFP)--the latter with the potential for actually accelerating the speed and severity of the swelling. In this article we will review the recently approved and emerging HAE treatments that have evolved from the recognition that bradykinin generation is the fundamental abnormality leading to attacks of angioedema. Acute therapy for laryngeal attacks will be discussed including purified plasma-derived C1 inhibitor (C1INH), recombinant C1INH, an inhibitor of plasma kallikrein (ecallantide), and a B2 receptor antagonist (icatibant). Prophylactic care has also been transformed from a reliance on attenuated androgens with their attendant side effects to C1INH replacement. The arrival of these novel therapies promises to transform the future management of HAE.

  2. Fuzzy Expert System for Heart Attack Diagnosis

    NASA Astrophysics Data System (ADS)

    Hassan, Norlida; Arbaiy, Nureize; Shah, Noor Aziyan Ahmad; Afizah Afif@Afip, Zehan

    2017-08-01

    Heart attack is one of the serious illnesses and reported as the main killer disease. Early prevention is significant to reduce the risk of having the disease. The prevention efforts can be strengthen through awareness and education about risk factor and healthy lifestyle. Therefore the knowledge dissemination is needed to play role in order to distribute and educate public in health care management and disease prevention. Since the knowledge dissemination in medical is important, there is a need to develop a knowledge based system that can emulate human intelligence to assist decision making process. Thereby, this study utilized hybrid artificial intelligence (AI) techniques to develop a Fuzzy Expert System for Diagnosing Heart Attack Disease (HAD). This system integrates fuzzy logic with expert system, which helps the medical practitioner and people to predict the risk and as well as diagnosing heart attack based on given symptom. The development of HAD is expected not only providing expert knowledge but potentially become one of learning resources to help citizens to develop awareness about heart-healthy lifestyle.

  3. Security of quantum cryptography against individual attacks

    NASA Astrophysics Data System (ADS)

    Slutsky, Boris A.; Rao, Ramesh; Sun, Pang-Chen; Fainman, Y.

    1998-04-01

    An attempt to eavesdrop on a quantum cryptographic channel reveals itself through errors it inevitably introduces into the transmission. We investigate the relationship between the induced error rate and the maximum amount of information the eavesdropper can extract, in both the two-state B92 [B92 refers to the work of C. H. Bennett, Phys. Rev. Lett. 68, 3121 (1992)] and the four-state BB84 [BB84 refers to the work of C. H. Bennett and G. Brassard, in Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India (IEEE, New York, 1984), pp. 175-179] quantum cryptographic protocols. In each case, the optimal eavesdropping method that on average yields the most information for a given error rate is explicitly constructed. Analysis is limited to eavesdropping strategies where each bit of the quantum transmission is attacked individually and independently from other bits. Subject to this restriction, however, we believe that all attacks not forbidden by physical laws are covered. Unlike previous work, the eavesdropper's advantage is measured in terms of Renyi (rather than Shannon) information, and with respect only to bits received error-free by Bob (rather than all bits). This alters both the maximum extractable information and the optimal eavesdropping attack. The result can be used directly at the privacy amplification stage of the protocol to accomplish secure communication over a noisy channel.

  4. Major dog attack injuries in children.

    PubMed

    Wiseman, N E; Chochinov, H; Fraser, V

    1983-10-01

    Children are frequently admitted to a hospital with injuries sustained as a result of being attacked by a dog. Over a 5-year period (1977 to 1981), 57 such patients have been treated at the Winnipeg Children's Hospital. Half of the dog attack victims were 5 years or younger with injuries occurring more often in boys (55%). The majority of patients (95%) sustained puncture wounds and lacerations to the face (77%) and extremities (23%). In three of the cases, the dog attack victims presented with peritonitis secondary to bowel perforation and were treated successfully. A fourth child died as a result of his injuries prior to reaching the hospital. In the past, much attention has been focused on soft tissue injuries and their cosmetic repair. It is also important to recognize that the small child is particularly vulnerable to dog maulings from which the injuries sustained may be life threatening or lethal. Prevention seems to be the only rational approach to solving this problem.

  5. Smoking behaviour under intense terrorist attacks.

    PubMed

    Keinan-Boker, Lital; Kohn, Robert; Billig, Miriam; Levav, Itzhak

    2011-06-01

    Smoking is one of the varied psychological reactions to stress. This study examined the rate and changes in cigarette smoking among former Gaza and current West Bank Jewish settlers subjected to direct and indirect terrorist attacks during the Al-Aksa Intifada. The relationship with degree of religious observance and emotional distress was explored as well. In this cross-sectional study, the respondents were settlers randomly selected and interviewed by telephone (N = 706). The interview schedule included socio-demographic items, information on direct exposure to terrorist attacks (e.g. threat to life or physical integrity, personal losses, property damage) and on steady and changes in smoking habits, and a scale to measure emotional distress. In contrast with the country population, a larger percentage of settlers who smoked increased the number of cigarettes consumed with exposure to terrorism (10 and 27%, respectively). Respondents who were injured or had their home damaged reported a higher rate of smoking during the preceding year (30 and 20%, respectively). Emotional distress was related to cigarette smoking, but not in the controlled analysis. Religious observance had no effect. Direct or indirect exposure to terrorist attacks had an impact on smoking prevalence rates and on changes in smoking habits. Studies investigating reactions to traumatic events should include a detailed section on smoking while mental health interventions should address the needs of smokers.

  6. Cryptogenic Drop Attacks: An Affliction of Women

    PubMed Central

    Stevens, D. L.; Matthews, W. B.

    1973-01-01

    A drop attack was defined as falling without warning, not apparently due to any malfunction of the legs, not induced by change of posture or movement of the head, and not accompanied by vertigo or other cephalic sensation. All 33 patients attending a neurological clinic with a primary complaint fulfilling these criteria were women, and a further seven examples were found by questioning 200 consecutive patients at a gynaecological clinic. No affected male was found. In all but one patient, falls occurred only when walking. They were not due to wearing high-heeled shoes. The average age at onset was 44·5 years and in younger women onset was often during pregnancy. The accepted causes of drop attacks were not found with certainty in any of these patients. The sex incidence and the circumstances of the falls suggest that the cause may lie in differences between the two sexes in the mechanism of walking rather than in any central disturbance. Drop attacks in women commonly occur as an isolated symptom for many years, and although distressing have no serious prognostic implications. PMID:4689829

  7. Enhancing network robustness against malicious attacks.

    PubMed

    Zeng, An; Liu, Weiping

    2012-06-01

    In a recent work [Schneider et al., Proc. Natl. Acad. Sci. USA 108, 3838 (2011)], the authors proposed a simple measure for network robustness under malicious attacks on nodes. Using a greedy algorithm, they found that the optimal structure with respect to this quantity is an onion structure in which high-degree nodes form a core surrounded by rings of nodes with decreasing degree. However, in real networks the failure can also occur in links such as dysfunctional power cables and blocked airlines. Accordingly, complementary to the node-robustness measurement (R(n)), we propose a link-robustness index (R(l)). We show that solely enhancing R(n) cannot guarantee the improvement of R(l). Moreover, the structure of an R(l)-optimized network is found to be entirely different from that of an onion network. In order to design robust networks that are resistant to a more realistic attack condition, we propose a hybrid greedy algorithm that takes both the R(n) and R(l) into account. We validate the robustness of our generated networks against malicious attacks mixed with both nodes and links failure. Finally, some economical constraints for swapping the links in real networks are considered, and significant improvement in both aspects of robustness is still achieved.

  8. Enhancing network robustness against malicious attacks

    NASA Astrophysics Data System (ADS)

    Zeng, An; Liu, Weiping

    2012-06-01

    In a recent work [Schneider , Proc. Natl. Acad. Sci. USAPNASA60027-842410.1073/pnas.1009440108 108, 3838 (2011)], the authors proposed a simple measure for network robustness under malicious attacks on nodes. Using a greedy algorithm, they found that the optimal structure with respect to this quantity is an onion structure in which high-degree nodes form a core surrounded by rings of nodes with decreasing degree. However, in real networks the failure can also occur in links such as dysfunctional power cables and blocked airlines. Accordingly, complementary to the node-robustness measurement (Rn), we propose a link-robustness index (Rl). We show that solely enhancing Rn cannot guarantee the improvement of Rl. Moreover, the structure of an Rl-optimized network is found to be entirely different from that of an onion network. In order to design robust networks that are resistant to a more realistic attack condition, we propose a hybrid greedy algorithm that takes both the Rn and Rl into account. We validate the robustness of our generated networks against malicious attacks mixed with both nodes and links failure. Finally, some economical constraints for swapping the links in real networks are considered, and significant improvement in both aspects of robustness is still achieved.

  9. What Can We Learn?--The Algonquin Bear Attack.

    ERIC Educational Resources Information Center

    Strickland, Dan

    1992-01-01

    Describes a bear attack in Algonquin Park in Lake Opeongo (Canada) in which a man and woman were killed. Hypothesizes that the bear deliberately preyed on its victims and concludes that the bear was physically normal. Despite this isolated attack, the chance of being attacked by a black bear when camping is virtually nonexistent. (KS)

  10. Douglas-fir beetle attack and tree mortality following wildfire

    Treesearch

    Sharon M. Hood; Barbara Bentz; Kevin C. Ryan

    2003-01-01

    A major concern after wildfires is the buildup of bark beetle populations in fire injured trees, and subsequent attack and population buildup in adjacent unburned areas. To examine this concern, we documented fire injury and insect attacks in Douglas-fir (Pseudotsuga menziesii) on the 2001 Green Knoll Fire, Wyoming to determine attack preferences, brood production, and...

  11. Early Warning and Prediction of Interest Attacks and Exploits

    DTIC Science & Technology

    2005-09-01

    EARLY WARNING AND PREDICTION OF INTERNET ATTACKS AND EXPLOITS THESIS Brian P. Zeitz... EARLY WARNING AND PREDICTION OF INTERNET ATTACKS AND EXPLOITS THESIS Presented to the Faculty Department of Electrical and Computer...RELEASE; DISTRIBUTION UNLIMITED iv AFIT/GIA/ENG/05-06 EARLY WARNING AND PREDICTION OF INTERNET ATTACKS AND EXPLOITS

  12. What Can We Learn?--The Algonquin Bear Attack.

    ERIC Educational Resources Information Center

    Strickland, Dan

    1992-01-01

    Describes a bear attack in Algonquin Park in Lake Opeongo (Canada) in which a man and woman were killed. Hypothesizes that the bear deliberately preyed on its victims and concludes that the bear was physically normal. Despite this isolated attack, the chance of being attacked by a black bear when camping is virtually nonexistent. (KS)

  13. Impact of panic attacks on quality of life among patients with schizophrenia.

    PubMed

    Ulaş, Halis; Polat, Selma; Akdede, Berna Binnur; Alptekin, Köksal

    2010-10-01

    Schizophrenia patients had decreased levels of quality of life compared to normal population. The aim of this study was to investigate the impact of panic attacks on quality of life in patients with schizophrenia. Eighty-eight patients with schizophrenia and 85 healthy subjects were included in the study. World Health Organization Quality of Life Instrument-Short Form (WHOQOL-Bref) was given to patients and healthy subjects to assess quality of life. Panic module of Structured Clinical Interview for DSM-IV (SCID) was administered to patients for diagnosis of panic attacks and panic disorder. Positive and Negative Syndrome Scale (PANSS) for symptom severity and Calgary Depression Scale (CDS) for depressive symptoms were administered to the patients. Patients with schizophrenia demonstrated significantly lower scores compared to healthy controls in all domains of WHOQOL-Bref. Twenty-five patients (28.4%) with schizophrenia had panic attacks (PA) and 10 patients (11.4%) met criteria for panic disorder (PD). Schizophrenia patients with PA had significantly lower scores on psychological domain of WHOQOL-Bref compared to the patients without PA. Schizophrenic patients with panic attacks had higher CDS scores than patients without PA. In the multivariate regression analyses the variance in psychological domain of WHOQOL-Bref was explained by depression rather than panic attack. In patients with schizophrenia comorbid panic attacks may have a negative impact on quality of life, which is associated with depression significantly. Panic attacks and depressive symptomatology must be examined comprehensively in order to improve quality of life in patients with schizophrenia. Copyright © 2010 Elsevier Inc. All rights reserved.

  14. Nocturnal attacks, emergency room visits and ICU admission of pediatric asthma: frequency and associated factors.

    PubMed

    El-Saify, Magda Y; Shaheen, Malak A; Sabbour, Sahar M; Basal, Ahmed A

    2008-01-01

    Asthma is the most frequent cause of chronic illness in childhood and emergency department visits. This study aims to determine the frequency of emergency room (ER) visits, intensive care unit (ICU) admission, and nocturnal attacks among asthmatic children and to identify associated factors. Records of asthmatic children in the pediatric chest clinic, Ain Shams University during 1995-2004 were reviewed. Asthmatic children with documents of ER visits, ICU admission, or nocturnal attacks were compared with asthmatic children without previously mentioned events. Out of 691 asthmatic patients, 302 (43.7%) had nocturnal attacks, 258 (37.3%) had emergency room visits, 39 (5.6%) were admitted to ICU, and 249 (36%) had no reports of previous events. ER visits and nocturnal attacks were more in children above 4 years. ER visits and ICU admission were higher among those with positive family history of asthma (p< 0.01), those exposed to environmental tobacco smoke (ETS) (p< 0.01), and those who had previous respiratory infections (p< 0.05). Attacks of nocturnal asthma were associated with the previous factors in addition to animal contact (p<0. 01) and living in bad housing conditions (p<0.05). Logistic regression showed that family history (OR= 2.87, CI= 1.9-4.1) and bad housing conditions (OR= 2.65, CI= 1.3-5.3) were the significant factors for ER visits, while respiratory infections (OR= 5.24, CI= 2.1-12.0) and family history (OR= 3.48 CI, 1.3-9.2) were the significant factors for ICU admission. For nocturnal attacks, all factors were significant. Control of respiratory infections, limitation of ETS exposure and good housing conditions are needed to limit severe asthmatic attacks.

  15. Robust multiple frequency multiple power localization schemes in the presence of multiple jamming attacks

    PubMed Central

    2017-01-01

    Localization of the wireless sensor network is a vital area acquiring an impressive research concern and called upon to expand more with the rising of its applications. As localization is gaining prominence in wireless sensor network, it is vulnerable to jamming attacks. Jamming attacks disrupt communication opportunity among the sender and receiver and deeply impact the localization process, leading to a huge error of the estimated sensor node position. Therefore, detection and elimination of jamming influence are absolutely indispensable. Range-based techniques especially Received Signal Strength (RSS) is facing severe impact of these attacks. This paper proposes algorithms based on Combination Multiple Frequency Multiple Power Localization (C-MFMPL) and Step Function Multiple Frequency Multiple Power Localization (SF-MFMPL). The algorithms have been tested in the presence of multiple types of jamming attacks including capture and replay, random and constant jammers over a log normal shadow fading propagation model. In order to overcome the impact of random and constant jammers, the proposed method uses two sets of frequencies shared by the implemented anchor nodes to obtain the averaged RSS readings all over the transmitted frequencies successfully. In addition, three stages of filters have been used to cope with the replayed beacons caused by the capture and replay jammers. In this paper the localization performance of the proposed algorithms for the ideal case which is defined by without the existence of the jamming attack are compared with the case of jamming attacks. The main contribution of this paper is to achieve robust localization performance in the presence of multiple jamming attacks under log normal shadow fading environment with a different simulation conditions and scenarios. PMID:28493977

  16. Systematic Poisoning Attacks on and Defenses for Machine Learning in Healthcare.

    PubMed

    Mozaffari-Kermani, Mehran; Sur-Kolay, Susmita; Raghunathan, Anand; Jha, Niraj K

    2015-11-01

    Machine learning is being used in a wide range of application domains to discover patterns in large datasets. Increasingly, the results of machine learning drive critical decisions in applications related to healthcare and biomedicine. Such health-related applications are often sensitive, and thus, any security breach would be catastrophic. Naturally, the integrity of the results computed by machine learning is of great importance. Recent research has shown that some machine-learning algorithms can be compromised by augmenting their training datasets with malicious data, leading to a new class of attacks called poisoning attacks. Hindrance of a diagnosis may have life-threatening consequences and could cause distrust. On the other hand, not only may a false diagnosis prompt users to distrust the machine-learning algorithm and even abandon the entire system but also such a false positive classification may cause patient distress. In this paper, we present a systematic, algorithm-independent approach for mounting poisoning attacks across a wide range of machine-learning algorithms and healthcare datasets. The proposed attack procedure generates input data, which, when added to the training set, can either cause the results of machine learning to have targeted errors (e.g., increase the likelihood of classification into a specific class), or simply introduce arbitrary errors (incorrect classification). These attacks may be applied to both fixed and evolving datasets. They can be applied even when only statistics of the training dataset are available or, in some cases, even without access to the training dataset, although at a lower efficacy. We establish the effectiveness of the proposed attacks using a suite of six machine-learning algorithms and five healthcare datasets. Finally, we present countermeasures against the proposed generic attacks that are based on tracking and detecting deviations in various accuracy metrics, and benchmark their effectiveness.

  17. Modeling inter-signal arrival times for accurate detection of CAN bus signal injection attacks

    SciTech Connect

    Moore, Michael Roy; Bridges, Robert A; Combs, Frank L; Starr, Michael S; Prowell, Stacy J

    2017-01-01

    Modern vehicles rely on hundreds of on-board electronic control units (ECUs) communicating over in-vehicle networks. As external interfaces to the car control networks (such as the on-board diagnostic (OBD) port, auxiliary media ports, etc.) become common, and vehicle-to-vehicle / vehicle-to-infrastructure technology is in the near future, the attack surface for vehicles grows, exposing control networks to potentially life-critical attacks. This paper addresses the need for securing the CAN bus by detecting anomalous traffic patterns via unusual refresh rates of certain commands. While previous works have identified signal frequency as an important feature for CAN bus intrusion detection, this paper provides the first such algorithm with experiments on five attack scenarios. Our data-driven anomaly detection algorithm requires only five seconds of training time (on normal data) and achieves true positive / false discovery rates of 0.9998/0.00298, respectively (micro-averaged across the five experimental tests).

  18. [Malaria attack: a difficult diagnosis in a region of high Plasmodium falciparum endemicity].

    PubMed

    Carme, B; Yombi, B; Plassart, H

    1989-01-01

    The diagnosis of malaria attack in regions for highly endemic P. falciparum is difficult. It is more so since the wide use of antimalarials by the infected populations and the spread of drug resistance. A positive test is not evidence for a malarial attack since in certain schools, in both rural regions and in some districts of big towns, over 3/4 of the children attending school are carriers of Plasmodium. On the other hand, true attacks, even severe forms, can occur without evidence of parasitaemia. The parasitic load is thus an important factor but the following must be taken into consideration: age, level of immunity, the extent of transmission and whether if is continuous or not, self medication and the initial systematic treatments, the possibility of drug resistance, ... The difficulties are illustrated by data collected in the Congo.

  19. Attributing heart attack and stroke to "Old Age": Implications for subsequent health outcomes among older adults.

    PubMed

    Stewart, Tara L; Chipperfield, Judith G; Perry, Raymond P; Hamm, Jeremy M

    2016-01-01

    This study assessed the extent to which older adults attribute a recent heart attack/stroke to "old age," and examined consequences for subsequent lifestyle behavior and health-care service utilization. Community-dwelling adults (N = 57, ages 73-98 years) were interviewed about their heart attack/stroke, and an objective health registry provided data on health-care utilization over a 3-year period. Endorsement of "old age" as a cause of heart attack/stroke negatively predicted lifestyle behavior change, and positively predicted frequency of physician visits and likelihood of hospitalization over the subsequent 3 years. Findings suggest the importance of considering "old age" attributions in the context of cardiovascular health events. © The Author(s) 2014.

  20. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    SciTech Connect

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that determine whether a terrorist

  1. Formation of asymmetric separated flow past slender bodies of revolution at large angles of attack

    NASA Technical Reports Server (NTRS)

    Goman, M. G.; Khrabrov, A. N.

    1986-01-01

    The paper examines the problem of determining stationary positions of pairs of vortices of unequal intensity in the flow behind a cylinder modeling the axisymmetric separated flow past a slender body at large angles of attack. The possible asymmetric stationary positions of two vortices are calculated, and their stability with respect to small perturbations is determined. Bifurcations of the flow field with changes in vortex intensity are analyzed.

  2. Trojan-horse attacks threaten the security of practical quantum cryptography

    NASA Astrophysics Data System (ADS)

    Jain, Nitin; Anisimova, Elena; Khan, Imran; Makarov, Vadim; Marquardt, Christoph; Leuchs, Gerd

    2014-12-01

    A quantum key distribution (QKD) system may be probed by an eavesdropper Eve by sending in bright light from the quantum channel and analyzing the back-reflections. We propose and experimentally demonstrate a setup for mounting such a Trojan-horse attack. We show it in operation against the quantum cryptosystem Clavis2 from ID Quantique, as a proof-of-principle. With just a few back-reflected photons, Eve discerns Bob's (secret) basis choice, and thus the raw key bit in the Scarani-Acín-Ribordy-Gisin 2004 protocol, with higher than 90% probability. This would clearly breach the security of the cryptosystem. Unfortunately, Eve's bright pulses have a side effect of causing a high level of afterpulsing in Bob's single-photon detectors, resulting in a large quantum bit error rate that effectively protects this system from our attack. However, in a Clavis2-like system equipped with detectors with less-noisy but realistic characteristics, an attack strategy with positive leakage of the key would exist. We confirm this by a numerical simulation. Both the eavesdropping setup and strategy can be generalized to attack most of the current QKD systems, especially if they lack proper safeguards. We also propose countermeasures to prevent such attacks.

  3. In-blade angle of attack measurement and comparison with models

    NASA Astrophysics Data System (ADS)

    Gallant, T. E.; Johnson, D. A.

    2016-09-01

    The torque generated by a wind turbine blade is dependent on several parameters, one of which is the angle of attack. Several models for predicting the angle of attack in yawed conditions have been proposed in the literature, but there is a lack of experimental data to use for direct validation. To address this problem, experiments were conducted at the University of Waterloo Wind Generation Research Facility using a 3.4 m diameter test turbine. A five-hole pressure probe was installed in a modular 3D printed blade and was used to measure the angle of attack, a, as a function of several parameters. Measurements were conducted at radial positions of r/R = 0.55 and 0.72 at tip speed ratios of λ = 5.0, 3.6, and 3.1. The yaw offset of the turbine was varied from -15° to +15°. Experimental results were compared directly to angle of attack values calculated using a model proposed by Morote in 2015. Modeled values were found to be in close agreement with the experimental results. The angle of attack was shown to vary cyclically in the yawed case while remaining mostly constant when aligned with the flow, as expected. The quality of results indicates the potential of the developed instrument for wind turbine measurements.

  4. Association between serum levels of homocysteine with characteristics of migraine attacks in migraine with aura.

    PubMed

    Sadeghi, Omid; Maghsoudi, Zahra; Askari, Gholamreza; Khorvash, Fariborz; Feizi, Awat

    2014-11-01

    Evidences have shown that migraine with aura (MA) is associated with elevated homocysteine levels but, few studies have evaluated the relationship between homocysteine levels and characteristics of migraine attacks such as severity, frequency, duration and headache diary result (HDR). Thus, in this study, we investigated the association between homocysteine levels and characteristics of migraine attacks in patients with MA. This cross-sectional study was carried out in Isfahan city, Iran, in February 2013. Fasting serum levels of homocysteine were measured in 130 MA patients (31 males and 99 females) aged 15-60 years. Severity, frequency and duration of migraine attacks, as well as HDR, were determined in each patient according to international headache society criteria by a neurologist. Linear and ordinal logistic regression tests were used to evaluate the relationship between serum homocysteine levels and characteristics of migraine attacks. There is no significant association between serum levels of homocysteine with severity, frequency, duration and HDR. This association was not significant after adjustment of confounding variables such as age, body mass index (BMI) and family history of migraine. However, serum homocysteine levels were significantly associated with HDR among males after adjustment for age, BMI and family history of migraine (P = 0.01). Significant relationship between homocysteine levels and characteristics of migraine attacks such as severity, frequency, duration and HDR were not found. However, after adjustment of confounding variables, we found a significant positive relationship between homocysteine levels and HDR among men.

  5. On the routing protocol influence on the resilience of wireless sensor networks to jamming attacks.

    PubMed

    Del-Valle-Soto, Carolina; Mex-Perera, Carlos; Monroy, Raul; Nolazco-Flores, Juan Arturo

    2015-03-27

    In this work, we compare a recently proposed routing protocol, the multi-parent hierarchical (MPH) protocol, with two well-known protocols, the ad hoc on-demand distance vector (AODV) and dynamic source routing (DSR). For this purpose, we have developed a simulator, which faithfully reifies the workings of a given protocol, considering a fixed, reconfigurable ad hoc network given by the number and location of participants, and general network conditions. We consider a scenario that can be found in a large number of wireless sensor network applications, a single sink node that collects all of the information generated by the sensors. The metrics used to compare the protocols were the number of packet retransmissions, carrier sense multiple access (CSMA) inner loop retries, the number of nodes answering the queries from the coordinator (sink) node and the energy consumption. We tested the network under ordinary (without attacks) conditions (and combinations thereof) and when it is subject to different types of jamming attacks (in particular, random and reactive jamming attacks), considering several positions for the jammer. Our results report that MPH has a greater ability to tolerate such attacks than DSR and AODV, since it minimizes and encapsulates the network segment under attack. The self-configuring capabilities of MPH derived from a combination of a proactive routes update, on a periodic-time basis, and a reactive behavior provide higher resilience while offering a better performance (overhead and energy consumption) than AODV and DSR, as shown in our simulation results.

  6. On the Routing Protocol Influence on the Resilience of Wireless Sensor Networks to Jamming Attacks

    PubMed Central

    Del-Valle-Soto, Carolina; Mex-Perera, Carlos; Monroy, Raul; Nolazco-Flores, Juan Arturo

    2015-01-01

    In this work, we compare a recently proposed routing protocol, the multi-parent hierarchical (MPH) protocol, with two well-known protocols, the ad hoc on-demand distance vector (AODV) and dynamic source routing (DSR). For this purpose, we have developed a simulator, which faithfully reifies the workings of a given protocol, considering a fixed, reconfigurable ad hoc network given by the number and location of participants, and general network conditions. We consider a scenario that can be found in a large number of wireless sensor network applications, a single sink node that collects all of the information generated by the sensors. The metrics used to compare the protocols were the number of packet retransmissions, carrier sense multiple access (CSMA) inner loop retries, the number of nodes answering the queries from the coordinator (sink) node and the energy consumption. We tested the network under ordinary (without attacks) conditions (and combinations thereof) and when it is subject to different types of jamming attacks (in particular, random and reactive jamming attacks), considering several positions for the jammer. Our results report that MPH has a greater ability to tolerate such attacks than DSR and AODV, since it minimizes and encapsulates the network segment under attack. The self-configuring capabilities of MPH derived from a combination of a proactive routes update, on a periodic-time basis, and a reactive behavior provide higher resilience while offering a better performance (overhead and energy consumption) than AODV and DSR, as shown in our simulation results. PMID:25825979

  7. Attack or retreat: contrasted defensive tactics used by Cyprian honeybee colonies under attack from hornets.

    PubMed

    Papachristoforou, Alexandros; Rortais, Agnès; Sueur, Jérôme; Arnold, Gérard

    2011-02-01

    This study describes the tactics used by Cyprian honeybees (Apis mellifera cypria) to defend their colonies against hornet (Vespa orientalis orientalis) attacks. We use simulated hornet attacks and a combination of video recordings and image analysis to reveal, for the first time, contrasted intra-subspecies defensive tactics that operate at the colony level during predation. In some colonies, when attacked, the numbers of guards at the hive entrance increases rapidly to attack, engulf, and kill invading hornets. In other colonies, guards avoid conflicts with hornets by retreating gradually and by forming a defensive line of honeybees at the hive entrance. Retreater colonies have propolis walls at the hive entrances with small apertures that are too narrow to allow the hornet to access the hive and that therefore reinforces entrance protection. On the contrary, attacker colonies have propolis walls with large openings through which the hornet can pass; these bees block the hornet's access by intensively guarding the hive entrance. We experimentally destroy propolis walls to test whether colonies consistently rebuild walls with the same intrinsic characteristics and we also monitor the survival rate of each anti-predator tactic after massive natural predation by hornets.

  8. A Common Fold Mediates Vertebrate Defense and Bacterial Attack

    SciTech Connect

    Rosado, Carlos J.; Buckle, Ashley M.; Law, Ruby H.P.; Butcher, Rebecca E.; Kan, Wan-Ting; Bird, Catherina H.; Ung, Kheng; Browne, Kylie A.; Baran, Katherine; Bashtannyk-Puhalovich, Tanya A.; Faux, Noel G.; Wong, Wilson; Porter, Corrine J.; Pike, Robert N.; Ellisdon, Andrew M.; Pearce, Mary C.; Bottomley, Stephen P.; Emsley, Jonas; Smith, A. Ian; Rossjohn, Jamie; Hartland, Elizabeth L.; Voskoboinik, Ilia; Trapani, Joseph A.; Bird, Phillip I.; Dunstone, Michelle A.; Whisstock, James C.

    2008-10-02

    Proteins containing membrane attack complex/perforin (MACPF) domains play important roles in vertebrate immunity, embryonic development, and neural-cell migration. In vertebrates, the ninth component of complement and perforin form oligomeric pores that lyse bacteria and kill virus-infected cells, respectively. However, the mechanism of MACPF function is unknown. We determined the crystal structure of a bacterial MACPF protein, Plu-MACPF from Photorhabdus luminescens, to 2.0 angstrom resolution. The MACPF domain reveals structural similarity with poreforming cholesterol-dependent cytolysins (CDCs) from Gram-positive bacteria. This suggests that lytic MACPF proteins may use a CDC-like mechanism to form pores and disrupt cell membranes. Sequence similarity between bacterial and vertebrate MACPF domains suggests that the fold of the CDCs, a family of proteins important for bacterial pathogenesis, is probably used by vertebrates for defense against infection.

  9. Usefulness of chest radiographs in first asthma attacks

    SciTech Connect

    Gershel, J.C.; Goldman, H.S.; Stein, R.E.K.; Shelov, S.P.; Ziprkowski, M.

    1983-08-11

    To assess the value of routine chest radiography during acute first attacks of asthma, we studied 371 consecutive children over one year of age who presented with an initial episode of wheezing. Three hundred fifty children (94.3%) had radiographic findings that were compatible with uncomplicated asthma and were considered negative. Twenty-one (5.7%) had positive findings: atelectasis and pneumonia were noted in seven, segmental atelectasis in six, pneumonia in five, multiple areas of subsegmental atelectasis in two, and pneumomediastinum in one. The patients with positive films were more likely to have a respiratory rate above 60 or a pulse rate above 160 (P < 0.001), localized rales or localized decreased breath sounds before treatment (P < 0.01), and localized rales (P < 0.005) and localized wheezing (P < 0.02) after treatment; also, these patients were admitted to the hospital more often (P < 0.001). Ninety-five percent (20 of 21) of the children with positive films could be identified before treatment on the basis of a combination of tachypnea, tachycardia, fever, and localized rales or localized decreased breath sounds. Most first-time wheezers will not have positive radiographs; careful clinical evaluation should reveal which patients will have abnormal radiographs and will therefore benefit from the procedure. 20 references, 3 tables.

  10. Hybrid attacks on model-based social recommender systems

    NASA Astrophysics Data System (ADS)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  11. Web Forms and Untraceable DDoS Attacks

    NASA Astrophysics Data System (ADS)

    Jakobsson, Markus; Menczer, Filippo

    We analyze a Web vulnerability that allows an attacker to perform an email-based attack on selected victims, using standard scripts and agents. What differentiates the attack we describe from other, already known forms of distributed denial of service (DDoS) attacks is that an attacker does not need to infiltrate the network in any manner - as is normally required to launch a DDoS attack. Thus, we see this type of attack as a poor man's DDoS. Not only is the attack easy to mount, but it is also almost impossible to trace back to the perpetrator. Along with descriptions of our attack, we demonstrate its destructive potential with (limited and contained) experimental results. We illustrate the potential impact of our attack by describing how an attacker can disable an email account by flooding its inbox; block competition during on-line auctions; harm competitors with an on-line presence; disrupt phone service to a given victim; disconnect mobile corporate leaders from their networks; and disrupt electronic elections. Finally, we propose a set of countermeasures that are light-weight, do not require modifications to the infrastructure, and can be deployed in a gradual manner.

  12. Machine Learning Methods for Attack Detection in the Smart Grid.

    PubMed

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  13. Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks

    PubMed Central

    Li, Jiguo

    2014-01-01

    Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. We show that an existing certificate-based signcryption scheme is insecure in our model. We also propose a new certificate-based signcryption scheme that achieves security against both public key replacement attacks and insider attacks. We prove in the random oracle model that the proposed scheme is chosen-ciphertext secure and existentially unforgeable. Performance analysis shows that the proposed scheme outperforms all the previous certificate-based signcryption schemes in the literature. PMID:24959606

  14. Efficient certificate-based signcryption secure against public key replacement attacks and insider attacks.

    PubMed

    Lu, Yang; Li, Jiguo

    2014-01-01

    Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. We show that an existing certificate-based signcryption scheme is insecure in our model. We also propose a new certificate-based signcryption scheme that achieves security against both public key replacement attacks and insider attacks. We prove in the random oracle model that the proposed scheme is chosen-ciphertext secure and existentially unforgeable. Performance analysis shows that the proposed scheme outperforms all the previous certificate-based signcryption schemes in the literature.

  15. LAN attack detection using Discrete Event Systems.

    PubMed

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed. Copyright © 2010 ISA. Published by Elsevier Ltd. All rights reserved.

  16. How to capture fish in a school? Effect of successive predator attacks on seabird feeding success.

    PubMed

    Thiebault, Andréa; Semeria, Magali; Lett, Christophe; Tremblay, Yann

    2016-01-01

    Prey aggregations, such as fish schools, attract numerous predators. This typically leads to the formation of multispecific groups of predators. These aggregations can be seen both as a place of increased competition and as a place of possible facilitation between predators. Consequently, the functional role of such predator-prey aggregation is uncertain, and its effect on individual feeding success is virtually unknown. Using underwater film footage of different predators feeding on fish schools during the sardine run in South Africa, we directly measured the in situ feeding success of individual Cape gannets Morus capensis in different foraging situations. We determined the types of Cape gannet attacks (direct plunge dive or plunge dive followed by underwater pursuit) and we measured the occurrences and timing of attacks from the different species (mostly Cape gannets and long-beaked common dolphins Delphinus capensis). We also estimated the size of the targeted fish schools. These observations were complemented with a simulation model to evaluate the cumulative effect of successive predator attacks on the prey aggregation structure. The probability to capture a fish in one feeding attempt by Cape gannets averaged 0·28. It was lower when gannets engaged in underwater prey pursuit after the plunge compared to direct plunge (0·13 vs. 0·36). We found no effect of the number of prey on gannets' feeding success. However, the timing and frequency of attacks influenced strongly and positively the feeding success of individuals. The probability to capture a fish was the lowest (0·16) when no attack occurred in the few seconds (1-15 s) prior to a dive and the highest (˜0·4, i.e. more than twice) when one or two attacks occurred during this time window. The simulation model showed that a prey aggregation disorganized just after an attack and that the maximum of disturbance was obtained a few seconds after the initiation of the successive attacks. Our study suggests

  17. Cyber Attack! Crime or Act of War?

    DTIC Science & Technology

    2011-04-13

    all of the other domains. A plans officer pointed out that if we used this scheme of defense in land warfare, an ― invasion of New Jersey would have...Tonkin (1965) or the 9/11 attacks (2001). Most do not require it as the facts on the ground make the action obvious such as Iraq‘s invasion of Kuwait...1990), Japan‘s bombing of Pearl Harbor (1941), and the North Korean invasion of South Korea (1950). Regardless if there is a formal investigation or

  18. Decision Support for Attack Submarine Commanders.

    DTIC Science & Technology

    1980-10-01

    AD-AO95 892 DECISION SCIENCE CONSORTIUM INC FALLS CHURCH VA F./e 12/2 DECISION SUPPORT FOR ATTACK SUBMARINE COMMANDERS. (U) OCT 80 M S COHEN, R V...BROWN N00014-80-C-0046 UNCLASSIFIED TR-8S-11 ML DECISIN IEN$CE CUIVSURTiUM, MrC. DECISION SUPPORT FOR A TTA CK SUBMARINE COMMANDERS Marvin S . Cohen and...on reverse) DDI ,o..ŕ 1473 EDITION OF I NOV 65 IS OISOLCTZ Unclassified S /N 0102-014-6601 1 SECURITY CLASIFICATION OF TNIS PAGE (10bon DW& tateo* 01

  19. Cardiogenic embolism producing crescendo transient ischemic attacks.

    PubMed

    Geraghty, Patrick J; Oak, Jack; Choi, Eric T

    2005-09-01

    Lateralizing, repetitive transient ischemic attacks are characteristic of symptomatic carotid bifurcation atherosclerotic plaques. We report a case in which a cardiogenic embolus, after lodging at the left carotid bifurcation, produced crescendo episodes of expressive aphasia and mild right upper extremity weakness. Complete neurological recovery was achieved following emergent carotid embolectomy and endarterectomy. This case demonstrates that the laminar nature of internal carotid blood flow may result in the localization of embolic events to a single region of the cerebral vasculature, regardless of the source lesion in the carotid artery. The role of endoluminal techniques in the diagnosis and management of such lesions is discussed.

  20. Profiler-2000: Attacking the Insider Threat

    DTIC Science & Technology

    2005-09-01

    s/ JOSEPH CAMERA, Chief Information & Intelligence Exploitation Division Information Directorate REPORT...Approaches to undermining anomaly detectors………………………………9 3.3 Detection coverage of an anomaly detector………………………………….10 3.4 Deploying Exploits and Sensors...13 3.5 Where and how an attack manifests in the data……………………………...13 3.6 Manipulating the manifestation; modifying exploits

  1. Understanding How They Attack Your Weaknesses: CAPEC

    DTIC Science & Technology

    2011-05-01

    exploits ■ Capture the attacker’s perspective to aid software developers, acquirers and operators in improving the assurance profile of their software...development and secure operations The HS SEDI FFRDC is managed and operated by The MITRE Corporation for DHS. 5 Common Attack Pattern Enumeration and...patterns into an integrated enumeration that can be i l d ff i l l d b h icons stent y an e ect ve y everage y t e commun ty – Gives you an attacker’s

  2. Bobcat attack on a cottontail rabbit

    USGS Publications Warehouse

    Biggins, D.E.; Biggins, D.M.

    2006-01-01

    We observed an attack by a bobcat (Lynx rufus) on a cottontail rabbit (Sylvilagus) that involved stealthy approach by the cat for >1 h, followed by a 12.3-s chase covering 116.0 m for the cat and 128.4 m for the rabbit. During the chase, the route of the cat from starting point to kill site was more direct than the semi-circular route of the rabbit. Stride lengths for the cat and total distance covered by the chase were longer than those previously reported for bobcats.

  3. Cumulative Response to Sequences of Terror Attacks Varying in Frequency and Trajectory.

    PubMed

    Cui, Jinshu; Rosoff, Heather; John, Richard S

    2016-12-01

    There is a paucity of research examining public response to the cumulative effects of multiple related extreme events over time. We investigated the separate and combined effects of frequency and trajectory of terrorist attacks. A scenario simulation of a series of gas station bombings in Southern California was developed to evaluate respondents' affect, risk perception, and intended avoidance behavior using a 3 (frequency; low vs. medium vs. high) by 3 (trajectory; increasing vs. constant vs. decreasing) factorial design. For each of the nine conditions, three videos were created to simulate news broadcasts documenting the attacks over a three-week period. A total of 275 respondents were included in the analysis. Results from analysis of covariances (ANCOVAs) indicate that trajectory of the sequential attacks (increasing or decreasing in frequency) predicts negative affect, risk perception, and avoidance behavior. In contrast, frequency predicts neither negative affect, positive affect, risk perception, nor intended avoidance behavior. Results from structural equation modeling (SEM) further indicate that the effect of negative affect on behavioral intention is mediated by risk perception and the effect of trajectory on risk perception is partially mediated by negative affect. In addition, both ANCOVAs and SEM model results suggest that (1) females experience less positive affect and perceive more risk than males, (2) respondents with higher income perceive more risk, and (3) younger respondents are more likely to modify their behavior to avoid the risk of future attacks. © 2016 Society for Risk Analysis.

  4. Public knowledge of heart attack symptoms in Beijing residents.

    PubMed

    Zhang, Qing-Tan; Hu, Da-Yi; Yang, Jin-Gang; Zhang, Shou-Yan; Zhang, Xin-Quan; Liu, Shu-Shan

    2007-09-20

    Definitive treatment for heart attack is early reperfusion with either angioplasty or thrombolytic therapy, and the benefit is strictly time-dependent. Patient outcomes are improved with either therapy when initiated as soon as possible. Recognition of heart attack symptoms is logically tied to taking action to receive prompt emergency care. Inadequate knowledge of heart attack symptoms may prolong delay. The purpose of this study was to document knowledge about heart attack symptoms in Beijing residents and to identify the characteristics associated with increased knowledge of heart attack. A structured survey was conducted in 18 communities in Beijing from March 1 through June 10 in 2006. Addresses and participants were selected randomly following a stratification. The survey was designed to collect knowledge of heart attack symptoms from sampled adults in each community. A total of 4627 respondents completed the questionnaires correctly, and 50.29% of them were female. Totally 64.15% of the respondents reported chest pain or discomfort (common symptoms) as a symptom of heart attack; 75.38% reported at least one of the following eight symptoms as a symptom of heart attack: back pain, shortness of breath, arm pain or numbness, nausea or vomiting, neck, jaw or shoulder pain, epigastric pain, sweating, weakness (less common symptoms); 20.36% correctly reported four or more heart attack symptoms, only 7.4% knew all the correct heart attack symptoms, and 28.94% knew about reperfusion therapy for heart attack; 31.7% reported to call 120 or 999 while having a heart attack themselves; however 89.6% reported to call 120 or 999 when someone else is suffering from a heart attack. Very old persons and those with health insurance coverage, high education level, high household income, longer living in Beijing and previous experience with heart disease had greater knowledge of heart attack symptoms. Public knowledge of common heart attack symptoms as well as less common heart

  5. Use of the Panic Attack Questionnaire-IV to assess non-clinical panic attacks and limited symptom panic attacks in student and community samples.

    PubMed

    Norton, Peter J; Zvolensky, Michael J; Bonn-Miller, Marcel O; Cox, Brian J; Norton, G Ron

    2008-10-01

    Since its development in the mid-1980s, the Panic Attack Questionnaire (PAQ) has been one of the more, if not the most, commonly used self-report tools for assessing panic attacks. The usage of the instrument, however, has come amid potential concerns that instructions and descriptions may lead to an over-estimate of the prevalence of panic attacks. Furthermore, the instrument has not been revised since 1992, despite changes in DSM-IV criteria and more recent developments in the understanding of panic attacks. As a result, this paper describes a revision of the PAQ to improve the instruction and descriptive set, and to fully assess features of panic derived from recent conceptualizations. Students meeting DSM-IV panic attack criteria and those endorsing panic attacks, but not meeting criteria, showed few differences with the exception that those not meeting DSM-IV criteria typically reported a longer onset-to-peak intensity time than did Panickers. Results were cross-validated and extended using an independent Community Sample. A full descriptive phenomenology of panic attacks is described, and future directions for studying panic attacks using the PAQ are presented.

  6. Situational panic attacks in social anxiety disorder.

    PubMed

    Potter, Carrie M; Wong, Judy; Heimberg, Richard G; Blanco, Carlos; Liu, Shang-Min; Wang, Shuai; Schneier, Franklin R

    2014-01-01

    Panic attacks (PAs) are common in many psychiatric disorders other than panic disorder, especially social anxiety disorder (SAD). PAs have been associated with increased severity, comorbidity, and impairment in many disorders; therefore, PAs can now be used as a descriptive specifier across all DSM-5 disorders. However, the clinical implications of PAs in SAD remain unclear. The aim of the present investigation was to examine demographic and clinical characteristics associated with SAD-related situational panic attacks in a large, representative epidemiological sample of individuals with SAD (N=1138). We compared individuals with SAD who did and did not endorse situational PAs in terms of demographic factors, fear/avoidance of social situations, distress, impairment, and diagnostic comorbidity. Being male, black, Asian, or over 65 years old was associated with a decreased likelihood of experiencing situational PAs, whereas being unemployed was associated with an increased likelihood. Individuals with situational PAs also exhibited greater fear and avoidance of social situations, impairment, coping-oriented substance use, treatment utilization, and concurrent and longitudinal psychiatric comorbidity. Consistent with most epidemiologic studies, the information collected relied on self-report, and not all participants were available for both waves of assessment. The present findings suggest that SAD-related situational PAs are associated with more severe and complex presentations of SAD. Implications for the assessment and treatment of SAD, as well as for the use of PAs as a descriptive specifier for SAD, are discussed. Copyright © 2014 Elsevier B.V. All rights reserved.

  7. Error and attack tolerance of complex networks

    NASA Astrophysics Data System (ADS)

    Albert, Réka; Jeong, Hawoong; Barabási, Albert-László

    2000-07-01

    Many complex systems display a surprising degree of tolerance against errors. For example, relatively simple organisms grow, persist and reproduce despite drastic pharmaceutical or environmental interventions, an error tolerance attributed to the robustness of the underlying metabolic network. Complex communication networks display a surprising degree of robustness: although key components regularly malfunction, local failures rarely lead to the loss of the global information-carrying ability of the network. The stability of these and other complex systems is often attributed to the redundant wiring of the functional web defined by the systems' components. Here we demonstrate that error tolerance is not shared by all redundant systems: it is displayed only by a class of inhomogeneously wired networks, called scale-free networks, which include the World-Wide Web, the Internet, social networks and cells. We find that such networks display an unexpected degree of robustness, the ability of their nodes to communicate being unaffected even by unrealistically high failure rates. However, error tolerance comes at a high price in that these networks are extremely vulnerable to attacks (that is, to the selection and removal of a few nodes that play a vital role in maintaining the network's connectivity). Such error tolerance and attack vulnerability are generic properties of communication networks.

  8. Gemcitabine-induced gouty arthritis attacks.

    PubMed

    Bottiglieri, Sal; Tierson, Neil; Patel, Raina; Mo, Jae-Hyun; Mehdi, Syed

    2013-09-01

    In this case report, we review the experience of a patient who presented with early stage pancreatic cancer (Stage IIb) who underwent a Whipple procedure and adjuvant chemoradiation. The patient's past medical history included early stage colon cancer in remission, post-traumatic-stress-disorder, hypertension, hyperlipidemia, osteoarthritis, gout, and pre-diabetes. Chemotherapy initially consisted of weekly gemcitabine. The patient developed acute gouty attacks after his second dose of gemcitabine, which brought him to the emergency room for emergent treatment on several occasions. Gemcitabine was held and treatment began with fluorouracil and concurrent radiation. After completion of his chemoradiation with fluorouracil, he was again treated with weekly gemcitabine alone. As soon as the patient started gemcitabine chemotherapy the patient developed gouty arthritis again, requiring discontinuation of chemotherapy. The patient received no additional treatment until his recent recurrence 8 months later where gemcitabine chemotherapy was again introduced with prophylactic medications consisting of allopurinol 100 mg by mouth daily and colchicine 0.6 mg by mouth daily throughout gemcitabine chemotherapy, and no signs of gouty arthritis occurred. To our knowledge, this is the first case report describing gout attacks associated with gemcitabine therapy. There is limited data available describing the mechanism that gouty arthritis may be precipitated from gemcitabine chemotherapy. Further monitoring and management may be required in patients receiving gemcitabine chemotherapy with underlying gout.

  9. Consciousness in Non-Epileptic Attack Disorder

    PubMed Central

    Reuber, M.; Kurthen, M.

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consciousness should not only distinguish between the ‘level’ and ‘content’ of consciousness but also between ‘phenomenal consciousness’ (consciousness of states it somehow “feels to be like”) and ‘access consciousness’ (having certain ‘higher’ cognitive processes at one’s disposal). The existing evidence shows that there is a great intra- and interindividual variability of NEA experience. However, in most NEAs phenomenal experience – and, as a precondition for that experience, vigilance or wakefulness – is reduced to a lesser degree than in those epileptic seizures involving impairment of consciousness. In fact, complete loss of “consciousness” is the exception rather than the rule in NEAs. Patients, as well as external observers, may have a tendency to overestimate impairments of consciousness during the seizures. PMID:21447903

  10. Marine microalgae attack and feed on metazoans

    PubMed Central

    Berge, Terje; Poulsen, Louise K; Moldrup, Morten; Daugbjerg, Niels; Juel Hansen, Per

    2012-01-01

    Free-living microalgae from the dinoflagellate genus Karlodinium are known to form massive blooms in eutrophic coastal waters worldwide and are often associated with fish kills. Natural bloom populations, recently shown to consist of the two mixotrophic and toxic species Karlodinium armiger and Karlodinium veneficum have caused fast paralysis and mortality of finfish and copepods in the laboratory, and have been associated with reduced metazooplankton biomass in-situ. Here we show that a strain of K. armiger (K-0688) immobilises the common marine copepod Acartia tonsa in a density-dependent manner and collectively ingests the grazer to promote its own growth rate. In contrast, four strains of K. veneficum did not attack or affect the motility and survival of the copepods. Copepod immobilisation by the K. armiger strain was fast (within 15 min) and caused by attacks of swarming cells, likely through the transfer and action of a highly potent but uncharacterised neurotoxin. The copepods grazed and reproduced on a diet of K. armiger at densities below 1000, cells ml−1, but above 3500 cells ml−1 the mixotrophic dinoflagellates immobilised, fed on and killed the copepods. Switching the trophic role of the microalgae from prey to predator of copepods couples population growth to reduced grazing pressure, promoting the persistence of blooms at high densities. K. armiger also fed on three other metazoan organisms offered, suggesting that active predation by mixotrophic dinoflagellates may be directly involved in causing mortalities at several trophic levels in the marine food web. PMID:22513533

  11. Marine microalgae attack and feed on metazoans.

    PubMed

    Berge, Terje; Poulsen, Louise K; Moldrup, Morten; Daugbjerg, Niels; Juel Hansen, Per

    2012-10-01

    Free-living microalgae from the dinoflagellate genus Karlodinium are known to form massive blooms in eutrophic coastal waters worldwide and are often associated with fish kills. Natural bloom populations, recently shown to consist of the two mixotrophic and toxic species Karlodinium armiger and Karlodinium veneficum have caused fast paralysis and mortality of finfish and copepods in the laboratory, and have been associated with reduced metazooplankton biomass in-situ. Here we show that a strain of K. armiger (K-0688) immobilises the common marine copepod Acartia tonsa in a density-dependent manner and collectively ingests the grazer to promote its own growth rate. In contrast, four strains of K. veneficum did not attack or affect the motility and survival of the copepods. Copepod immobilisation by the K. armiger strain was fast (within 15 min) and caused by attacks of swarming cells, likely through the transfer and action of a highly potent but uncharacterised neurotoxin. The copepods grazed and reproduced on a diet of K. armiger at densities below 1000, cells ml(-1), but above 3500 cells ml(-1) the mixotrophic dinoflagellates immobilised, fed on and killed the copepods. Switching the trophic role of the microalgae from prey to predator of copepods couples population growth to reduced grazing pressure, promoting the persistence of blooms at high densities. K. armiger also fed on three other metazoan organisms offered, suggesting that active predation by mixotrophic dinoflagellates may be directly involved in causing mortalities at several trophic levels in the marine food web.

  12. Herpetic eye attacks: variability of circannual rhythms.

    PubMed Central

    Gamus, D; Romano, A; Sucher, E; Ashkenazi, I E

    1995-01-01

    BACKGROUND--The issue of seasonal variation of herpetic ocular infections is still controversial. This study was designed to examine whether this variation exists and can be defined as a significant circannual rhythm. METHODS--The patterns of recurrent attacks were monitored in 541 patients over a period of 15 years. Rhythm parameters were analysed according to age, sex, and clinical signs. RESULTS--The majority of herpetic eye attacks exhibited the highest peak in January (p < 0.04), except in the group of atopic children where the incidence of the disease peaked in September (p < 0.05). Among the various clinical forms, significant circannual periodicities were found only in the occurrence of epithelial herpetic keratitis (p < 0.03). The rhythms were detected among males (p < 0.03) but not among females. No direct correlation was demonstrated between the presence of the rhythms and the triggering effect of upper respiratory tract infections. CONCLUSIONS--Chronoepidemiological evaluation of individual reactivation patterns may be beneficial to certain patients and contribute to the optimisation of the treatment when prophylaxis is considered. PMID:7880794

  13. Simulation of Attacks for Security in Wireless Sensor Network

    PubMed Central

    Diaz, Alvaro; Sanchez, Pablo

    2016-01-01

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node’s software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work. PMID:27869710

  14. Simulation of Attacks for Security in Wireless Sensor Network.

    PubMed

    Diaz, Alvaro; Sanchez, Pablo

    2016-11-18

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  15. Causal Attribution, Perceived Benefits, and Morbidity After a Heart Attack: An 8-Year Study.

    ERIC Educational Resources Information Center

    Affleck, Glenn; And Others

    1987-01-01

    Interviewed heart attack victims (N=287) seven weeks and eight years after their attack. Explored interrelations among causal attributions for the attack, survivor morbidity, and heart attack recurrence. Found that patients who cited benefits from their misfortune seven weeks after the first attack were less likely to have another attack and had…

  16. Causal Attribution, Perceived Benefits, and Morbidity After a Heart Attack: An 8-Year Study.

    ERIC Educational Resources Information Center

    Affleck, Glenn; And Others

    1987-01-01

    Interviewed heart attack victims (N=287) seven weeks and eight years after their attack. Explored interrelations among causal attributions for the attack, survivor morbidity, and heart attack recurrence. Found that patients who cited benefits from their misfortune seven weeks after the first attack were less likely to have another attack and had…

  17. Minimizing Expected Maximum Risk from Cyber-Attacks with Probabilistic Attack Success

    SciTech Connect

    Bhuiyan, Tanveer H.; Nandi, Apurba; Medal, Hugh; Halappanavar, Mahantesh

    2016-07-16

    The goal of our work is to enhance network security by generating partial cut-sets, which are a subset of edges that remove paths from initially vulnerable nodes (initial security conditions) to goal nodes (critical assets), on an attack graph given costs for cutting an edge and a limited overall budget.

  18. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia.

    PubMed

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources.

  19. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia

    PubMed Central

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Introduction Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. Methods The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Results Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. Conclusion The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources. PMID:17274813

  20. Spreading of localized attacks in spatial multiplex networks

    NASA Astrophysics Data System (ADS)

    Vaknin, Dana; Danziger, Michael M.; Havlin, Shlomo

    2017-07-01

    Many real-world multilayer systems such as critical infrastructure are interdependent and embedded in space with links of a characteristic length. They are also vulnerable to localized attacks or failures, such as terrorist attacks or natural catastrophes, which affect all nodes within a given radius. Here we study the effects of localized attacks on spatial multiplex networks of two layers. We find a metastable region where a localized attack larger than a critical size induces a nucleation transition as a cascade of failures spreads throughout the system, leading to its collapse. We develop a theory to predict the critical attack size and find that it exhibits novel scaling behavior. We further find that localized attacks in these multiplex systems can induce a previously unobserved combination of random and spatial cascades. Our results demonstrate important vulnerabilities in real-world interdependent networks and show new theoretical features of spatial networks.

  1. Agoraphobic behavior and panic attack: a study of male twins.

    PubMed

    Tsuang, Ming; Domschke, Katharina; Jerskey, Beth A; Lyons, Michael J

    2004-01-01

    We used data from 3372 pairs of male twins from the Vietnam Era Twin Registry to examine comorbidity and familial influences on the frequently observed association between agoraphobic behavior and panic. Due to low prevalence of DSM-III-R-defined panic disorder, we also examined subjects who had experienced at least one panic attack during their lives. Agoraphobic behavior among individuals with a history of panic attacks showed familial aggregation (odds ratio = 5.7; P = .018 ). Probands with panic attacks and agoraphobic behavior and their co-twins had higher risk of major depression than probands without agoraphobic avoidance and their co-twins (P = .01). Groups did not differ for alcohol dependence or antisocial personality. Agoraphobic behavior associated with panic attack is familial and associated with comorbid major depression. Agoraphobia following panic attack does not seem to reflect severity as agoraphobic behavior in the proband was unrelated to risk of panic attacks in the co-twin.

  2. Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication

    NASA Astrophysics Data System (ADS)

    Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru

    In this paper, we propose password recovery attacks against challenge-response authentication protocols. Our attacks use a message difference for a MD5 collision attack proposed in IEICE 2008. First, we show how to efficiently find a message pair that collides with the above message difference. Second, we show that a password used in authenticated post office protocol (APOP) can be recovered practically. We also show that the password recovery attack can be applied to a session initiation protocol (SIP) and digest authentication. Our attack can recover up to the first 31 password characters in a short time and up to the first 60 characters faster than the naive search method. We have implemented our attack and confirmed that 31 characters can be successfully recovered.

  3. ScatterType: a reading CAPTCHA resistant to segmentation attack

    NASA Astrophysics Data System (ADS)

    Baird, Henry S.; Riopka, Terry P.

    2005-01-01

    A reading-based CAPTCHA designed to resist character-segmentation attacks, called 'ScatterType,' is described. Its challenges are pseudorandomly synthesized images of text strings rendered in machine-print typefaces: within each image, characters are fragmented using horizontal and vertical cuts, and the fragments are scattered by vertical and horizontal displacements. This scattering is designed to defeat all methods known to us for automatic segmentation into characters. As in the BaffleText CAPTCHA, English-like but unspellable text-strings are used to defend against known-dictionary attacks. In contrast to the PessimalPrint and BaffleText CAPTCHAs (and others), no physics-based image degradations, occlusions, or extraneous patterns are employed. We report preliminary results from a human legibility trial with 57 volunteers that yielded 4275 CAPTCHA challenges and responses. ScatterType human legibility remains remarkably high even on extremely degraded cases. We speculate that this is due to Gestalt perception abilities assisted by style-specific (here, typeface-specific) consistency among primitive shape features of character fragments. Although recent efforts to automate style-consistent perceptual skills have reported progress, the best known methods do not yet pose a threat to ScatterType. The experimental data also show that subjective rating of difficulty is strongly (and usefully) correlated with illegibility. In addition, we present early insights emerging from these data as we explore the ScatterType design space -- choice of typefaces, 'words', cut positioning, and displacements -- with the goal of locating regimes in which ScatterType challenges remain comfortably legible to almost all people but strongly resist mahine-vision methods for automatic segmentation into characters.

  4. ScatterType: a reading CAPTCHA resistant to segmentation attack

    NASA Astrophysics Data System (ADS)

    Baird, Henry S.; Riopka, Terry P.

    2004-12-01

    A reading-based CAPTCHA designed to resist character-segmentation attacks, called 'ScatterType,' is described. Its challenges are pseudorandomly synthesized images of text strings rendered in machine-print typefaces: within each image, characters are fragmented using horizontal and vertical cuts, and the fragments are scattered by vertical and horizontal displacements. This scattering is designed to defeat all methods known to us for automatic segmentation into characters. As in the BaffleText CAPTCHA, English-like but unspellable text-strings are used to defend against known-dictionary attacks. In contrast to the PessimalPrint and BaffleText CAPTCHAs (and others), no physics-based image degradations, occlusions, or extraneous patterns are employed. We report preliminary results from a human legibility trial with 57 volunteers that yielded 4275 CAPTCHA challenges and responses. ScatterType human legibility remains remarkably high even on extremely degraded cases. We speculate that this is due to Gestalt perception abilities assisted by style-specific (here, typeface-specific) consistency among primitive shape features of character fragments. Although recent efforts to automate style-consistent perceptual skills have reported progress, the best known methods do not yet pose a threat to ScatterType. The experimental data also show that subjective rating of difficulty is strongly (and usefully) correlated with illegibility. In addition, we present early insights emerging from these data as we explore the ScatterType design space -- choice of typefaces, 'words', cut positioning, and displacements -- with the goal of locating regimes in which ScatterType challenges remain comfortably legible to almost all people but strongly resist mahine-vision methods for automatic segmentation into characters.

  5. Diffusion-Weighted Imaging and Diagnosis of Transient Ischemic Attack

    PubMed Central

    Brazzelli, Miriam; Chappell, Francesca M; Miranda, Hector; Shuler, Kirsten; Dennis, Martin; Sandercock, Peter A G; Muir, Keith; Wardlaw, Joanna M

    2014-01-01

    Objective Magnetic resonance (MR) diffusion-weighted imaging (DWI) is sensitive to small acute ischemic lesions and might help diagnose transient ischemic attack (TIA). Reclassification of patients with TIA and a DWI lesion as “stroke” is under consideration. We assessed DWI positivity in TIA and implications for reclassification as stroke. Methods We searched multiple sources, without language restriction, from January 1995 to July 2012. We used PRISMA guidelines, and included studies that provided data on patients presenting with suspected TIA who underwent MR DWI and reported the proportion with an acute DWI lesion. We performed univariate random effects meta-analysis to determine DWI positive rates and influencing factors. Results We included 47 papers and 9,078 patients (range = 18–1,693). Diagnosis was by a stroke specialist in 26 of 47 studies (55%); all studies excluded TIA mimics. The pooled proportion of TIA patients with an acute DWI lesion was 34.3% (95% confidence interval [CI] = 30.5–38.4, range = 9–67%; I2 = 89.3%). Larger studies (n > 200) had lower DWI-positive rates (29%; 95% CI = 23.2–34.6) than smaller (n < 50) studies (40.1%; 95% CI = 33.5–46.6%; p = 0.035), but no other testable factors, including clinician speciality and time to scanning, reduced or explained the 7-fold DWI-positive variation. Interpretation The commonest DWI finding in patients with definite TIA is a negative scan. Available data do not explain why ⅔ of patients with definite specialist-confirmed TIA have negative DWI findings. Until these factors are better understood, reclassifying DWI-positive TIAs as strokes is likely to increase variance in estimates of global stroke and TIA burden of disease. ANN NEUROL 2014;75:67–76 PMID:24085376

  6. Somatotype, Level of Competition, and Performance in Attack in Elite Male Volleyball

    PubMed Central

    Giannopoulos, Nikiforos; Vagenas, George; Noutsos, Konstantinos; Barzouka, Karolina; Bergeles, Nikolaos

    2017-01-01

    Abstract This study investigated the relationship between somatotype, level of competition, and performance in attack in elite level male volleyball players. The objective was to test for the potential covariation of competition level (Division A1 vs. A2) and playing position (hitters vs. centers vs. opposites) considering performance in attack. Anthropometric, body composition and somatotype variables were measured according to the Heath-Carter method. The attack actions of 144 players from 48 volleyball matches were analyzed and their performance was rated using a 5-point numerical scale. Results showed that players of Division A1 were taller, heavier, more muscular, and less endomorphic compared to those of Division A2. MANOVA and follow-up discriminant function analysis revealed somatotype differences among playing positions with centers and opposites being endomorph-ectomorph and hitters being central. Centers performed constantly better than hitters and opposites regardless of the division and somatotype. Multiple linear regression analysis showed that variables defining ectomorph and endomorph players, centers, and players of Division A1 significantly determined the relative performance superiority and were able to explain the variation in performance by almost 25%. These results could be taken into account by coaches when assigning players to particular playing positions or when designing individualized position-specific training programs. PMID:28828084

  7. Non-harmful insertion of data mimicking computer network attacks

    DOEpatents

    Neil, Joshua Charles; Kent, Alexander; Hash, Jr, Curtis Lee

    2016-06-21

    Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.

  8. Decomposition of the Marine Light Attack Helicopter Squadron

    DTIC Science & Technology

    2008-02-19

    Decomposition of the Marine Light Attack Helicopter Squadron EWS Contemporary Issues Paper Submitted by Captain AS...COVERED 00-00-2008 to 00-00-2008 4. TITLE AND SUBTITLE Decomposition of the Marine Light Attack Helicopter Squadron 5a. CONTRACT NUMBER 5b. GRANT...ANSI Std Z39-18 2 Presently, two airframes, the UH-1N Huey and the AH-1W Super Cobra, are combined into composite Marine light attack

  9. Countermeasures for unintentional and intentional video watermarking attacks

    NASA Astrophysics Data System (ADS)

    Deguillaume, Frederic; Csurka, Gabriela; Pun, Thierry

    2000-05-01

    These last years, the rapidly growing digital multimedia market has revealed an urgent need for effective copyright protection mechanisms. Therefore, digital audio, image and video watermarking has recently become a very active area of research, as a solution to this problem. Many important issues have been pointed out, one of them being the robustness to non-intentional and intentional attacks. This paper studies some attacks and proposes countermeasures applied to videos. General attacks are lossy copying/transcoding such as MPEG compression and digital/analog (D/A) conversion, changes of frame-rate, changes of display format, and geometrical distortions. More specific attacks are sequence edition, and statistical attacks such as averaging or collusion. Averaging attack consists of averaging locally consecutive frames to cancel the watermark. This attack works well for schemes which embed random independent marks into frames. In the collusion attack the watermark is estimated from single frames (based on image denoising), and averaged over different scenes for better accuracy. The estimated watermark is then subtracted from each frame. Collusion requires that the same mark is embedded into all frames. The proposed countermeasures first ensures robustness to general attacks by spread spectrum encoding in the frequency domain and by the use of an additional template. Secondly, a Bayesian criterion, evaluating the probability of a correctly decoded watermark, is used for rejection of outliers, and to implement an algorithm against statistical attacks. The idea is to embed randomly chosen marks among a finite set of marks, into subsequences of videos which are long enough to resist averaging attacks, but short enough to avoid collusion attacks. The Bayesian criterion is needed to select the correct mark at the decoding step. Finally, the paper presents experimental results showing the robustness of the proposed method.

  10. ATTACK WARNING: Better Management Required to Resolve NORAD Integration Deficiencies

    DTIC Science & Technology

    1989-07-01

    WAHNGO D.C.9’𔄃- 2030-710 Accession Number: 1923 Publication Date: Jul 07, 1989 Title: Attack Warning : Better Management Required to Resolve NORAD...Office, GAO, Washington, DC 20548 Report Number: GAO/IMTEC-89- 26 Descriptors, Keywords: Surveillance Warning Communication Attack Methodology Evaluation...Integrated Tactical Warning and Attack Assessment System’s data processing and communications capabilities. Our review focused on the Air Force’s

  11. Attack polish for nickel-base alloys and stainless steels

    DOEpatents

    Not Available

    1980-05-28

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels is described. The chemical attack polich comprises FeNO/sub 3/, concentrated CH/sub 3/COOH, concentrated H/sub 2/SO/sub 4/ and H/sub 2/O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  12. Identification of cooling tower wood attack and methods of control

    SciTech Connect

    Song, P.; Trulear, M.G.

    1986-01-01

    Biological and chemical attack can greatly accelerate the deterioration of cooling tower wood. The damage, once inflicted, is irreversible and often results in premature and costly wood replacement. Biological attack is more serious than chemical, and is difficult to detect. Control of both types is essential for good tower maintenance A review of wood structures, types of attack and methods of control are presented. Effects of alkaline cooling water operation on wood deterioration are also discussed.

  13. Attack polish for nickel-base alloys and stainless steels

    DOEpatents

    Steeves, Arthur F.; Buono, Donald P.

    1983-01-01

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels. The chemical attack polish comprises Fe(NO.sub.3).sub.3, concentrated CH.sub.3 COOH, concentrated H.sub.2 SO.sub.4 and H.sub.2 O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  14. Regulating Nation-State Cyber Attacks in Counterterrorism Operations

    DTIC Science & Technology

    2010-06-01

    zombies ,” subject to their command. Wilson continues to report that the newest trends in Botnet crimes include: malicious code (including viruses ...potential nation-state cyber-attack scenarios that may be seen in future counterterrorism operations, and whether those possible attack scenarios are...Cyber attack, International Law, China, Russia, United States, al Qaeda, Hamas, Hezbollah, FARC, Botnet, Worm, Virus , Malicious Code, Hack, jus in

  15. Application distribution model and related security attacks in VANET

    NASA Astrophysics Data System (ADS)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  16. Finite Energy and Bounded Attacks on Control System Sensor Signals

    SciTech Connect

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M; Laska, Jason A

    2014-01-01

    Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signal attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.

  17. Techniques for Judging Intent Behind Network Based Cyber Attacks

    SciTech Connect

    Allen, J M

    2004-01-28

    This project developed a prototype system that can rapidly differentiate between undirected cyber attacks, and those that have a more specific and concerning intent behind them. The system responds to important cyber attacks in a tactically significant way as the attack is proceeding. It is also creates a prioritized list for the human analysts allowing them to focus on the threats mostly likely to be of interest. In the recent years the volume of attacks over the internet has increased exponentially, as they have become more and more automated. The result of this is that real threats are harder and harder to distinguish from the general threat. It is possible with our current systems to identify network packets that originated from thousands of IP addresses as probing a site like LLNL in a single day. Human analysis of these threats does not result in information that can be used for tactical response because most of the attacks are short and over before the human starts the analysis. Only a very small percentage of attacks can even be evaluated manually due to the volume. This project developed methods, and prototyped tools, that can identify attacks, slow the attack down and aid in the process of prioritizing detections. The project demonstrated that such methods exist, and that practical implementations exist for modern computers and networks. We call the tools created D.I.A.G. or Determining Internet Attackers Goals.

  18. Feasible attack on detector-device-independent quantum key distribution.

    PubMed

    Wei, Kejin; Liu, Hongwei; Ma, Haiqiang; Yang, Xiuqing; Zhang, Yong; Sun, Yongmei; Xiao, Jinghua; Ji, Yuefeng

    2017-03-27

    Recently, to bridge the gap between security of Measurement-device-independent quantum key distribution (MDI-QKD) and a high key rate, a novel protocol, the so-called detector-device-independent QKD (DDI-QKD), has been independently proposed by several groups and has attracted great interest. A higher key rate is obtained, since a single photon bell state measurement (BSM) setup is applied to DDI-QKD. Subsequently, Qi has proposed two attacks for this protocol. However, the first attack, in which Bob's BSM setup is assumed to be completely a "black box", is easily prevented by using some additional monitoring devices or by specifically characterizing the BSM. The second attack, which combines the blinding attack and the detector wavelength-dependent efficiency, is not explicitly discussed, and its feasibility is not experimentally confirmed. Here, we show that the second attack is not technically viable because of an intrinsically wavelength-dependent property of a realistic beam splitter, which is an essential component in DDI-QKD. Moreover, we propose a feasible attack that combines a well-known attack-detector blinding attack with intrinsic imperfections of single-photon detectors. The experimental measurement and proof-of-principle test results confirm that our attack can allow Eve to get a copy of quantum keys without being detected and that it is feasible with current technology.

  19. Neural network classifier of attacks in IP telephony

    NASA Astrophysics Data System (ADS)

    Safarik, Jakub; Voznak, Miroslav; Mehic, Miralem; Partila, Pavol; Mikulec, Martin

    2014-05-01

    Various types of monitoring mechanism allow us to detect and monitor behavior of attackers in VoIP networks. Analysis of detected malicious traffic is crucial for further investigation and hardening the network. This analysis is typically based on statistical methods and the article brings a solution based on neural network. The proposed algorithm is used as a classifier of attacks in a distributed monitoring network of independent honeypot probes. Information about attacks on these honeypots is collected on a centralized server and then classified. This classification is based on different mechanisms. One of them is based on the multilayer perceptron neural network. The article describes inner structure of used neural network and also information about implementation of this network. The learning set for this neural network is based on real attack data collected from IP telephony honeypot called Dionaea. We prepare the learning set from real attack data after collecting, cleaning and aggregation of this information. After proper learning is the neural network capable to classify 6 types of most commonly used VoIP attacks. Using neural network classifier brings more accurate attack classification in a distributed system of honeypots. With this approach is possible to detect malicious behavior in a different part of networks, which are logically or geographically divided and use the information from one network to harden security in other networks. Centralized server for distributed set of nodes serves not only as a collector and classifier of attack data, but also as a mechanism for generating a precaution steps against attacks.

  20. Panic attacks during sleep: a hyperventilation-probability model.

    PubMed

    Ley, R

    1988-09-01

    Panic attacks during sleep are analysed in terms of a hyperventilation theory of panic disorder. The theory assumes that panic attacks during sleep are a manifestation of severe chronic hyperventilation, a dysfunctional state in which renal compensation has led to a relatively steady state of diminished bicarbonate. Reductions in respiration during deep non-REM sleep lead to respiratory acidosis which triggers hyperventilatory hypocapnea and subsequent panic. A probability model designed to predict when during sleep panic attacks are likely to occur is supported by relevant data from studies of sleep and panic attacks. Implications for treatment are discussed.

  1. Fault Attacks against the Miller's Algorithm in Edwards Coordinates

    NASA Astrophysics Data System (ADS)

    El Mrabet, Nadia

    Initially, the use of pairings did not involve any secret entry. However in an Identity Based Cryptographic protocol, one of the two entries of the pairing is secret, so fault attack can be applied to Pairing Based Cryptography to find it. In [18], the author shows that Pairing Based Cryptography in Weierstrass coordinates is vulnerable to a fault attack. The addition law in Edwards coordinates is such that the exponentiation in Edwards coordinates is naturally protected to Side Channel attacks. We study here if this property protects Pairing Based Cryptography in Edwards coordinates against fault attacks.

  2. Windows NT Attacks for the Evaluation of Intrusion Detection Systems

    DTIC Science & Technology

    2000-06-01

    Neptune and Smurf. These attacks are fully documented in [10]. In addition, two denial-of-service attacks, CrashIIS and DoSNuke, were developed to...in the Netscape browser. NetBus and NetCat use trojan programs to establish back doors on the victim system. PPMacro inserts malicious macro code...detecting the attack. 51 7.2 Netbus R-s-U Description The attacker uses a trojan program to install and run the Netbus server, version 1.7, on

  3. Crack-cocaine users as victims of physical attack.

    PubMed Central

    Siegal, H. A.; Falck, R. S.; Wang, J.; Carlson, R. G.

    2000-01-01

    This study evaluates the correlates of physical attack among people who use crack cocaine in Dayton, Ohio. Using a retrospective and prospective natural history design, data from baseline and 1-year follow-up interviews were used to calculate the prevalence of physical attack and the annual rate of physical attack suffered by 440 not-in-treatment crack-cocaine users. Logistic regression was used to determine the correlates of physical attack. The lifetime prevalence of physical attack was 63.0%; the annual rate was 36.8%. At baseline, daily crack users were more likely to report a previous attack since they began using crack (odds ratio [OR], 1.81; 95% confidence interval [CI], 1.18-2.77). Longer duration of crack use was also associated with experiencing an attack (OR, 1.09; 95% CI, 1.04-1.14). Between baseline and 12-month follow-up, the odds of men being attacked were significantly less than those for women (OR, 0.48; 95% CI, 0.23-0.99). Physical attack is widespread among crack-cocaine users, and does not vary by ethnicity. Injuries often result in the need for medical care. Over the short term, women are at increased risk. Accessible and effective drug abuse treatment is needed to diminish the harm this population suffers. PMID:10800295

  4. Capturing the uncertainty in adversary attack simulations.

    SciTech Connect

    Darby, John L.; Brooks, Traci N.; Berry, Robert Bruce

    2008-09-01

    This work provides a comprehensive uncertainty technique to evaluate uncertainty, resulting in a more realistic evaluation of PI, thereby requiring fewer resources to address scenarios and allowing resources to be used across more scenarios. For a given set of dversary resources, two types of uncertainty are associated with PI for a scenario: (1) aleatory (random) uncertainty for detection probabilities and time delays and (2) epistemic (state of knowledge) uncertainty for the adversary resources applied during an attack. Adversary esources consist of attributes (such as equipment and training) and knowledge about the security system; to date, most evaluations have assumed an adversary with very high resources, adding to the conservatism in the evaluation of PI. The aleatory uncertainty in PI is ddressed by assigning probability distributions to detection probabilities and time delays. A numerical sampling technique is used to evaluate PI, addressing the repeated variable dependence in the equation for PI.

  5. On the offensive against brain attack

    SciTech Connect

    Wheatcraft, D.

    1997-06-01

    The Center for Healthcare Technologies at Lawrence Livermore National Laboratory has undertaken a stroke initiative whose purpose is to provide the medical community with the tools that will allow doctors to diagnose and treat stroke as aggressively as they do heart attack. A multidisciplinary team of stroke-initiative researchers is collaborating with academic medical centers and private companies to move these tools from the research and development stage through clinical trials, regulatory approval, and manufacture so that they can benefit many thousands of people who have strokes each year. Tools the team has developed fall into four categories: microsensors for brain and clot characterization, a catheter-based system using laser energy to break up clots in the blood vessels of the brain, laser-tissue interaction models in support of laser {open_quotes}clot busting,{close_quotes} and microtools for treating the aneurysms that cause hemorrhagic stroke.

  6. Resveratrol products resulting by free radical attack

    NASA Astrophysics Data System (ADS)

    Bader, Yvonne; Quint, R. M.; Getoff, Nikola

    2008-06-01

    Trans-resveratrol ( trans-3,4',5-trihydroxystilbene; RES), which is contained in red wine and many plants, is one of the most relevant and extensively investigated stilbenes with a broad spectrum of biological activities. Among other duties, RES has been reported to have anti-carcinogenetic activities, which could be attributed to its antioxidant properties. The degradation of RES was studied under various conditions. The products (aldehydes, carboxylic acids, etc.) generated from RES by the attack of free radicals were registered as a function of the radical concentration (absorbed radiation dose). Based on the obtained data it appears that the OH radicals are initiating the rather complicated process, which involves of the numerous consecutive reactions. A possible starting reaction mechanism is presented.

  7. Inorganic nanoparticles engineered to attack bacteria.

    PubMed

    Miller, Kristen P; Wang, Lei; Benicewicz, Brian C; Decho, Alan W

    2015-11-07

    Antibiotics were once the golden bullet to constrain infectious bacteria. However, the rapid and continuing emergence of antibiotic resistance (AR) among infectious microbial pathogens has questioned the future utility of antibiotics. This dilemma has recently fueled the marriage of the disparate fields of nanochemistry and antibiotics. Nanoparticles and other types of nanomaterials have been extensively developed for drug delivery to eukaryotic cells. However, bacteria have very different cellular architectures than eukaryotic cells. This review addresses the chemistry of nanoparticle-based antibiotic carriers, and how their technical capabilities are now being re-engineered to attack, kill, but also non-lethally manipulate the physiologies of bacteria. This review also discusses the surface functionalization of inorganic nanoparticles with small ligand molecules, polymers, and charged moieties to achieve drug loading and controllable release.

  8. Emergency response to an anthrax attack

    PubMed Central

    Wein, Lawrence M.; Craft, David L.; Kaplan, Edward H.

    2003-01-01

    We developed a mathematical model to compare various emergency responses in the event of an airborne anthrax attack. The system consists of an atmospheric dispersion model, an age-dependent dose–response model, a disease progression model, and a set of spatially distributed two-stage queueing systems consisting of antibiotic distribution and hospital care. Our results underscore the need for the extremely aggressive and timely use of oral antibiotics by all asymptomatics in the exposure region, distributed either preattack or by nonprofessionals postattack, and the creation of surge capacity for supportive hospital care via expanded training of nonemergency care workers at the local level and the use of federal and military resources and nationwide medical volunteers. The use of prioritization (based on disease stage and/or age) at both queues, and the development and deployment of modestly rapid and sensitive biosensors, while helpful, produce only second-order improvements. PMID:12651951

  9. Medical lessons from terror attacks in Israel.

    PubMed

    Singer, Adam J; Singer, Ayellet H; Halperin, Pinchas; Kaspi, Gai; Assaf, Jacob

    2007-01-01

    Mass casualty events that result from conventional terrorist attacks have become more common in recent years. These events are characterized by major chaos and a large number of injured victims that overwhelm local resources and personnel. Mass casualty protocols and management are often based on theoretical models adapted from the military experience and literature. Over the last few years the medical system in Israel has had to deal with multiple mass casualty events resulting from terrorist events. This has led to the development of novel strategies that may run contrary to traditional teachings. The current report summarizes the experience and lessons learned by the Israeli Emergency Medical Services and its hospitals over the last few years. Although each hospital and Emergency Medical Service agency will need to tailor its management plan to its particular needs, it is our hope that the lessons learned in Israel will assist others in optimizing the care of mass casualty events.

  10. Detecting Cyber Attacks On Nuclear Power Plants

    NASA Astrophysics Data System (ADS)

    Rrushi, Julian; Campbell, Roy

    This paper proposes an unconventional anomaly detection approach that provides digital instrumentation and control (I&C) systems in a nuclear power plant (NPP) with the capability to probabilistically discern between legitimate protocol frames and attack frames. The stochastic activity network (SAN) formalism is used to model the fusion of protocol activity in each digital I&C system and the operation of physical components of an NPP. SAN models are employed to analyze links between protocol frames as streams of bytes, their semantics in terms of NPP operations, control data as stored in the memory of I&C systems, the operations of I&C systems on NPP components, and NPP processes. Reward rates and impulse rewards are defined in the SAN models based on the activity-marking reward structure to estimate NPP operation profiles. These profiles are then used to probabilistically estimate the legitimacy of the semantics and payloads of protocol frames received by I&C systems.

  11. Outpatient management of transient ischaemic attack

    PubMed Central

    Loh, Victor Weng Keong; Soon, Derek Tuck Loong; Yeo, Leonard Leong Litt

    2016-01-01

    Stroke is a significant cause of death and disability in Singapore; in 2014, it was the fourth most common cause of death. Transient ischaemic attack (TIA) is defined as a transient episode of neurological dysfunction caused by focal brain, spinal cord or retinal ischaemia without evidence of acute infarction. The diagnosis of TIA/acute stroke needs to be considered in all patients who present with sudden focal neurological dysfunction. Prompt referral for assessment, neuroimaging and intervention provides the best chance for neurological recovery and/or minimising further neurological damage. Primary care physicians have a crucial role in TIA/stroke prevention and management. This includes referring patients with suspected acute TIA/stroke to hospitals with stroke treatment facilities immediately; managing the modifiable risk factors of cerebral ischaemia; continuing prescription of antiplatelet agents and/or anticoagulation where indicated; and teaching patients to recognise and respond to suspected cerebral ischaemia using the FAST (face, arm, speech, time) acronym. PMID:27995263

  12. Passive Faraday-mirror attack in a practical two-way quantum-key-distribution system

    NASA Astrophysics Data System (ADS)

    Sun, Shi-Hai; Jiang, Mu-Sheng; Liang, Lin-Mei

    2011-06-01

    The Faraday mirror (FM) plays a very important role in maintaining the stability of two-way plug-and-play quantum key distribution (QKD) systems. However, the practical FM is imperfect, which will not only introduce an additional quantum bit error rate (QBER) but also leave a loophole for Eve to spy the secret key. In this paper we propose a passive Faraday mirror attack in two-way QKD system based on the imperfection of FM. Our analysis shows that if the FM is imperfect, the dimension of Hilbert space spanned by the four states sent by Alice is three instead of two. Thus Eve can distinguish these states with a set of Positive Operator Valued Measure (POVM) operators belonging to three-dimension space, which will reduce the QBER induced by her attack. Furthermore, a relationship between the degree of the imperfection of FM and the transmittance of the practical QKD system is obtained. The results show that the probability that Eve loads her attack successfully depends on the degree of the imperfection of FM rapidly, but the QBER induced by Eve’s attack changes slightly with the degree of the FM imperfection.

  13. Passive Faraday-mirror attack in a practical two-way quantum-key-distribution system

    SciTech Connect

    Sun Shihai; Jiang Musheng; Liang Linmei

    2011-06-15

    The Faraday mirror (FM) plays a very important role in maintaining the stability of two-way plug-and-play quantum key distribution (QKD) systems. However, the practical FM is imperfect, which will not only introduce an additional quantum bit error rate (QBER) but also leave a loophole for Eve to spy the secret key. In this paper we propose a passive Faraday mirror attack in two-way QKD system based on the imperfection of FM. Our analysis shows that if the FM is imperfect, the dimension of Hilbert space spanned by the four states sent by Alice is three instead of two. Thus Eve can distinguish these states with a set of Positive Operator Valued Measure (POVM) operators belonging to three-dimension space, which will reduce the QBER induced by her attack. Furthermore, a relationship between the degree of the imperfection of FM and the transmittance of the practical QKD system is obtained. The results show that the probability that Eve loads her attack successfully depends on the degree of the imperfection of FM rapidly, but the QBER induced by Eve's attack changes slightly with the degree of the FM imperfection.

  14. Panic disorder, panic attacks and panic attack symptoms across race-ethnic groups: results of the collaborative psychiatric epidemiology studies.

    PubMed

    Asnaani, Anu; Gutner, Cassidy A; Hinton, Devon E; Hofmann, Stefan G

    2009-01-01

    The current study investigates race-ethnic differences in rates of panic disorder, panic attacks and certain panic attack symptoms by jointly combining three major national epidemiological databases. The compared groups were White, African American, Latino and Asian. The White group had significantly higher rates of panic disorder, and of many panic symptoms, including palpitations, as compared to the African American, Asian and Latino groups. Several expected race-ethnic differences were not found. An explanation for these findings are adduced, and suggestions are given for future studies so that possible ethnic-racial differences in panic disorder, panic attacks and panic attack symptoms can be investigated in a more rigorous manner.

  15. Variability of clinical features in attacks of migraine with aura.

    PubMed

    Hansen, Jakob M; Goadsby, Peter J; Charles, Andrew C

    2016-03-01

    There is significant variability in the clinical presentation of migraine, both among patients, and between attacks in an individual patient. We examined clinical features of migraine with aura in a large group of patients enrolled in a clinical trial, and compared retrospective migraine attack characteristics reported upon enrollment in the trial with those recorded prospectively in the trial. Patients with migraine (n = 267) with typical visual aura in more than 30% of their attacks were enrolled from 16 centers for a clinical trial. Upon enrollment, patients provided a detailed retrospective description of the clinical features of their attacks of migraine. During the trial, clinical symptoms in migraine attacks starting with aura were recorded prospectively in 861 attacks. Retrospectively reported visual aura symptoms were variable and often overlapping; the most common symptoms were dots or flashing lights, wavy or jagged lines, blind spots, and tunnel vision. Multiple patients reported more than one visual phenomenon. Approximately half of the patients reported nonvisual aura symptoms, the most common were numbness and tingling, followed by difficulty in recalling or speaking words. A significant percentage of patients also reported a change in olfaction. There were several inconsistencies between the features of prospectively recorded and retrospectively reported attacks. Headache, nausea, photophobia, and phonophobia were all less common in prospectively recorded attacks as compared with retrospective reporting. Nausea was prospectively recorded in only 51% of attacks and mostly with mild intensity. The occurrence and severity of nausea was reduced with advancing patient age. Phonophobia was not consistently recorded in conjunction with photophobia. These findings are consistent with variable involvement of different brain regions during a migraine attack. The variable occurrence of nausea, and phonophobia in conjunction with photophobia, both defining

  16. Words Mean Things: The Case for Information System Attack and Control System Attack

    DTIC Science & Technology

    2008-10-31

    databases , reservation system, documents, web pages…”ix On the other hand, infrastructure control systems interact with the physical world, and...Week and Space Technology, 4 September 2002, 3, EBSCOhost (accessed 8 September 2008). xxvii Barnes, Julian E., “Hacking Could Become Weapon in...September 2002, EBSCOhost (accessed 8 September 2008). Gibson, Tim, “What You Should Know About Attacking Computer Networks

  17. Crescendo transient Aura attacks: a transient ischemic attack mimic caused by focal subarachnoid hemorrhage.

    PubMed

    Izenberg, Aaron; Aviv, Richard I; Demaerschalk, Bart M; Dodick, David W; Hopyan, Julia; Black, Sandra E; Gladstone, David J

    2009-12-01

    Diagnosis of transient ischemic attack can be difficult because many mimics exist. We report the clinical and neuroimaging features of a distinct hemorrhagic transient ischemic attack mimic. Case series. We describe 4 elderly patients presenting with a cluster of stereotyped somatosensory migraine auras, initially referred for "crescendo transient ischemic attacks". Neuroimaging in each patient revealed an unexpected finding of spontaneous focal subarachnoid hemorrhage conforming to a cortical sulcus in the contralateral hemisphere. We postulate that the episodic aura symptoms corresponded to recurrent cortical spreading depression triggered by the presence of subarachnoid blood, and speculate that such episodes could be a presenting feature of cerebral amyloid angiopathy in the absence of typical cerebral microbleeds or history of cognitive impairment. Focal subarachnoid hemorrhage can present clinically with transient repetitive migraine auras. Awareness of this entity is important because misdiagnosis as cerebral ischemic events could lead to incorrect treatment. We recommend that elderly patients presenting with a cluster of new unexplained migraine auras should be investigated ideally with MRI to detect focal subarachnoid hemorrhage.

  18. Israeli Adolescents' Coping Strategies in Relation to Terrorist Attacks

    ERIC Educational Resources Information Center

    Tatar, Moshe; Amram, Sima

    2007-01-01

    Exposure to terrorism seriously threatens the well-being of children and adolescents. Israeli citizens have witnessed massive ongoing terrorist attacks during the last few years. The present research, conducted among 330 Israeli adolescents, examined coping strategies in relation to terrorist attacks. We found that adolescents utilize more…

  19. Are Risk Assessments of a Terrorist Attack Coherent?

    ERIC Educational Resources Information Center

    Mandel, David R.

    2005-01-01

    Four experiments examined 3 types of violations of coherence criteria in risk assessments of a terrorist attack. First, the requirement that extensionally equivalent descriptions be assigned the same probability (i.e., additivity) was violated. Unpacking descriptions of an attack into subtypes led to an increase in assessed risk. Second,…

  20. Sequential defense against random and intentional attacks in complex networks.

    PubMed

    Chen, Pin-Yu; Cheng, Shin-Ming

    2015-02-01

    Network robustness against attacks is one of the most fundamental researches in network science as it is closely associated with the reliability and functionality of various networking paradigms. However, despite the study on intrinsic topological vulnerabilities to node removals, little is known on the network robustness when network defense mechanisms are implemented, especially for networked engineering systems equipped with detection capabilities. In this paper, a sequential defense mechanism is first proposed in complex networks for attack inference and vulnerability assessment, where the data fusion center sequentially infers the presence of an attack based on the binary attack status reported from the nodes in the network. The network robustness is evaluated in terms of the ability to identify the attack prior to network disruption under two major attack schemes, i.e., random and intentional attacks. We provide a parametric plug-in model for performance evaluation on the proposed mechanism and validate its effectiveness and reliability via canonical complex network models and real-world large-scale network topology. The results show that the sequential defense mechanism greatly improves the network robustness and mitigates the possibility of network disruption by acquiring limited attack status information from a small subset of nodes in the network.

  1. For Heart Attack Survivors, a Risk of Suicide?

    MedlinePlus

    ... https://medlineplus.gov/news/fullstory_162414.html For Heart Attack Survivors, a Risk of Suicide? Study findings underscore ... 2016 (HealthDay News) -- People who've suffered a heart attack or unstable angina may face a higher-than- ...

  2. New Attacks on Animal Researchers Provoke Anger and Worry

    ERIC Educational Resources Information Center

    Guterman, Lila

    2008-01-01

    This article reports on firebomb attacks at the homes of two animal researchers which have provoked anger and unease. The firebomb attacks, which set the home of a neuroscientist at the University of California at Santa Cruz aflame and destroyed a car parked in the driveway of another university researcher's home, have left researchers and…

  3. Panic disorder with nocturnal panic attacks: symptoms and comorbidities.

    PubMed

    Sarísoy, Gökhan; Böke, Omer; Arík, Ali C; Sahin, Ahmet R

    2008-04-01

    The aim of this study was to determine the relationship between nocturnal panic attacks and comorbidities, clinical variables and panic attack symptoms. One hundred and six consecutive patients with DSM-IV panic disorder were enrolled in the study. The patients were divided into two groups depending on the presence of nocturnal panic attacks. Comorbidities were diagnosed with the help of SCID-I and SCID-II. The groups were compared using the Beck Depression Inventory, State-Trait Anxiety Inventory and Symptom Checklist. Nocturnal panic attacks were not related to comorbidities or age at the onset of the disease. The scores from the Beck Depression Inventory, general scores from the Symptom Checklist, somatization, obsession-compulsion, interpersonal sensitivity and anger-hostility sub-scale scores were higher in the nocturnal panic attack group. Patients with nocturnal panic attacks experience more frequent respiratory symptoms, suggesting that nocturnal panic attacks may be related to respiratory symptoms. Our findings demonstrate that patients with nocturnal panic attacks have more respiratory symptoms of panic, depressive and other psychiatric symptoms than the no nocturnal panic group.

  4. Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment

    NASA Technical Reports Server (NTRS)

    Kebert, Alan; Barnejee, Bikramjit; Solano, Juan; Solano, Wanda

    2013-01-01

    The cloud computing environment offers malicious users the ability to spawn multiple instances of cloud nodes that are similar to virtual machines, except that they can have separate external IP addresses. In this paper we demonstrate how this ability can be exploited by an attacker to distribute his/her attack, in particular SQL injection attacks, in such a way that an intrusion detection system (IDS) could fail to identify this attack. To demonstrate this, we set up a small private cloud, established a vulnerable website in one instance, and placed an IDS within the cloud to monitor the network traffic. We found that an attacker could quite easily defeat the IDS by periodically altering its IP address. To detect such an attacker, we propose to use multi-agent plan recognition, where the multiple source IPs are considered as different agents who are mounting a collaborative attack. We show that such a formulation of this problem yields a more sophisticated approach to detecting SQL injection attacks within a cloud computing environment.

  5. Is There Anybody There? A Psychodynamic View of Panic Attack.

    ERIC Educational Resources Information Center

    Rizq, Rosemary

    2002-01-01

    Presents a process analysis of a psychodynamic intervention for a client with panic attacks. Discusses how a psychodynamic understanding of the complex etiology of the client's panic attacks that ultimately produced improved coping skills and a subjective sense of improvement for her. Process analysis is used to illustrate the theoretical base,…

  6. The Icatibant Outcome Survey: treatment of laryngeal angioedema attacks

    PubMed Central

    Aberer, Werner; Bouillet, Laurence; Caballero, Teresa; Maurer, Marcus; Fabien, Vincent; Zanichelli, Andrea

    2016-01-01

    Objective To characterize the management and outcomes of life-threatening laryngeal attacks of hereditary angioedema (HAE) treated with icatibant in the observational Icatibant Outcome Survey (NCT01034969) registry. Methods This retrospective analysis was based on data from patients with HAE type I/II who received healthcare professional-administered or self-administered icatibant to treat laryngeal attacks between September 2008 and May 2013. Results Twenty centers in seven countries contributed data. Overall, 42 patients with HAE experienced 67 icatibant-treated laryngeal attacks. Icatibant was self-administered for 62.3% of attacks (healthcare professional-administered, 37.7%). One icatibant injection was used for 87.9% of attacks, with rescue or concomitant medication used for 9.0%. The median time to treatment was 2.0 h (n=31 attacks) and the median time to resolution was 6.0 h (n=35 attacks). Conclusions This analysis describes successful use of icatibant for the treatment of laryngeal HAE attacks in a real-world setting. PMID:27116379

  7. Examining Willingness to Attack Critical Infrastructure Online and Offline

    ERIC Educational Resources Information Center

    Holt, Thomas J.; Kilger, Max

    2012-01-01

    The continuing adoption of technologies by the general public coupled with the expanding reliance of critical infrastructures connected through the Internet has created unique opportunities for attacks by civilians and nation-states alike. Although governments are increasingly focusing on policies to deter nation-state level attacks, it is unclear…

  8. Cube-Type Algebraic Attacks on Wireless Encryption Protocols

    DTIC Science & Technology

    2009-09-01

    15. NUMBER OF PAGES 99 14 . SUBJECT TERMS Wireless Security, Cryptanalysis, Boolean Functions, Algebraic Attacks, Correlation Attacks, Cube...Correspondence of the Finite Field....... 12 3. Boolean Function .................................................................. 14 4. Hamming...a a a a     ; continue in that fashion up to the element where there is repetition ( 7a ). 14 3. Boolean Function Definition 2.6: A Boolean

  9. Are Risk Assessments of a Terrorist Attack Coherent?

    ERIC Educational Resources Information Center

    Mandel, David R.

    2005-01-01

    Four experiments examined 3 types of violations of coherence criteria in risk assessments of a terrorist attack. First, the requirement that extensionally equivalent descriptions be assigned the same probability (i.e., additivity) was violated. Unpacking descriptions of an attack into subtypes led to an increase in assessed risk. Second,…

  10. Is There Anybody There? A Psychodynamic View of Panic Attack.

    ERIC Educational Resources Information Center

    Rizq, Rosemary

    2002-01-01

    Presents a process analysis of a psychodynamic intervention for a client with panic attacks. Discusses how a psychodynamic understanding of the complex etiology of the client's panic attacks that ultimately produced improved coping skills and a subjective sense of improvement for her. Process analysis is used to illustrate the theoretical base,…

  11. Effectiveness of the call in beach volleyball attacking play.

    PubMed

    Künzell, Stefan; Schweikart, Florian; Köhn, Daniel; Schläppi-Lienhard, Olivia

    2014-12-09

    In beach volleyball the setter has the opportunity to give her or his hitter a "call". The call intends that the setter suggests to her or his partner where to place the attack in the opponent's court. The effectiveness of a call is still unknown. We investigated the women's and men's Swiss National Beach Volleyball Championships in 2011 and analyzed 2185 attacks. We found large differences between female and male players. While men called in only 38.4% of attacks, women used calls in 85.5% of attacks. If the male players followed a given call, 63% of the attacks were successful. The success rate of attacks without any call was 55.8% and 47.6% when the call was ignored. These differences were not significant (χ(2)(2) = 4.55, p = 0.103). In women's beach volleyball, the rate of successful attacks was 61.5% when a call was followed, 35% for attacks without a call, and 42.6% when a call was ignored. The differences were highly significant (χ(2)(2) = 23.42, p < 0.0005). Taking into account the findings of the present study, we suggested that the call was effective in women's beach volleyball, while its effect in men's game was unclear. Considering the quality of calls we indicate that there is a significant potential to increase the effectiveness of a call.

  12. Effectiveness of the Call in Beach Volleyball Attacking Play

    PubMed Central

    Künzell, Stefan; Schweikart, Florian; Köhn, Daniel; Schläppi-Lienhard, Olivia

    2014-01-01

    In beach volleyball the setter has the opportunity to give her or his hitter a “call”. The call intends that the setter suggests to her or his partner where to place the attack in the opponent’s court. The effectiveness of a call is still unknown. We investigated the women’s and men’s Swiss National Beach Volleyball Championships in 2011 and analyzed 2185 attacks. We found large differences between female and male players. While men called in only 38.4% of attacks, women used calls in 85.5% of attacks. If the male players followed a given call, 63% of the attacks were successful. The success rate of attacks without any call was 55.8% and 47.6% when the call was ignored. These differences were not significant (χ2(2) = 4.55, p = 0.103). In women’s beach volleyball, the rate of successful attacks was 61.5% when a call was followed, 35% for attacks without a call, and 42.6% when a call was ignored. The differences were highly significant (χ2(2) = 23.42, p < 0.0005). Taking into account the findings of the present study, we suggested that the call was effective in women’s beach volleyball, while its effect in men’s game was unclear. Considering the quality of calls we indicate that there is a significant potential to increase the effectiveness of a call. PMID:25713679

  13. Israeli Adolescents' Coping Strategies in Relation to Terrorist Attacks

    ERIC Educational Resources Information Center

    Tatar, Moshe; Amram, Sima

    2007-01-01

    Exposure to terrorism seriously threatens the well-being of children and adolescents. Israeli citizens have witnessed massive ongoing terrorist attacks during the last few years. The present research, conducted among 330 Israeli adolescents, examined coping strategies in relation to terrorist attacks. We found that adolescents utilize more…

  14. Economic cost of initial attack and large-fire suppression

    Treesearch

    Armando González-Cabán

    1983-01-01

    A procedure has been developed for estimating the economic cost of initial attack and large-fire suppression. The procedure uses a per-unit approach to estimate total attack and suppression costs on an input-by-input basis. Fire management inputs (FMIs) are the production units used. All direct and indirect costs are charged to the FMIs. With the unit approach, all...

  15. Word-Attack Skills in Individuals with Mental Retardation

    ERIC Educational Resources Information Center

    Saunders, Kathryn J.

    2007-01-01

    This article assesses the state of the literature on word-attack skills and phonological awareness (PA) in individuals with mental retardation, in light of progress towards the development of effective teaching procedures. The literature contains promising findings. Studies have shown PA to be correlated with word-attack skills in individuals with…

  16. Public Figure Attacks in the United States, 1995-2015.

    PubMed

    Meloy, J Reid; Amman, Molly

    2016-09-01

    An archival descriptive study of public figure attackers in the United States between 1995 and 2015 was undertaken. Fifty-six incidents were identified, primarily through exhaustive internet searches, composed of 58 attackers and 58 victims. A code book was developed which focused upon victims, offenders, pre-attack behaviors including direct threats, attack characteristics, post-offense and other outcomes, motivations and psychological abstracts. The average interrater agreement for coding of bivariate variables was 0.835 (intraclass correlation coefficient). The three most likely victim categories were politicians, judges, and athletes. Attackers were males, many with a psychiatric disorder, most were grandiose, and most had both a violent and nonviolent criminal history. The known motivations for the attacks were often angry and personal, the most common being dissatisfaction with a judicial or other governmental process (23%). In only one case was the primary motivation to achieve notoriety. Lethality risk during an attack was 55%. Collateral injury or death occurred in 29% of the incidents. Only 5% communicated a direct threat to the target beforehand. The term "publicly intimate figure" is introduced to describe the sociocultural blurring of public and private lives among the targets, and its possible role in some attackers' perceptions and motivations. Copyright © 2016 John Wiley & Sons, Ltd.

  17. Hereditary Angioedema Attacks: Local Swelling at Multiple Sites.

    PubMed

    Hofman, Zonne L M; Relan, Anurag; Hack, C Erik

    2016-02-01

    Hereditary angioedema (HAE) patients experience recurrent local swelling in various parts of the body including painful swelling of the intestine and life-threatening laryngeal oedema. Most HAE literature is about attacks located in one anatomical site, though it is mentioned that HAE attacks may also involve multiple anatomical sites simultaneously. A detailed description of such multi-location attacks is currently lacking. This study investigated the occurrence, severity and clinical course of HAE attacks with multiple anatomical locations. HAE patients included in a clinical database of recombinant human C1-inhibitor (rhC1INH) studies were evaluated. Visual analog scale scores filled out by the patients for various symptoms at various locations and investigator symptoms scores during the attack were analysed. Data of 219 eligible attacks in 119 patients was analysed. Thirty-three patients (28%) had symptoms at multiple locations in anatomically unrelated regions at the same time during their first attack. Up to five simultaneously affected locations were reported. The observation that severe HAE attacks often affect multiple sites in the body suggests that HAE symptoms result from a systemic rather than from a local process as is currently believed.

  18. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) LICENSES, CERTIFICATIONS, AND APPROVALS FOR NUCLEAR POWER PLANTS General Provisions § 52.10 Attacks and destructive acts. Neither an applicant for a license to manufacture...

  19. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) LICENSES, CERTIFICATIONS, AND APPROVALS FOR NUCLEAR POWER PLANTS General Provisions § 52.10 Attacks and destructive acts. Neither an applicant for a license to manufacture...

  20. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) LICENSES, CERTIFICATIONS, AND APPROVALS FOR NUCLEAR POWER PLANTS General Provisions § 52.10 Attacks and destructive acts. Neither an applicant for a license to manufacture...

  1. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) LICENSES, CERTIFICATIONS, AND APPROVALS FOR NUCLEAR POWER PLANTS General Provisions § 52.10 Attacks and destructive acts. Neither an applicant for a license to manufacture...

  2. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) LICENSES, CERTIFICATIONS, AND APPROVALS FOR NUCLEAR POWER PLANTS General Provisions § 52.10 Attacks and destructive acts. Neither an applicant for a license to manufacture...

  3. New Attacks on Animal Researchers Provoke Anger and Worry

    ERIC Educational Resources Information Center

    Guterman, Lila

    2008-01-01

    This article reports on firebomb attacks at the homes of two animal researchers which have provoked anger and unease. The firebomb attacks, which set the home of a neuroscientist at the University of California at Santa Cruz aflame and destroyed a car parked in the driveway of another university researcher's home, have left researchers and…

  4. "Dateline NBC"'s Persuasive Attack on Wal-Mart.

    ERIC Educational Resources Information Center

    Benoit, William L.; Dorries, Bruce

    1996-01-01

    Develops a typology of persuasive attack strategies. Identifies two key components of persuasive attack: responsibility and offensiveness. Describes several strategies for intensifying each of these elements. Applies this analysis to "Dateline NBC"'s allegations that Wal-Mart's "Buy American" campaign was deceptive. Concludes…

  5. Examining Willingness to Attack Critical Infrastructure Online and Offline

    ERIC Educational Resources Information Center

    Holt, Thomas J.; Kilger, Max

    2012-01-01

    The continuing adoption of technologies by the general public coupled with the expanding reliance of critical infrastructures connected through the Internet has created unique opportunities for attacks by civilians and nation-states alike. Although governments are increasingly focusing on policies to deter nation-state level attacks, it is unclear…

  6. [Banana tree pests attacking Heliconia latispatha Benth. (Heliconiaceae)].

    PubMed

    Watanabe, Maria A

    2007-01-01

    In mid-May 2005, the caterpillars Antichloris eriphia (Fabr.) (Lepidoptera: Arctiidae) and Calligo illioneus (Cramer) (Lepidoptera: Nymphalidae) which are banana tree pests, were found attacking six-month old stalks of Heliconia latispatha Benth., planted near a banana tree plantation in Jaguariuna, SP, Brazil. The attack by C. illioneus is observed by the first time in Brazil.

  7. Studies on sulfate attack: Mechanisms, test methods, and modeling

    NASA Astrophysics Data System (ADS)

    Santhanam, Manu

    The objective of this research study was to investigate various issues pertaining to the mechanism, testing methods, and modeling of sulfate attack in concrete. The study was divided into the following segments: (1) effect of gypsum formation on the expansion of mortars, (2) attack by the magnesium ion, (3) sulfate attack in the presence of chloride ions---differentiating seawater and groundwater attack, (4) use of admixtures to mitigate sulfate attack---entrained air, sodium citrate, silica fume, and metakaolin, (5) effects of temperature and concentration of the attack solution, (6) development of new test methods using concrete specimens, and (7) modeling of the sulfate attack phenomenon. Mortar specimens using portland cement (PC) and tricalcium silicate (C 3S), with or without mineral admixtures, were prepared and immersed in different sulfate solutions. In addition to this, portland cement concrete specimens were also prepared and subjected to complete and partial immersion in sulfate solutions. Physical measurements, chemical analyses and microstructural studies were performed periodically on the specimens. Gypsum formation was seen to cause expansion of the C3S mortar specimens. Statistical analyses of the data also indicated that the quantity of gypsum was the most significant factor controlling the expansion of mortar bars. The attack by magnesium ion was found to drive the reaction towards the formation of brucite. Decalcification of the C-S-H and its subsequent conversion to the non-cementitious M-S-H was identified as the mechanism of destruction in magnesium sulfate attack. Mineral admixtures were beneficial in combating sodium sulfate attack, while reducing the resistance to magnesium sulfate attack. Air entrainment did not change the measured physical properties, but reduced the visible distress of the mortars. Sodium citrate caused a substantial reduction in the rate of damage of the mortars due to its retarding effect. Temperature and

  8. Weak laws against acid attacks on women: an Indian perspective.

    PubMed

    Ahmad, Nehaluddin

    2012-01-01

    Acid attacks, especially on women, have seen an alarming growth in India over the last decade. While these attacks can be attributed to various factors such as the social weakness of women in a male-dominated society, the situation is exacerbated by the general neglect of the lawmakers. As acid is inexpensive and easily available, it serves as an ideal weapon for the perpetrators. Further, as this offence is bailable in certain situations, the punishment does not act as a sufficient deterrent in most cases. This paper describes the horrendous effects that acid attacks have on the victims physically, psychologically and socially. It also examines the contemporary laws governing acid attacks on victims and offenders. Ideas for a better legal approach will also be examined with special reference to acid attacks as a crime, and the validity of specific legal provisions for female victims.

  9. Attacks on Bluetooth Security Architecture and Its Countermeasures

    NASA Astrophysics Data System (ADS)

    Iqbal, Mian Muhammad Waseem; Kausar, Firdous; Wahla, Muhammad Arif

    WPANs compliment the traditional IEEE 802.11 wireless networks by facilitating the clients with flexibility in network topologies, higher mobility and relaxed configuration/hardware requirements. Bluetooth, a WPAN technology, is an open standard for short-range radio frequency (RF) communication. However, it is also susceptible to typical security threats found in wireless LANs. This paper discuses some of the attack scenarios against the bluetooth network such as hostile intrusion, active Man-in-the-Middle (MITM) attack using unit key and various forms of denial of service (DoS) attacks. These threats and attacks compromise the confidentiality and availability of bluetooth data and services. This paper proposes an improved security architecture for bluetooth device which provides protection against the above mentioned attacks.

  10. Step to improve neural cryptography against flipping attacks.

    PubMed

    Zhou, Jiantao; Xu, Qinzhen; Pei, Wenjiang; He, Zhenya; Szu, Harold

    2004-12-01

    Synchronization of neural networks by mutual learning has been demonstrated to be possible for constructing key exchange protocol over public channel. However, the neural cryptography schemes presented so far are not the securest under regular flipping attack (RFA) and are completely insecure under majority flipping attack (MFA). We propose a scheme by splitting the mutual information and the training process to improve the security of neural cryptosystem against flipping attacks. Both analytical and simulation results show that the success probability of RFA on the proposed scheme can be decreased to the level of brute force attack (BFA) and the success probability of MFA still decays exponentially with the weights' level L. The synchronization time of the parties also remains polynomial with L. Moreover, we analyze the security under an advanced flipping attack.

  11. Respiratory control as a treatment for panic attacks.

    PubMed

    Clark, D M; Salkovskis, P M; Chalkley, A J

    1985-03-01

    Eighteen patients who experienced frequent panic attacks were given a treatment derived from the literature on hyperventilation and anxiety. The treatment consisted of (i) brief, voluntary hyperventilation. This was intended to induce a mild panic attack; (ii) explanation of the effects of overbreathing and reattribution of the cause of a patient's attacks to hyperventilation; (iii) training in a respiratory control technique. Substantial reductions in panic attack frequency and in self-reported fear during a behaviour test were obtained after 2 weeks' treatment and these reductions occurred in the absence of exposure to feared situations. Further reductions in panic attack frequency were evident at 6-month and 2-year follow-up though interpretation of these results is complicated by the addition of exposure and other psychological treatments.

  12. Expected losses, insurability, and benefits from reducing vulnerability to attacks.

    SciTech Connect

    Nozick, Linda Karen; Carlson, Rolf Erik; Turnquist, Mark Alan

    2004-03-01

    A model of malicious attacks against an infrastructure system is developed that uses a network representation of the system structure together with a Hidden Markov Model of an attack at a node of that system and a Markov Decision Process model of attacker strategy across the system as a whole. We use information systems as an illustration, but the analytic structure developed can also apply to attacks against physical facilities or other systems that provide services to customers. This structure provides an explicit mechanism to evaluate expected losses from malicious attacks, and to evaluate changes in those losses that would result from system hardening. Thus, we provide a basis for evaluating the benefits of system hardening. The model also allows investigation of the potential for the purchase of an insurance contract to cover the potential losses when safeguards are breached and the system fails.

  13. Public knowledge of heart attack in a Nepalese population survey.

    PubMed

    Limbu, Yuba R; Malla, Rabi; Regmi, Shyam R; Dahal, Ramesh; Nakarmi, Hari L; Yonzan, Ganesh; Gartaula, Ritu P

    2006-01-01

    Limited knowledge of heart attack symptoms may prevent patients from seeking time-dependent thrombolytic therapy, an intervention that offers impressive survival benefit. Previous studies carried out in developed countries demonstrated a deficit of knowledge about a wide range of heart attack symptoms. The aim of this study was to describe knowledge of heart attack, knowledge of heart attack symptoms, and anticipated first response to symptoms among the lay public in Nepal. A total of 1192 participants (657 men and 535 women age 16 to 88 years old) were interviewed in a cross-sectional manner. Those <16 years of age, all health professionals, and individuals with a history of heart attack were excluded. A total of 862 (72.3%) participants had heard of heart attack. Significantly more male than female participants had heard of heart attack (P <.001). Of the respondents, 91.7% with >or=10 years of education (ED-2) had heard of heart of attack, whereas only 54% respondents with <10 years of education or who were illiterate (unable to read and write) (ED-1) had heard of heart attack, and in both the male and female populations, a higher percentage of the ED-2 group had heard of heart attack than the ED-1 group (92.6% vs. 60% and 85.6% vs. 49.6%, respectively). A significantly higher number of respondents from 31 to 50 years of age (AGE-2) had heard of heart attack than those 16 to 30 years of age (AGE-1) and those >50 years of age (AGE-3) (P <.001). Among 862 respondents who had heard of heart attack, 21.3% could not name any heart attack symptoms. A total of 16 different heart attack symptoms were named. Fainting or collapsing (48%), chest pain (22.4%), shortness of breath (9%), dizziness (8.4%), palpitations (7.4%), and sweating (7.4%) were the leading symptoms named by respondents. Fainting or collapsing and chest pain and shortness of breath were named more frequently among the ED-2 group respondents and the AGE-3 group men. Only 3.7% could name >or=2 typical heart

  14. A Taxonomy of Attacks on the DNP3 Protocol

    NASA Astrophysics Data System (ADS)

    East, Samuel; Butts, Jonathan; Papa, Mauricio; Shenoi, Sujeet

    Distributed Network Protocol (DNP3) is the predominant SCADA protocol in the energy sector - more than 75% of North American electric utilities currently use DNP3 for industrial control applications. This paper presents a taxonomy of attacks on the protocol. The attacks are classified based on targets (control center, outstation devices and network/communication paths) and threat categories (interception, interruption, modification and fabrication). To facilitate risk analysis and mitigation strategies, the attacks are associated with the specific DNP3 protocol layers they exploit. Also, the operational impact of the attacks is categorized in terms of three key SCADA objectives: process confi- dentiality, process awareness and process control. The attack taxonomy clarifies the nature and scope of the threats to DNP3 systems, and can provide insights into the relative costs and benefits of implementing mitigation strategies.

  15. DDoS Attack Detection Algorithms Based on Entropy Computing

    NASA Astrophysics Data System (ADS)

    Li, Liying; Zhou, Jianying; Xiao, Ning

    Distributed Denial of Service (DDoS) attack poses a severe threat to the Internet. It is difficult to find the exact signature of attacking. Moreover, it is hard to distinguish the difference of an unusual high volume of traffic which is caused by the attack or occurs when a huge number of users occasionally access the target machine at the same time. The entropy detection method is an effective method to detect the DDoS attack. It is mainly used to calculate the distribution randomness of some attributes in the network packets' headers. In this paper, we focus on the detection technology of DDoS attack. We improve the previous entropy detection algorithm, and propose two enhanced detection methods based on cumulative entropy and time, respectively. Experiment results show that these methods could lead to more accurate and effective DDoS detection.

  16. IVs to Skip for Immunizing WEP against FMS Attack

    NASA Astrophysics Data System (ADS)

    Kobara, Kazukuni; Imai, Hideki

    The WEP (Wired Equivalent Privacy) is a part of IEEE 802.11 standard designed for protecting over-the-air communication. While almost all of the WLAN (Wireless LAN) cards and the APs (Access Points) support WEP, a serious key recovery attack (aka FMS attack) was identified by Fluhrer et al. The FMS attack can basically be prevented by skipping IVs (Initial Values) used in the attack, but naive skip methods reveal information on the WEP key since most of them depend on the WEP key and the patterns of the skipped IV reveal it. In order to skip IVs safely, the skip patterns must be chosen carefully. In this paper, we review the attack conditions (6) and (7), whose success probability is the highest, 0.05, amongst all known conditions to guess one key-byte from one packet. Then we identify their safe skip patterns.

  17. The Application of Baum-Welch Algorithm in Multistep Attack

    PubMed Central

    Zhang, Yanxue; Zhao, Dongmei; Liu, Jinxing

    2014-01-01

    The biggest difficulty of hidden Markov model applied to multistep attack is the determination of observations. Now the research of the determination of observations is still lacking, and it shows a certain degree of subjectivity. In this regard, we integrate the attack intentions and hidden Markov model (HMM) and support a method to forecasting multistep attack based on hidden Markov model. Firstly, we train the existing hidden Markov model(s) by the Baum-Welch algorithm of HMM. Then we recognize the alert belonging to attack scenarios with the Forward algorithm of HMM. Finally, we forecast the next possible attack sequence with the Viterbi algorithm of HMM. The results of simulation experiments show that the hidden Markov models which have been trained are better than the untrained in recognition and prediction. PMID:24991642

  18. Proximity-to-goal as a constraint on patterns of behaviour in attacker-defender dyads in team games.

    PubMed

    Headrick, Jonathon; Davids, Keith; Renshaw, Ian; Araújo, Duarte; Passos, Pedro; Fernandes, Orlando

    2012-01-01

    The aim of this study was to determine whether spatiotemporal interactions between footballers and the ball in 1 vs. 1 sub-phases are influenced by their proximity to the goal area. Twelve participants (age 15.3 ± 0.5 years) performed as attackers and defenders in 1 vs. 1 dyads across three field positions: (a) attacking the goal, (b) in midfield, and (c) advancing away from the goal area. In each position, the dribbler was required to move beyond an immediate defender with the ball towards the opposition goal. Interactions of attacker-defender dyads were filmed with player and ball displacement trajectories digitized using manual tracking software. One-way repeated measures analysis of variance was used to examine differences in mean defender-to-ball distance after this value had stabilized. Maximum attacker-to-ball distance was also compared as a function of proximity-to-goal. Significant differences were observed for defender-to-ball distance between locations (a) and (c) at the moment when the defender-to-ball distance had stabilized (a: 1.69 ± 0.64 m; c: 1.15 ± 0.59 m; P < 0.05). Findings indicate that proximity-to-goal influenced the performance of players, particularly when attacking or advancing away from goal areas, providing implications for training design in football. In this study, the task constraints of football revealed subtly different player interactions than observed in previous studies of dyadic systems in basketball and rugby union.

  19. Metrics for Assessment of Smart Grid Data Integrity Attacks

    SciTech Connect

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  20. Node Survival in Networks under Correlated Attacks

    PubMed Central

    Hao, Yan; Armbruster, Dieter; Hütt, Marc-Thorsten

    2015-01-01

    We study the interplay between correlations, dynamics, and networks for repeated attacks on a socio-economic network. As a model system we consider an insurance scheme against disasters that randomly hit nodes, where a node in need receives support from its network neighbors. The model is motivated by gift giving among the Maasai called Osotua. Survival of nodes under different disaster scenarios (uncorrelated, spatially, temporally and spatio-temporally correlated) and for different network architectures are studied with agent-based numerical simulations. We find that the survival rate of a node depends dramatically on the type of correlation of the disasters: Spatially and spatio-temporally correlated disasters increase the survival rate; purely temporally correlated disasters decrease it. The type of correlation also leads to strong inequality among the surviving nodes. We introduce the concept of disaster masking to explain some of the results of our simulations. We also analyze the subsets of the networks that were activated to provide support after fifty years of random disasters. They show qualitative differences for the different disaster scenarios measured by path length, degree, clustering coefficient, and number of cycles. PMID:25932635

  1. Node Survival in Networks under Correlated Attacks.

    PubMed

    Hao, Yan; Armbruster, Dieter; Hütt, Marc-Thorsten

    2015-01-01

    We study the interplay between correlations, dynamics, and networks for repeated attacks on a socio-economic network. As a model system we consider an insurance scheme against disasters that randomly hit nodes, where a node in need receives support from its network neighbors. The model is motivated by gift giving among the Maasai called Osotua. Survival of nodes under different disaster scenarios (uncorrelated, spatially, temporally and spatio-temporally correlated) and for different network architectures are studied with agent-based numerical simulations. We find that the survival rate of a node depends dramatically on the type of correlation of the disasters: Spatially and spatio-temporally correlated disasters increase the survival rate; purely temporally correlated disasters decrease it. The type of correlation also leads to strong inequality among the surviving nodes. We introduce the concept of disaster masking to explain some of the results of our simulations. We also analyze the subsets of the networks that were activated to provide support after fifty years of random disasters. They show qualitative differences for the different disaster scenarios measured by path length, degree, clustering coefficient, and number of cycles.

  2. Transient ischaemic attacks: mimics and chameleons

    PubMed Central

    Nadarajan, V; Perry, R J; Johnson, J; Werring, D J

    2014-01-01

    Suspected transient ischaemic attack (TIA) is a common diagnostic challenge for physicians in neurology, stroke, general medicine and primary care. It is essential to identify TIAs promptly because of the very high early risk of ischaemic stroke, requiring urgent investigation and preventive treatment. On the other hand, it is also important to identify TIA ‘mimics’, to avoid unnecessary and expensive investigations, incorrect diagnostic labelling and inappropriate long-term prevention treatment. Although the pathophysiology of ischaemic stroke and TIA is identical, and both require rapid and accurate diagnosis, the differential diagnosis differs for TIA owing to the transience of symptoms. For TIA the diagnostic challenge is greater, and the ‘mimic’ rate higher (and more varied), because there is no definitive diagnostic test. TIA heralds a high risk of early ischaemic stroke, and in many cases the stroke can be prevented if the cause is identified, hence the widespread dissemination of guidelines including rapid assessment and risk tools like the ABCD2 score. However, these guidelines do not emphasise the substantial challenges in making the correct diagnosis in patients with transient neurological symptoms. In this article we will mainly consider the common TIA mimics, but also briefly mention the rather less common situations where TIAs can look like something else (‘chameleons’). PMID:24453269

  3. Aseptic meningoencephalitis mimicking transient ischaemic attacks.

    PubMed

    Papavasileiou, V; Milionis, H; Cordier, M; Eskandari, A; Ntaios, G; Michel, P

    2013-04-01

    To highlight meningoencephalitis as a transient ischaemic attack (TIA) mimic and suggest clinical clues for differential diagnosis. This was an observational study of consecutively admitted patients over a 9.75-year period presenting as TIAs at a stroke unit. A total of 790 patients with TIAs and seven with TIA-like symptoms but a final diagnosis of viral meningoencephalitis were recognised. The most frequent presentations of meningoencephalitis patients were acute sensory hemisyndrome (6) and cognitive deficits (5). Signs of meningeal irritation were minor or absent on presentation. Predominantly lymphocytic pleocytosis, hyperproteinorachia and a normal cerebrospinal fluid (CSF)/serum glucose index (in 5 out of 6 documented patients) were present. Meningeal thickening on a brain magnetic resonance imaging (MRI) scan was the only abnormal imaging finding. Six patients received initial vascular treatment; one thrombolysed. Finally, six patients were treated with antivirals and/or antibiotics. Although neither bacterial nor viral agents were identified on extensive testing, viral meningoencephalitis was the best explanation for all clinical and laboratory findings. Aseptic meningoencephalitis should be part of the differential diagnosis in patients presenting as TIA. The threshold for a lumbar puncture in such patients should be set individually and take into account the presence of mild meningeal symptoms, age and other risk factors for vascular disease, the results of brain imaging and the basic diagnostic work-up for a stroke source.

  4. Preventing Heart Attacks and Strokes: Increasing Awareness ...

    EPA Pesticide Factsheets

    Summary: Chronic cardiovascular disease imposes a significant health and economic burden on individuals and communities. Despite decades of improvement in cardiovascular mortality, cardiovascular disease and stroke remain the leading cause of death in the U.S. and disparities in health outcomes persist. Moreover, the continuous improvement in cardiovascular mortality typical of the last four decades has ended motivating new and innovative approaches to improve population health and wellbeing. Apart from continued focus on traditional risk factor modification such as identification and treatment of high blood pressure and cholesterol, cessation of smoking, and appropriate use of evidence-based pharmacological prevention measures and disease management, other factors should be considered such as increasing physical activity, dietary sodium reduction and modification of social and environmental determinants known to cause heart attacks and stroke and exacerbate vascular disease. Such an approach will require greater cooperation among public health, environmental health, the broader public and private healthcare delivery and payment systems, and federal agencies. To introduce this concept the U.S. EPA held a workshop in September 2016 bringing together representatives of local and state public health officials, the healthcare system, educators, data analytics, and federal partners (CMS, CDC, Dept. of State and EPA) for the purpose of exploring the idea of prom

  5. Assessment and treatment of nocturnal panic attacks.

    PubMed

    Craske, Michelle G; Tsao, Jennie C I

    2005-06-01

    Nocturnal panic (NP), waking from sleep in a state of panic, is a common occurrence among patients with panic disorder, with 44-71% reporting at least one such attack. NP is a non-REM event that is distinct from sleep terrors, sleep apnea, nightmares or dream-induced arousals. This review outlines recent advances in the characterization of NP, as well as current approaches to the assessment and treatment of NP. In contrast to earlier work, more recent studies suggest that patients with NP do not differ from patients without NP on sleep architecture, sleep physiology, self-reported sleep quality and severity of panic disorder. However, more precise measurement of physiological precipitants and features is warranted. Assessment of NP focuses on ruling out other explanations for NP, with differential diagnosis based on interviews, sleep polysomnography and ambulatory recording of sleep. Psychological treatment (cognitive-behavioral therapy) targets misappraisals of anxiety sensations, hyperventilatory response, and conditioned reactions to internal, physical cues. Recent evidence supports the efficacy of this approach, however, controlled studies on pharmacological agents in the treatment of NP are lacking. Research is needed to examine the effects of combined cognitive-behavioral therapy and medications, compared to medication alone in the treatment of NP.

  6. Plasma vasopressin levels in induced migraine attacks.

    PubMed

    Peatfield, R C; Hampton, K K; Grant, P J

    1988-03-01

    Vasopressin (aVP) at low concentrations functions as an antidiuretic hormone and has vasoconstrictive effects. To investigate the possible role of aVP in the pathogenesis of migraine, six patients with a history of induced migraine were given 100 g chocolate, and blood samples for plasma aVP were taken before ingestion and every hour for 4 h. In one patient who presented with severe headache and nausea the base-line plasma aVP concentration was 15.2 pg/ml; it fell to 3.2 pg/ml at 2 h before rising to 10 pg/ml at 3 h and 4 h as the symptoms worsened. In the five patients with moderate or no headache plasma aVP concentrations remained in the normal range (less than 3 pg/ml) throughout. The results suggest that aVP does not have a role in the aetiology of migraine. The possibility exists that during severe attacks of nausea there is release of aVP, which may be responsible for the facial pallor, antidiuresis, and coagulation abnormalities occasionally observed in migraine.

  7. Anxiety and inhibition of panic attacks within translational and prospective research contexts.

    PubMed

    Cabral, Ruan; Nardi, Antonio Egídio

    2012-01-01

    Basic research involving animal models is an important tool to improve our understanding of clinical conditions related with anxiety and panic attacks. In fact, animal models have been used to study several paradigms on analogous and homologous elements of human anxiety phenomena. However, the direct transposition (translation) to clinical practice of the results obtained with animal models may be restricted by the different constructs used to describe and explain empirical evidence of anxiety phenomena among humans. We aimed to analyze whether theoretical assumptions on the potential inhibitory effects of anxiety on panic could be observed among humans in prospective studies designed to analyze the relationship between anxiety and panic. A systematic literature review including papers published in English language between 1997 and 2011 was undertaken on the MEDLINE database. The search yielded a total of 257 articles, of which 11 were included in the review. In three studies, the global dimension of the anxiety sensitivity construct worked as a facilitator of panic attacks. Six studies showed a positive correlation between the AS-Physical Concerns subfactor and the occurrence of panic attacks, whereas two studies found a greater effect of the AS-Mental Incapacitation Concerns subfactor on panic. There was no evidence that anxiety might act as an inhibitor of panic attacks in humans, and there were no conclusive findings on the possibility that any anxiety construct could contribute toward inhibiting panic attacks. In sum, there seems to be a need for refining descriptions of anxious phenomena addressed both in basic preclinical research and in prospective-longitudinal studies involving humans.

  8. Pre-Attack Symptomatology and Temperament as Predictors of Children's Responses to the September 11 Terrorist Attacks

    ERIC Educational Resources Information Center

    Lengua, Liliana J.; Long, Anna C.; Smith, Kimberlee I.; Meltzoff, Andrew N.

    2005-01-01

    Background: The aims of this study were to assess the psychological response of children following the September 11, 2001 terrorist attacks in New York and Washington, DC and to examine prospective predictors of children's post-attack responses. Method: Children's responses were assessed in a community sample of children in Seattle, Washington,…

  9. Pre-Attack Symptomatology and Temperament as Predictors of Children's Responses to the September 11 Terrorist Attacks

    ERIC Educational Resources Information Center

    Lengua, Liliana J.; Long, Anna C.; Smith, Kimberlee I.; Meltzoff, Andrew N.

    2005-01-01

    Background: The aims of this study were to assess the psychological response of children following the September 11, 2001 terrorist attacks in New York and Washington, DC and to examine prospective predictors of children's post-attack responses. Method: Children's responses were assessed in a community sample of children in Seattle, Washington,…

  10. Trim angle of attack of flexible wings using non-linear aerodynamics

    NASA Astrophysics Data System (ADS)

    Cohen, David Erik

    Multidisciplinary interactions are expected to play a significant role in the design of future high-performance aircraft (Blended-Wing Body, Truss-Braced wing; High Speed Civil transport, High-Altitude Long Endurance aircraft and future military aircraft). Also, the availability of supercomputers has made it now possible to employ high-fidelity models (Computational Fluid Dynamics for fluids and detailed finite element models for structures) at the preliminary design stage. A necessary step at that stage is to calculate the wing angle-of-attack at which the wing will generate the desired lift for the specific flight maneuver. Determination of this angle, a simple affair when the wing is rigid and the flow regime linear, becomes difficult when the wing is flexible and the flow regime non-linear. To solve this inherently nonlinear problem, a Newton's method type algorithm is developed to simultaneously calculate the deflection and the angle of attack. The developed algorithm is tested for a wing, used for in-house aeroelasticity research at Boeing (previously McDonnell Douglas) Long Beach. The trim angle of attack is calculated for a range of desired lift values. In addition to the Newton's method algorithm, a non derivative method (NDM) based on fixed point iteration, typical of fixed angle of attack calculations in aeroelasticity, is employed. The NDM, which has been extended to be able to calculate trim angle of attack, is used for one of the cases. The Newton's method calculation converges in fewer iterations, but requires more CPU time than the NDM method. The NDM, however, results in a slightly different value of the trim angle of attack. It should be noted that NDM will converge in a larger number of iterations as the dynamic pressure increases. For one value of the desired lift, both viscous and inviscid results were generated. The use of the inviscid flow model while not resulting in a markedly different value for the trim angle of attack, does result in a

  11. Nursing Positions

    MedlinePlus

    ... Habits for TV, Video Games, and the Internet Nursing Positions KidsHealth > For Parents > Nursing Positions Print A ... and actually needs to feed. Getting Comfortable With Breastfeeding Nursing can be one of the most challenging ...

  12. LG-ANALYST: linguistic geometry for master air attack planning

    NASA Astrophysics Data System (ADS)

    Stilman, Boris; Yakhnis, Vladimir; Umanskiy, Oleg

    2003-09-01

    We investigate the technical feasibility of implementing LG-ANALYST, a new software tool based on the Linguistic Geometry (LG) approach. The tool will be capable of modeling and providing solutions to Air Force related battlefield problems and of conducting multiple experiments to verify the quality of the solutions it generates. LG-ANALYST will support generation of the Fast Master Air Attack Plan (MAAP) with subsequent conversion into Air Tasking Order (ATO). An Air Force mission is modeled employing abstract board games (ABG). Such a mission may include, for example, an aircraft strike package moving to a target area with the opposing side having ground-to-air missiles, anti-aircraft batteries, fighter wings, and radars. The corresponding abstract board captures 3D air space, terrain, the aircraft trajectories, positions of the batteries, strategic features of the terrain, such as bridges, and their status, radars and illuminated space, etc. Various animated views are provided by LG-ANALYST including a 3D view for realistic representation of the battlespace and a 2D view for ease of analysis and control. LG-ANALYST will allow a user to model full scale intelligent enemy, plan in advance, re-plan and control in real time Blue and Red forces by generating optimal (or near-optimal) strategies for all sides of a conflict.

  13. Positive Psychology

    ERIC Educational Resources Information Center

    Peterson, Christopher

    2009-01-01

    Positive psychology is a deliberate correction to the focus of psychology on problems. Positive psychology does not deny the difficulties that people may experience but does suggest that sole attention to disorder leads to an incomplete view of the human condition. Positive psychologists concern themselves with four major topics: (1) positive…

  14. Positive Psychology

    ERIC Educational Resources Information Center

    Peterson, Christopher

    2009-01-01

    Positive psychology is a deliberate correction to the focus of psychology on problems. Positive psychology does not deny the difficulties that people may experience but does suggest that sole attention to disorder leads to an incomplete view of the human condition. Positive psychologists concern themselves with four major topics: (1) positive…

  15. Localized attacks on spatially embedded networks with dependencies.

    PubMed

    Berezin, Yehiel; Bashan, Amir; Danziger, Michael M; Li, Daqing; Havlin, Shlomo

    2015-03-11

    Many real world complex systems such as critical infrastructure networks are embedded in space and their components may depend on one another to function. They are also susceptible to geographically localized damage caused by malicious attacks or natural disasters. Here, we study a general model of spatially embedded networks with dependencies under localized attacks. We develop a theoretical and numerical approach to describe and predict the effects of localized attacks on spatially embedded systems with dependencies. Surprisingly, we find that a localized attack can cause substantially more damage than an equivalent random attack. Furthermore, we find that for a broad range of parameters, systems which appear stable are in fact metastable. Though robust to random failures-even of finite fraction-if subjected to a localized attack larger than a critical size which is independent of the system size (i.e., a zero fraction), a cascading failure emerges which leads to complete system collapse. Our results demonstrate the potential high risk of localized attacks on spatially embedded network systems with dependencies and may be useful for designing more resilient systems.

  16. Localized attacks on spatially embedded networks with dependencies

    PubMed Central

    Berezin, Yehiel; Bashan, Amir; Danziger, Michael M.; Li, Daqing; Havlin, Shlomo

    2015-01-01

    Many real world complex systems such as critical infrastructure networks are embedded in space and their components may depend on one another to function. They are also susceptible to geographically localized damage caused by malicious attacks or natural disasters. Here, we study a general model of spatially embedded networks with dependencies under localized attacks. We develop a theoretical and numerical approach to describe and predict the effects of localized attacks on spatially embedded systems with dependencies. Surprisingly, we find that a localized attack can cause substantially more damage than an equivalent random attack. Furthermore, we find that for a broad range of parameters, systems which appear stable are in fact metastable. Though robust to random failures—even of finite fraction—if subjected to a localized attack larger than a critical size which is independent of the system size (i.e., a zero fraction), a cascading failure emerges which leads to complete system collapse. Our results demonstrate the potential high risk of localized attacks on spatially embedded network systems with dependencies and may be useful for designing more resilient systems. PMID:25757572

  17. Nonfearful Panic Attacks in Patients With Noncardiac Chest Pain.

    PubMed

    Foldes-Busque, Guillaume; Fleet, Richard P; Denis, Isabelle; Poitras, Julien; Chauny, Jean-Marc; Diodati, Jean G; Marchand, André

    2015-01-01

    To document the prevalence and characteristics of nonfearful panic attacks (NFPA) and their consequences on panic identification and access to mental health services in patients with noncardiac chest pain. This cross-sectional sample included 339 patients with noncardiac chest pain and panic attacks. A structured interview was used to collect data on panic attacks, psychiatric morbidity, sociodemographic variables, and previous consultations with a psychiatrist or psychologist. Medical files were reviewed to assess the rate of NFPA identification in the emergency department. In our sample of patients with noncardiac chest pain, 39% of those with panic attacks reported NFPA. Psychiatric morbidity was lower in patients with NFPA than in patients with typical panic attacks (49.6% vs 71.1%), as was the mean number of panic symptoms (6 vs 7.8). The rate of panic attack identification was similar in both the groups, but patients with NFPA were less likely to have consulted a psychiatrist or psychologist during their lifetime (34% vs 46%). NFPA were highly prevalent in our sample of emergency department patients with noncardiac chest pain. NFPA is associated with significant psychiatric morbidity but these patients were less likely to follow through with referral to a psychiatrist or psychologist than patients with typical panic attacks were. Copyright © 2015 The Academy of Psychosomatic Medicine. Published by Elsevier Inc. All rights reserved.

  18. Attack resilience of the evolving scientific collaboration network.

    PubMed

    Liu, Xiao Fan; Xu, Xiao-Ke; Small, Michael; Tse, Chi K

    2011-01-01

    Stationary complex networks have been extensively studied in the last ten years. However, many natural systems are known to be continuously evolving at the local ("microscopic") level. Understanding the response to targeted attacks of an evolving network may shed light on both how to design robust systems and finding effective attack strategies. In this paper we study empirically the response to targeted attacks of the scientific collaboration networks. First we show that scientific collaboration network is a complex system which evolves intensively at the local level--fewer than 20% of scientific collaborations last more than one year. Then, we investigate the impact of the sudden death of eminent scientists on the evolution of the collaboration networks of their former collaborators. We observe in particular that the sudden death, which is equivalent to the removal of the center of the egocentric network of the eminent scientist, does not affect the topological evolution of the residual network. Nonetheless, removal of the eminent hub node is exactly the strategy one would adopt for an effective targeted attack on a stationary network. Hence, we use this evolving collaboration network as an experimental model for attack on an evolving complex network. We find that such attacks are ineffectual, and infer that the scientific collaboration network is the trace of knowledge propagation on a larger underlying social network. The redundancy of the underlying structure in fact acts as a protection mechanism against such network attacks.

  19. Optimal response to attacks on the open science grids.

    SciTech Connect

    Altunay, M.; Leyffer, S.; Linderoth, J. T.; Xie, Z.

    2011-01-01

    Cybersecurity is a growing concern, especially in open grids, where attack propagation is easy because of prevalent collaborations among thousands of users and hundreds of institutions. The collaboration rules that typically govern large science experiments as well as social networks of scientists span across the institutional security boundaries. A common concern is that the increased openness may allow malicious attackers to spread more readily around the grid. We consider how to optimally respond to attacks in open grid environments. To show how and why attacks spread more readily around the grid, we first discuss how collaborations manifest themselves in the grids and form the collaboration network graph, and how this collaboration network graph affects the security threat levels of grid participants. We present two mixed-integer program (MIP) models to find the optimal response to attacks in open grid environments, and also calculate the threat level associated with each grid participant. Given an attack scenario, our optimal response model aims to minimize the threat levels at unaffected participants while maximizing the uninterrupted scientific production (continuing collaborations). By adopting some of the collaboration rules (e.g., suspending a collaboration or shutting down a site), the model finds optimal response to subvert an attack scenario.

  20. Falsification Attacks against WPA-TKIP in a Realistic Environment

    NASA Astrophysics Data System (ADS)

    Todo, Yosuke; Ozawa, Yuki; Ohigashi, Toshihiro; Morii, Masakatu

    In this paper, we propose two new falsification attacks against Wi-Fi Protected Access Temporal Key Integrity Protocol (WPA-TKIP). A previous realistic attack succeeds only for a network that supports IEEE 802.11e QoS features by both an access point (AP) and a client, and it has an execution time of 12-15min, in which it recovers a message integrity code (MIC) key from an ARP packet. Our first attack reduces the execution time for recovering a MIC key. It can recover the MIC key within 7-8min. Our second attack expands its targets that can be attacked. This attack focuses on a new vulnerability of QoS packet processing, and this vulnerability can remove the condition that the AP supports IEEE 802.11e. In addition, we discovered another vulnerability by which our attack succeeds under the condition that the chipset of the client supports IEEE 802.11e even if the client disables this standard through the OS. We demonstrate that chipsets developed by several kinds of vendors have the same vulnerability.

  1. Korean immigrants' knowledge of heart attack symptoms and risk factors.

    PubMed

    Hwang, Seon Y; Ryan, Catherine J; Zerwic, Julie Johnson

    2008-02-01

    This study assessed the knowledge of heart attack symptoms and risk factors in a convenience sample of Korean immigrants. A total of 116 Korean immigrants in a Midwestern metropolitan area were recruited through Korean churches and markets. Knowledge was assessed using both open-ended questions and a structured questionnaire. Latent class cluster analysis and Chi-square tests were used to analyze the data. About 76% of the sample had at least one self-reported risk factor for cardiovascular disease. Using an open-ended question, the majority of subjects could only identify one symptom. In the structured questionnaire, subjects identified a mean of 5 out of 10 heart attack symptoms and a mean of 5 out of 9 heart attack risk factors. Latent class cluster analysis showed that subjects clustered into two groups for both risk factors and symptoms: a high knowledge group and a low knowledge group. Subjects who clustered into the risk factor low knowledge group (48%) were more likely than the risk factor high knowledge group to be older than 65 years, to have lower education, to not know to use 911 when a heart attack occurred, and to not have a family history of heart attack. Korean immigrants' knowledge of heart attack symptoms and risk factors was variable, ranging from high to very low. Education should be focused on those at highest risk for a heart attack, which includes the elderly and those with risk factors.

  2. Preventing sexual attacks in healthcare facilities: risk management considerations.

    PubMed

    Banja, John D

    2014-01-01

    Reports or allegations of sexual attacks in healthcare facilities are extremely upsetting and sometimes not given the attention they deserve. In June 2011, the United States Government Accountability Office (GAO) issued a remarkable report on sexual attacks occurring in Veterans Affairs (VA) health facilities that not only raised awareness of the magnitude of the problem but that detailed numerous system weaknesses in VA facilities that might have enabled such attacks. This article discusses some of the GAO's findings as well as other instances of sexual attacks, such as occurred in the criminal prosecution of Paul Serdula, a former health professional who might have sexually assaulted hundreds of women. Some of Serdula's victims have subsequently sued in civil court, charging Serdula's employers with lack of supervision and raising the possibility of serial sexual attacks such as his evolving into large-scale patient safety disasters. This article will review certain ethical and legal considerations bearing on the liability of healthcare facilities in which sexual attacks are alleged to have occurred. Following a discussion of how two courts have used the legal construct of "foreseeability" in determining a healthcare facility's liability when an employee is charged with sexual assault, the article will conclude with a host of patient safety recommendations aimed at discouraging or deterring the occurrence of sexual attacks. © 2014 American Society for Healthcare Risk Management of the American Hospital Association.

  3. Robust continuous-variable quantum key distribution against practical attacks

    NASA Astrophysics Data System (ADS)

    Huang, Peng; Huang, Jingzheng; Wang, Tao; Li, Huasheng; Huang, Duan; Zeng, Guihua

    2017-05-01

    Recently, several practical attacks on continuous-variable quantum key distribution (CVQKD) were proposed based on faking the estimated value of channel excess noise to hide the intercept-and-resend eavesdropping strategy, including the local oscillator (LO) fluctuation, calibration, wavelength, and saturation attacks. However, the known countermeasures against all these practical attacks will inevitably increase the complexity of the implementation of CVQKD and affect its performance. We develop here an asynchronous countermeasure strategy without structural modifications of the conventional CVQKD scheme. In particular, two robust countermeasures are proposed by adding peak-valley seeking and Gaussian postselection steps in conventional data postprocessing procedure. The analysis shows that the peak-valley seeking method naturally make the schemes immune to all known types of calibration attacks even when Eve simultaneously performs wavelength or LO fluctuation attacks and exhibit simpler implementation and better performance than the known countermeasures. Meanwhile, since the Gaussian postselection is able to resist the saturation attacks, the proposed schemes are secure against all known types of practical attacks.

  4. Changes in vestibular evoked myogenic potentials after Meniere attacks.

    PubMed

    Kuo, Shih-Wei; Yang, Ting-Hua; Young, Yi-Ho

    2005-09-01

    The aim of this study was to apply videonystagmography (VNG) and vestibular evoked myogenic potential (VEMP) tests to patients with Meniere attacks, to explore the mechanics of where saccular disorders may affect the semicircular canals. From January 2001 to December 2003, 12 consecutive patients with unilateral definite Meniere's disease with vertiginous attacks underwent VNG for recording spontaneous nystagmus, as well as VEMP tests. At the very beginning of the Meniere attack, the spontaneous nystagmus beat toward the lesion side in 5 patients (42%) and toward the healthy side in 7 patients (58%). Twenty-four hours later, only 6 patients (50%) showed spontaneous nystagmus beating toward the healthy side. Nevertheless, spontaneous nystagmus subsided in all patients within 48 hours. The VEMP test was performed within 24 hours of a Meniere attack; the VEMPs were normal in 4 patients and abnormal in 8 patients (67%). After 48 hours, 4 patients with initially abnormal VEMPs had resolution and return to normal VEMPs, and the other 4 patients still had absent VEMPs. Most patients (67%) with Meniere attacks revealed abnormal VEMPs, indicating that the saccule participates in a Meniere attack. This is an important idea that stimulates consideration of the mechanism of Meniere attacks.

  5. Smoking Behavior and Alcohol Consumption in Individuals With Panic Attacks.

    PubMed

    Mathew, Amanda R; Norton, Peter J; Zvolensky, Michael J; Buckner, Julia D; Smits, Jasper A J

    2011-02-01

    Individuals with anxiety often report greater smoking and drinking behaviors relative to those without a history of anxiety. In particular, smoking and alcohol use have been directly implicated among individuals experiencing panic attacks, diagnosed with panic disorder, or high on panic-relevant risk factors such as anxiety sensitivity. Less is known, however, about specific features of panic that may differentiate among those who do or do not use cigarettes or alcohol. The purpose of the current study was to replicate previous research findings of an association between panic symptomatology, cigarette smoking, and alcohol consumption, as well as extend findings by examining whether specific symptoms of panic attacks differentiated among those who do or do not use cigarettes or alcohol. Participants (n = 489) completed the Panic Attack Questionnaire-IV, a highly detailed assessment of panic attacks and symptoms, as well as self-report measures of smoking history and alcohol use. Consistent with previous research, participants who reported a history of panic attacks (n = 107) were significantly more likely to report current daily or lifetime daily cigarette smoking, and significantly greater hazardous or harmful alcohol use than participants with no panic history (n = 382). Although smoking and hazardous alcohol use were highly associated regardless of panic status, participants with panic attacks showed elevated hazardous alcohol use after controlling for daily or lifetime smoking. Surprisingly, although participants who reported having had at least one panic attack were more likely to smoke, panic attack symptoms, intensity, or frequency did not differentiate panickers who did or did not smoke. Furthermore, panic-related variables were not shown to differentially relate to problematic drinking among panickers. Implications for understanding the complex relationship between panic attacks and smoking and drinking behaviors are discussed.

  6. Smoking Behavior and Alcohol Consumption in Individuals With Panic Attacks

    PubMed Central

    Mathew, Amanda R.; Norton, Peter J.; Zvolensky, Michael J.; Buckner, Julia D.; Smits, Jasper A. J.

    2011-01-01

    Individuals with anxiety often report greater smoking and drinking behaviors relative to those without a history of anxiety. In particular, smoking and alcohol use have been directly implicated among individuals experiencing panic attacks, diagnosed with panic disorder, or high on panic-relevant risk factors such as anxiety sensitivity. Less is known, however, about specific features of panic that may differentiate among those who do or do not use cigarettes or alcohol. The purpose of the current study was to replicate previous research findings of an association between panic symptomatology, cigarette smoking, and alcohol consumption, as well as extend findings by examining whether specific symptoms of panic attacks differentiated among those who do or do not use cigarettes or alcohol. Participants (n = 489) completed the Panic Attack Questionnaire-IV, a highly detailed assessment of panic attacks and symptoms, as well as self-report measures of smoking history and alcohol use. Consistent with previous research, participants who reported a history of panic attacks (n = 107) were significantly more likely to report current daily or lifetime daily cigarette smoking, and significantly greater hazardous or harmful alcohol use than participants with no panic history (n = 382). Although smoking and hazardous alcohol use were highly associated regardless of panic status, participants with panic attacks showed elevated hazardous alcohol use after controlling for daily or lifetime smoking. Surprisingly, although participants who reported having had at least one panic attack were more likely to smoke, panic attack symptoms, intensity, or frequency did not differentiate panickers who did or did not smoke. Furthermore, panic-related variables were not shown to differentially relate to problematic drinking among panickers. Implications for understanding the complex relationship between panic attacks and smoking and drinking behaviors are discussed. PMID:21915160

  7. TCPL: A Defense against wormhole attacks in wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Kumar, K. E. Naresh; Waheed, Mohd. Abdul; Basappa, K. Kari

    2010-10-01

    Do In this paper presents recent advances in technology have made low-cost, low-power wireless sensors with efficient energy consumption. A network of such nodes can coordinate among themselves for distributed sensing and processing of certain data. For which, we propose an architecture to provide a stateless solution in sensor networks for efficient routing in wireless sensor networks. This type of architecture is known as Tree Cast. We propose a unique method of address allocation, building up multiple disjoint trees which are geographically inter-twined and rooted at the data sink. Using these trees, routing messages to and from the sink node without maintaining any routing state in the sensor nodes is possible. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many sensor network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes.

  8. TCPL: A Defense against wormhole attacks in wireless sensor networks

    SciTech Connect

    Kumar, K. E. Naresh; Waheed, Mohd. Abdul; Basappa, K. Kari

    2010-10-26

    Do In this paper presents recent advances in technology have made low-cost, low-power wireless sensors with efficient energy consumption. A network of such nodes can coordinate among themselves for distributed sensing and processing of certain data. For which, we propose an architecture to provide a stateless solution in sensor networks for efficient routing in wireless sensor networks. This type of architecture is known as Tree Cast. We propose a unique method of address allocation, building up multiple disjoint trees which are geographically inter-twined and rooted at the data sink. Using these trees, routing messages to and from the sink node without maintaining any routing state in the sensor nodes is possible. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many sensor network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes.

  9. [Transient ischemic attack: past, present, and future].

    PubMed

    Sato, Shoichiro; Minematsu, Kazuo

    2013-07-01

    Transient ischemic attack (TIA) is a brief episode of reversible neurological deficits caused by focal and temporary central nervous system ischemia. TIA is associated with a high risk of recurrent ischemic stroke, but immediate evaluation and intervention for TIA lowers this risk of recurrent ischemic stroke. A new clinical concept termed acute cerebrovascular syndrome (ACVS) that includes TIA and acute ischemic stroke has been proposed. With the development of new neuroimaging modalities such as diffusion-weighted image (DWI), the definition of TIA used in the United States has shifted from time-based (less than 24 h) to tissue-based (without acute infarction). High ABCD2 score, carotid artery stenosis, and DWI lesions suggest that patients are at a high risk for early recurrence of ischemic stroke. Recently, it was reported that not only DWI or magnetic resonance angiography(MRA), but also fluid-attenuated inversion recovery (FLAIR) images are useful for evaluating TIA. In Japan, the definition of TIA has not been revised since 1990. To review the definition of TIA and establish a TIA management system that is suitable to domestic healthcare environment, the Japan TIA research group (PI, Kazuo Minematsu) was formed in 2009. The group conducted a nation-wide survey and a retrospective registration study to clarify the current status of clinical practice of TIA. In the group's opinion, TIA is defined as the presence of focal neurological symptoms ascribable to a vascular etiology lasting less than 24 h, irrespective of imaging findings, as classically defined. However, if acute ischemic lesions are found on DWI, it is diagnosed as "TIA with DWI lesions." The group also made recommendations for hospitalization policies and outpatient management.

  10. Survey on Ranging Sensors and Cooperative Techniques for Relative Positioning of Vehicles.

    PubMed

    de Ponte Müller, Fabian

    2017-01-31

    Future driver assistance systems will rely on accurate, reliable and continuous knowledge on the position of other road participants, including pedestrians, bicycles and other vehicles. The usual approach to tackle this requirement is to use on-board ranging sensors inside the vehicle. Radar, laser scanners or vision-based systems are able to detect objects in their line-of-sight. In contrast to these non-cooperative ranging sensors, cooperative approaches follow a strategy in which other road participants actively support the estimation of the relative position. The limitations of on-board ranging sensors regarding their detection range and angle of view and the facility of blockage can be approached by using a cooperative approach based on vehicle-to-vehicle communication. The fusion of both, cooperative and non-cooperative strategies, seems to offer the largest benefits regarding accuracy, availability and robustness. This survey offers the reader a comprehensive review on different techniques for vehicle relative positioning. The reader will learn the important performance indicators when it comes to relative positioning of vehicles, the different technologies that are both commercially available and currently under research, their expected performance and their intrinsic limitations. Moreover, the latest research in the area of vision-based systems for vehicle detection, as well as the latest work on GNSS-based vehicle localization and vehicular communication for relative positioning of vehicles, are reviewed. The survey also includes the research work on the fusion of cooperative and non-cooperative approaches to increase the reliability and the availability.

  11. Survey on Ranging Sensors and Cooperative Techniques for Relative Positioning of Vehicles

    PubMed Central

    de Ponte Müller, Fabian

    2017-01-01

    Future driver assistance systems will rely on accurate, reliable and continuous knowledge on the position of other road participants, including pedestrians, bicycles and other vehicles. The usual approach to tackle this requirement is to use on-board ranging sensors inside the vehicle. Radar, laser scanners or vision-based systems are able to detect objects in their line-of-sight. In contrast to these non-cooperative ranging sensors, cooperative approaches follow a strategy in which other road participants actively support the estimation of the relative position. The limitations of on-board ranging sensors regarding their detection range and angle of view and the facility of blockage can be approached by using a cooperative approach based on vehicle-to-vehicle communication. The fusion of both, cooperative and non-cooperative strategies, seems to offer the largest benefits regarding accuracy, availability and robustness. This survey offers the reader a comprehensive review on different techniques for vehicle relative positioning. The reader will learn the important performance indicators when it comes to relative positioning of vehicles, the different technologies that are both commercially available and currently under research, their expected performance and their intrinsic limitations. Moreover, the latest research in the area of vision-based systems for vehicle detection, as well as the latest work on GNSS-based vehicle localization and vehicular communication for relative positioning of vehicles, are reviewed. The survey also includes the research work on the fusion of cooperative and non-cooperative approaches to increase the reliability and the availability. PMID:28146129

  12. Diagnostic and prognostic value of multimodal MRI in transient ischemic attack.

    PubMed

    Nah, Hyun-Wook; Kwon, Sun U; Kang, Dong-Wha; Lee, Deok-Hee; Kim, Jong S

    2014-10-01

    The clinical diagnosis of transient ischemic attack is highly subjective, and the risk prediction after transient ischemic attack using the clinical parameters still remains unsatisfactory. We aimed to investigate the diagnostic and prognostic value of multimodal magnetic resonance imaging in transient ischemic attack patients. We prospectively performed diffusion-weighted imaging, perfusion-weighted imaging, and intracranial and extracranial magnetic resonance angiogram within 72 h of symptom onset in 162 transient ischemic attack patients defined by the classical time-based definition. Follow-up diffusion-weighted imaging was obtained three-days later in patients who did not exhibit lesions on the initial diffusion-weighted imaging. The occurrence of clinical events (transient ischemic attack or stroke) three-months after the initial transient ischemic attack was recorded, and the ABCD2 and ABCD3-I scores were calculated. The clinical and imaging parameters were compared between patients with and without initial diffusion-weighted imaging lesion, clinical events, and follow-up diffusion-weighted imaging lesions. Abnormalities were present on diffusion-weighted imaging, perfusion-weighted imaging, and magnetic resonance angiogram in 38·9%, 44·1%, and 51·9% of patients, respectively. Diffusion-weighted imaging plus perfusion-weighted imaging explained 64·8%, and the addition of magnetic resonance angiogram explained 74% of the transient ischemic attack symptoms. The initial diffusion-weighted imaging positivity was associated with longer time from symptom onset to magnetic resonance imaging examination (odds ratio, 1·039; 95% confidence interval, 1·008-1·071; P=0·013). On follow-up diffusion-weighted imaging, new lesions were found in 46·7% of the patients who initially showed normal diffusion-weighted imaging findings. Initial perfusion-weighted imaging abnormality predicted the appearance of follow-up diffusion-weighted imaging lesion (chi-square=7

  13. The effects of angle-of-attack indication on aircraft control in the event of an airspeed indicator malfunction

    NASA Astrophysics Data System (ADS)

    Boesser, Claas Tido

    Analysis of accident data by the Federal Aviation Administration, the National Transportation Safety Board, and other sources show that loss of control is the leading cause of aircraft accidents. Further evaluation of the data indicates that the majority of loss of control accidents are caused by the aircraft stalling. In response to these data, the Federal Aviation Administration and the General Aviation Joint Steering Committee emphasize the importance of stall and angle-of-attack awareness during flight. The high-profile crash of Air France Flight 447, in which pilots failed to recover from a self-induced stall, reinforced concerns over the need for improved stall and angle-of-attack awareness and reinvigorated interest in the debate over the effectiveness of angle-of-attack information displays. Further support for aerodynamic information in the form of an angle-of-attack indicator comes from core cognitive engineering principles. These principles argue for the provision of information about system functioning and dynamics as a means to ensure a human is always in position to recover a system when technology is unable. The purpose of this research was to empirically evaluate the importance of providing pilots with feedback about fundamental aircraft aerodynamics, especially during non-standard situations and unexpected disturbances. An experiment was conducted using a flight simulator to test the effects of in-cockpit angle-of-attack indication on aircraft control following an airspeed indicator malfunction on final approach. Participants flew a final approach with a target airspeed range of 60 to 65 knots. Once participants slowed the aircraft for final approach, the airspeed indicator needle would be stuck at an indication of 70 knots. One group of participants flew the final approach with an angle-of-attack indicator while the other group lacked such an instrument. Examination of aircraft performance data along the final approach showed that, when confronted

  14. Suicide to harass others: clues from mythology to understanding suicide bombing attacks.

    PubMed

    Preti, Antonio

    2006-01-01

    Suicide by revenge, the Samsonic suicide, and the suicide by devotio, all described in classical mythology and also reported in the ethnographic literature, belong to the same class of suicidal behaviors as kamikaze suicide and the suicide bombing attack: suicide to harass and burden others or suicide with a hostile intent. The lack of a social dimension to share in a positive manner may lead an individual to integrate him/herself in another social structure, e.g., a military organization, which allows the individual to express his/her desires and personal identity only by destroying others and themselves. The dynamics of these forms of suicide are also likely to work in other displays of life-threatening behavior, such as family annihilation, mass murder, and spree killing. A more thorough investigation of the dynamics operating in suicide bombing attacks could, therefore, contribute to preventative strategies against violence at large.

  15. A General Ligand Design for Gold Catalysis allowing Ligand-Directed Anti Nucleophilic Attack of Alkynes

    PubMed Central

    Wang, Yanzhao; Wang, Zhixun; Li, Yuxue; Wu, Gongde; Cao, Zheng; Zhang, Liming

    2014-01-01

    Most homogenous gold catalyses demand ≥0.5 mol % catalyst loading. Due to the high cost of gold, these reactions are unlikely to be applicable in medium or large scale applications. Here we disclose a novel ligand design based on the privileged biphenyl-2-phosphine framework that offers a potentially general approach to dramatically lowering catalyst loading. In this design, an amide group at the 3’ position of the ligand framework directs and promotes nucleophilic attack at the ligand gold complex-activated alkyne, which is unprecedented in homogeneous gold catalysis considering the spatial challenge of using ligand to reach antiapproaching nucleophile in a linear P-Au-alkyne centroid structure. With such a ligand, the gold(I) complex becomes highly efficient in catalyzing acid addition to alkynes, with a turnover number up to 99,000. Density functional theory calculations support the role of the amide moiety in directing the attack of carboxylic acid via hydrogen bonding. PMID:24704803

  16. Recurrence of Panic Attacks after Influenza Vaccination: Two Case Reports.

    PubMed

    Kim, Han-Joon; Jeon, Sang-Won; Yoon, Ho-Kyoung

    2016-11-30

    Human influenza is a contagious respiratory illness caused by the influenza virus. The influenza vaccination is recommended annually, but several adverse effects related to allergic reactions have been reported. Panic attacks are also known to occur, but no case of a panic attack adverse effect has been reported in South Korea. We present two cases of panic disorder patients whose symptoms were aggravated by the influenza vaccination. We assumed that dysregulation of T-lymphocytes in panic disorder patients could have a role in activating various kinds of cytokines and chemokines, which then can lead to panic attack aggravation.

  17. Unusual fatal dog attack in Dunedin, New Zealand.

    PubMed

    Healey, D L; Kieser, J A

    2005-12-01

    A case of a fatal dog attack on a middle aged woman is presented. The offending dog was her own Bull-mastiff, which had previously shown signs of aggression towards her. Most of the injuries were found on the victim's face, neck and skull. A noteworthy feature of this attack was that the victim was known to suffer from Huntington disease. It is postulated that the involuntary movements, progressive dementia and increased moodiness characteristic of the disease may have had a significant role in triggering the attack.

  18. Exploring Windows Domain-Level Defenses Against Authentication Attacks

    SciTech Connect

    Nichols, Jeff A. {Cyber Sciences}; Curtis, Laura

    2016-01-01

    We investigated the security resilience of the current Windows Active Directory (AD) environments to Pass-the-Hash and Pass- the-Ticket credential theft attacks. While doing this, we discovered a way to trigger the removal of all previously issued authentication credentials for a client, thus preventing their use by attackers. After triggered, the user is forced to contact the domain administrators and to authenticate to the AD to continue. This could become the basis for a response that arrests the spread of a detected attack. Operating in a virtualized XenServer environment, we were able to carefully determine and recreate the conditions necessary to cause this response.

  19. A Cyber-Attack Detection Model Based on Multivariate Analyses

    NASA Astrophysics Data System (ADS)

    Sakai, Yuto; Rinsaka, Koichiro; Dohi, Tadashi

    In the present paper, we propose a novel cyber-attack detection model based on two multivariate-analysis methods to the audit data observed on a host machine. The statistical techniques used here are the well-known Hayashi's quantification method IV and cluster analysis method. We quantify the observed qualitative audit event sequence via the quantification method IV, and collect similar audit event sequence in the same groups based on the cluster analysis. It is shown in simulation experiments that our model can improve the cyber-attack detection accuracy in some realistic cases where both normal and attack activities are intermingled.

  20. Recurrence of Panic Attacks after Influenza Vaccination: Two Case Reports

    PubMed Central

    Kim, Han-Joon; Jeon, Sang-Won; Yoon, Ho-Kyoung

    2016-01-01

    Human influenza is a contagious respiratory illness caused by the influenza virus. The influenza vaccination is recommended annually, but several adverse effects related to allergic reactions have been reported. Panic attacks are also known to occur, but no case of a panic attack adverse effect has been reported in South Korea. We present two cases of panic disorder patients whose symptoms were aggravated by the influenza vaccination. We assumed that dysregulation of T-lymphocytes in panic disorder patients could have a role in activating various kinds of cytokines and chemokines, which then can lead to panic attack aggravation. PMID:27776395

  1. Enhancement of scale-free network attack tolerance

    NASA Astrophysics Data System (ADS)

    Qu, Ze-Hui; Wang, Pu; Song, Chao-Ming; Qin, Zhi-Guang

    2010-11-01

    Despite the large size of most communication and transportation systems, there are short paths between nodes in these networks which guarantee the efficient information, data and passenger delivery; furthermore these networks have a surprising tolerance under random errors thanks to their inherent scale-free topology. However, their scale-free topology also makes them fragile under intentional attacks, leaving us a challenge on how to improve the network robustness against intentional attacks without losing their strong tolerance under random errors and high message and passenger delivering capacity. Here we propose two methods (SL method and SH method) to enhance scale-free network's tolerance under attack in different conditions.

  2. Phase retrieval for attacking fractional Fourier transform encryption.

    PubMed

    Kong, Dezhao; Shen, Xueju; Cao, Liangcai; Jin, Guofan

    2017-04-20

    An advanced iterative phase retrieval algorithm is applied to perform a ciphertext-only attack on the fractional Fourier transform-based double random phase encryption system. With the given complex amplitude of ciphertext and definite support of the object image, the original object image can be recovered by estimating the energy of support area in the recovered image. The encryption system can be attacked by analyzing the sensibility of fractional Fourier transform order keys and evaluating the energy of the object image support area. The proposed algorithm can obtain encrypted fractional order and retrieve two random phase keys. Numerical results demonstrate the efficacy of the proposed attacking method.

  3. Role of radiology in evaluation of terror attack victims.

    PubMed

    Benjaminov, Ofer; Sklair-Levy, Miriam; Rivkind, Avraham; Cohen, Maya; Bar-Tal, Gabi; Stein, Michael

    2006-09-01

    Terrorism is the war of our time, and terrorists push their demands in many ways, leading to great diversity in the number and type of injuries and casualties. Between September 2000 and January 2005, Israel experienced 136 suicide attacks. We have reviewed the imaging procedures performed on victims of suicide bomber terror attacks that occurred during this period. We have studied the injury patterns encountered in such attacks, their mechanisms, and the dilemmas arising from them. To deal with such multiple trauma events more efficiently, we have established a multidisciplinary trauma team in which radiologists play a major role.

  4. Reliability of a Field Test of Defending and Attacking Agility in Australian Football and Relationships to Reactive Strength.

    PubMed

    Young, Warren B; Murray, Mitch P

    2017-02-01

    Young, WB and Murray, MP. Reliability of a field test of defending and attacking agility in Australian football and relationships to reactive strength. J Strength Cond Res 31(2): 509-516, 2017-Defending and attacking agility tests for Australian football do not exist, and it is unknown whether any physical qualities correlate with these types of agility. The purposes of this study were to develop new field tests of defending and attacking agility for Australian Rules football, to determine whether they were reliable, and to describe the relationship between the agility tests to determine their specificity. Because the reactive strength (RS) of the lower limb muscles has been previously correlated with change-of-direction speed, we also investigated the relationship between this quality and the agility tests. Nineteen male competitive recreational-level Australian Rules football players were assessed on the agility tests and a drop jump test to assess RS. Interday and interrater reliability was also assessed. The agility tests involved performing 10 trials of one-on-one agility tasks against 2 testers (opponents), in which the objective was to be in a position to tackle (defending) or to evade (attacking) the opponent. Both agility tests had good reliability (intraclass correlation > 0.8, %CV < 3, and no significant differences between test occasions [p > 0.05], and interrater reliability was very high [r = 0.997, p < 0.001]). The common variance between the agility tests was 45%, indicating that they represented relatively independent skills. There was a large correlation between RS and defending agility (r = 0.625, p = 0.004), and a very large correlation with attacking agility (r = 0.731, p < 0.001). Defending and attacking agility have different characteristics, possibly related to the footwork, physical, and cognitive demands of each. Nonetheless, RS seems to be important for agility, especially for attacking agility.

  5. Panic Attack History and Anxiety Sensitivity in Relation to Cognitive-Based Smoking Processes Among Treatment-Seeking Daily Smokers

    PubMed Central

    Johnson, Kirsten A.; Farris, Samantha G.; Schmidt, Norman B.; Smits, Jasper A. J.

    2013-01-01

    Introduction: Empirical research has found that panic attacks are related to increased risk of more severe nicotine withdrawal and poor cessation outcome. Anxiety sensitivity (AS; fear of anxiety and related sensations) has similarly been found to be related to an increased risk of acute nicotine withdrawal and poorer cessation outcome. However, research has yet to examine the relative contributions of panic attacks and AS in terms of cognitive-based smoking processes (e.g., negative reinforcement smoking expectancies, addictive and negative affect-based reduction smoking motives, barriers to cessation, problem symptoms experienced while quitting). Method: Participants (n = 242; 57.4% male; M age = 38.1) were daily smokers recruited as a part of a larger randomized control trial for smoking cessation. It was hypothesized that both panic attacks and AS would uniquely and independently predict the studied cognitive-based smoking processes. Results: As hypothesized, AS was uniquely and positively associated with all smoking processes after controlling for average number of cigarettes smoked per day, current Axis I diagnosis, and participant sex. However, panic attack history was only significantly related to problem symptoms experienced while quitting smoking. Conclusions: Although past research has demonstrated significant associations between panic attacks and certain aspects of cigarette smoking (e.g., severity of nicotine withdrawal; lower abstinence rates, and negative affect reduction motives), the present findings suggest that AS may be more relevant to understanding beliefs about and motives for smoking behavior as well as perceptions of cessation-related difficulties. PMID:22544839

  6. Previous exposure to the World Trade Center terrorist attack and posttraumatic symptoms among older adults following Hurricane Sandy.

    PubMed

    Shrira, Amit; Palgi, Yuval; Hamama-Raz, Yaira; Goodwin, Robin; Ben-Ezra, Menachem

    2014-01-01

    The present study tested the maturation and inoculation hypotheses by examining whether age and previous exposure to the September 11, 2001, World Trade Center (WTC) terrorist attack moderated the relationship between degree of exposure to Hurricane Sandy and related posttraumatic stress disorder (PTSD) symptoms. An online sample of 1,000 participants from affected states completed self-report questionnaires one month after Hurricane Sandy hit the East Coast. Participants reported their degree of exposure to the WTC terrorist attack and to Hurricane Sandy, and their posttraumatic stress disorder (PTSD) symptoms following Hurricane Sandy. The positive relationship between degree of exposure to Hurricane Sandy and level of PTSD symptoms was weaker among older adults. An additional significant three-way interaction suggested that both age and previous exposure to the WTC terrorist attack moderated the relationship between degree of exposure to Hurricane Sandy and level of PTSD symptoms. Previous high degree of exposure to the WTC terrorist attack was related to a weaker effect of current exposure to Hurricane Sandy on PTSD symptoms among older adults. However, among younger adults, previous high degree of exposure to the WTC terrorist attack was related to a stronger effect of current exposure on PTSD symptoms. When confronted by a natural disaster, American older adults are generally resilient. Supporting the inoculation hypothesis, resilience of older adults may be partly related to the strength successfully extracted from previous exposure to adverse events.

  7. [The daily rhythm of heart attack morbidity and mortality may be influenced by the time of sunrise].

    PubMed

    Kriszbacher, Ildikó; Csoboth, Ildikó; Boncz, Imre; Bódis, József

    2008-11-16

    The morbidity and mortality of a myocardial infarction show characteristic seasonal and diurnal changes that may be influenced by the time of sunrise and the number of hours with daylight during the day. We wish to study whether the time of sunrise and the number of hours with daylight influence the seasonality of heart attack morbidity and mortality, and whether these have an effect on the diurnal rhythm of a heart attack. We have carried out the retrospective analysis of patients received at Hungarian hospitals with the diagnose of an acute heart attack ( n = 32,329) and those deceased due to a heart attack ( n = 5,142) between 2004 and 2005. Data were gained from the data-base of the National Health Insurance Fund according to the International Classification of Diseases. Positive correlation showed between the time of sunrise and both the incidence of an acute myocardial infarction and related mortality ( p < 0.01). Negative correlation has been found between the number of hours with daylight and the occurrence of an acute myocardial infarction ( r = -0.107, p < 0.05). Also, negative correlation has been found between the number of hours with daylight and the mortality of a myocardial infarction ( r = -0.105, p < 0.05). Based on our data, the time of sunrise and the number of hours with daylight may be related to the incidence of heart attack morbidity and mortality, however, other factors are assumed to take a role as well.

  8. Heartburn or Chest Pain: When Is It Heart Attack?

    MedlinePlus

    Diseases and Conditions Heartburn Severe heartburn and heart attack can be hard to tell apart. Understand how they typically differ, and learn when to get immediate help. By Mayo Clinic Staff You' ...

  9. An unusual case of predation: dog pack or cougar attack?

    PubMed

    Fonseca, Gabriel M; Palacios, Rocío

    2013-01-01

    Injuries produced by animals are capable of leaving severe patterns and in some cases may result in the death of the attacked individual. Law enforcement authorities may come to erroneous conclusions about the source of the bites based on their awareness of animals present and similarities of the injuries to the untrained eye, with dreadful consequences. Expertise of a carnivore biologist and an odontologist that indentifies the particularities of bite marks may be useful for identifying the attacking species. We present the investigation of a fatal dog pack attack involving a 43-year-old man in Bell Ville (Argentina) where the evidence provided by a forensic dentist and a biologist was categorical for establishing the animal species involved. Because of the unusual characteristics of the wounds and the initial hypothesis made by local authorities of a cougar attack, habits and specific patterns of both dog pack and cougar predation on humans are discussed. © 2012 American Academy of Forensic Sciences.

  10. After-gate attack on a quantum cryptosystem

    NASA Astrophysics Data System (ADS)

    Wiechers, C.; Lydersen, L.; Wittmann, C.; Elser, D.; Skaar, J.; Marquardt, Ch; Makarov, V.; Leuchs, G.

    2011-01-01

    We present a method to control the detection events in quantum key distribution systems that use gated single-photon detectors. We employ bright pulses as faked states, timed to arrive at the avalanche photodiodes outside the activation time. The attack can remain unnoticed, since the faked states do not increase the error rate per se. This allows for an intercept-resend attack, where an eavesdropper transfers her detection events to the legitimate receiver without causing any errors. As a side effect, afterpulses, originating from accumulated charge carriers in the detectors, increase the error rate. We have experimentally tested detectors of the system id3110 (Clavis2) from ID Quantique. We identify the parameter regime in which the attack is feasible despite the side effect. Furthermore, we outline how simple modifications in the implementation can make the device immune to this attack.

  11. Trojan-horse attacks on quantum-key-distribution systems

    SciTech Connect

    Gisin, N.; Fasel, S.; Kraus, B.; Zbinden, H.; Ribordy, G.

    2006-02-15

    General Trojan-horse attacks on quantum-key-distribution systems, i.e., attacks on Alice or Bob's system via the quantum channel, are analyzed. We illustrate the power of such attacks with today's technology and conclude that all systems must implement active counter measures. In particular, all systems must include an auxiliary detector that monitors any incoming light. We show that such counter measures can be efficient, provided that enough additional privacy amplification is applied to the data. We present a practical way to reduce the maximal information gain that an adversary can gain using Trojan-horse attacks. This does reduce the security analysis of the two-way plug-and-play implementation to those of the standard one-way systems.

  12. The countermeasures against the blinding attack in quantum key distribution

    NASA Astrophysics Data System (ADS)

    Wang, Jindong; Wang, Hong; Qin, Xiaojuan; Wei, Zhengjun; Zhang, Zhiming

    2016-01-01

    It has been shown that the single photon detectors (SPDs) based on the avalanche photodiode (APD) can be blinded and controlled by the bright light and short trigger pulses. Eavesdropper can get the full information without causing additional quantum bit error rate. Hence, in order to guarantee the security of the quantum key distribution (QKD) systems, some countermeasures, by changing the characteristic of the SPD or monitoring the parameters of the detector, are presented by some research groups. In this paper, we provide a new and effective countermeasure against the blinding attack based on improving the optical scheme of the decoding unit in the QKD system rather than only considering the characteristic of the SPD. In our proposal we use a coupler with asymmetric splitting ratio to distinguish the detection characteristic of the SPD with blinding attack from that without blinding attack. The detailed analysis shows that the proposed scheme is feasible to defense the blinding attack.

  13. Chess therapy: A new approach to curing panic attack.

    PubMed

    Barzegar, Kazem; Barzegar, Somayeh

    2017-09-01

    To study the effect of playing cell phone chess game on treating panic attack. The chess game on an android cell phone was played by the researcher who was affected by panic attack as a post-traumatic disorder immediately after or before feeling of the start of symptoms. The right level of difficulty, i.e., levels 2-4, was selected for optimal results. Playing chess game on the android cell phone prevented the manifestation of panic attack and led to the cure of this traumatic condition. Chess therapy with the right level of difficulty can be recommended as a very effective non-pharmaceutical method for the successful treatment of panic attacks. Copyright © 2017 Elsevier B.V. All rights reserved.

  14. Sleep attacks and antiparkinsonian drugs: a pilot prospective pharmacoepidemiologic study.

    PubMed

    Montastruc, J L; Brefel-Courbon, C; Senard, J M; Bagheri, H; Ferreira, J; Rascol, O; Lapeyre-Mestre, M

    2001-01-01

    A prospective survey was performed to characterize the prevalence of sleep attacks and to evaluate precipitating factors in a group of 236 patients with idiopathic Parkinson's disease. Sleep attacks were reported by 72 patients (30.5%). Multivariate analysis showed a marked association between the occurrence of sudden sleep episodes and first autonomic failure, followed by treatment with ropinirole and bromocriptine. The present work underlines the major contributing role of autonomic failure followed by dopamine agonists in the occurrence of such an event. Because a relationship between sleep attacks and not only ropinirole but also bromocriptine treatment was described, the present work suggests that sleep attacks are a common side effect of all dopamine agonists.

  15. Defensive Cyber Battle Damage Assessment Through Attack Methodology Modeling

    DTIC Science & Technology

    2011-03-25

    15 2.2.3. Network Forensic Analysis ......................................................................... 15 2.2.4...Forensic Analysis Process........................................................................... 15 2.3. Computer Attack Taxonomy...66 15 . DCBDA AAT Analysis and TAAT Creation

  16. New records of Pipunculidae attacking proconiine sharpshooter (Auchenorrhyncha: Cicadellidae: Proconiini)

    USDA-ARS?s Scientific Manuscript database

    Five records of Pipunculidae (Diptera) attacking proconiine sharpshooters (Auchenorrhyncha: Cicadellidae) are documented here for the first time. Eudorylas alternatus (Cresson) is documented as a parasitoid of Cuerna obtusa Oman and Beamer, and Oncometopia orbona (Fabricius) is recorded as being at...

  17. Situational panic attacks. Behavioral, physiologic, and biochemical characterization.

    PubMed

    Woods, S W; Charney, D S; McPherson, C A; Gradman, A H; Heninger, G R

    1987-04-01

    To investigate the pathophysiology of nonpharmacologically induced panic attacks, 18 drug-free agoraphobic patients and 13 matched healthy subjects underwent structured exposure to phobic situations. Heart rate, blood pressure, and plasma free 3-methoxy-4-hydroxyphenylglycol (MHPG), cortisol, growth hormone, and prolactin levels were measured before, during, and after exposure. Fifteen patients experienced situational panic attacks during exposure. Panicking patients displayed significantly greater increases in heart rate but not blood pressure or plasma free MHPG or cortisol in comparison with the healthy subjects. Growth hormone and prolactin responses tended to be smaller in the patients. If brain noradrenergic hyperactivity occurs during situational panic attacks, it may be too brief or too restricted in regional localization to affect MHPG levels in plasma. Chronically recurrent attacks may cause an adaptation of neuroendocrine mechanisms activated by anxiety or stress.

  18. Hyperventilation: is it a cause of panic attacks?

    PubMed

    Hibbert, G; Pilsbury, D

    1989-12-01

    During transcutaneous PCO2 (PtcCO2) monitoring of 15 freely ambulant patients suffering from panic attacks, all the patients experienced a typical attack. Seven were identified as hyperventilators, as PtcCO2 fell to abnormally low levels during the attack. This group could not be distinguished on the basis of either their usual symptoms of panic or the hyperventilation provocation test. There was no apparent association between absolute levels of PCO2 and the nature of symptoms. The anxiety ratings of hyperventilators were lower than those of non-hyperventilators. These data do not support the hypothesis that hyperventilation causes panic attacks or contributes to their severity. Hyperventilation may be better understood as a consequence of panic.

  19. Mite-Proof Bedding May Help Curb Asthma Attacks

    MedlinePlus

    ... Curb Asthma Attacks: Study Kids whose mattresses and pillows were encased had less severe flare-ups, researchers ... asthma and dust mite allergy. Their mattresses and pillows were encased with mite-proof or placebo covers. ...

  20. Resistance maximization principle for defending networks against virus attack

    NASA Astrophysics Data System (ADS)

    Li, Angsheng; Zhang, Xiaohui; Pan, Yicheng

    2017-01-01

    We investigate the defending of networks against virus attack. We define the resistance of a network to be the maximum number of bits required to determine the code of the module that is accessible from random walk, from which random walk cannot escape. We show that for any network G, R(G) =H1(G) -H2(G) , where R(G) is the resistance of G, H1(G) and H2(G) are the one- and two-dimensional structural information of G, respectively, and that resistance maximization is the principle for defending networks against virus attack. By using the theory, we investigate the defending of real world networks and of the networks generated by the preferential attachment and the security models. We show that there exist networks that are defensible by a small number of controllers from cascading failure of any virus attack. Our theory demonstrates that resistance maximization is the principle for defending networks against virus attacks.