Deterring watermark collusion attacks using signal processing techniques
NASA Astrophysics Data System (ADS)
Lemma, Aweke N.; van der Veen, Michiel
2007-02-01
Collusion attack is a malicious watermark removal attack in which the hacker has access to multiple copies of the same content with different watermarks and tries to remove the watermark using averaging. In the literature, several solutions to collusion attacks have been reported. The main stream solutions aim at designing watermark codes that are inherently resistant to collusion attacks. The other approaches propose signal processing based solutions that aim at modifying the watermarked signals in such a way that averaging multiple copies of the content leads to a significant degradation of the content quality. In this paper, we present signal processing based technique that may be deployed for deterring collusion attacks. We formulate the problem in the context of electronic music distribution where the content is generally available in the compressed domain. Thus, we first extend the collusion resistance principles to bit stream signals and secondly present experimental based analysis to estimate a bound on the maximum number of modified versions of a content that satisfy good perceptibility requirement on one hand and destructive averaging property on the other hand.
Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho
2014-01-01
An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme.
A scheme of hidden-structure attribute-based encryption with multiple authorities
NASA Astrophysics Data System (ADS)
Ling, J.; Weng, A. X.
2018-05-01
In the most of the CP-ABE schemes with hidden access structure, both all the user attributes and the key generation are managed by only one authority. The key generation efficiency will decrease as the number of user increases, and the data will encounter security issues as the only authority is attacked. We proposed a scheme of hidden-structure attribute-based encryption with multiple authorities, which introduces multiple semi-trusted attribute authorities, avoiding the threat even though one or more authorities are attacked. We also realized user revocation by managing a revocation list. Based on DBDH assumption, we proved that our scheme is of IND-CMA security. The analysis shows that our scheme improves the key generation efficiency.
Consideration of techniques to mitigate the unauthorized 3D printing production of keys
NASA Astrophysics Data System (ADS)
Straub, Jeremy; Kerlin, Scott
2016-05-01
The illicit production of 3D printed keys based on remote-sensed imagery is problematic as it allows a would-be intruder to access a secured facility without the attack attempt being as obviously detectable as conventional techniques. This paper considers the problem from multiple perspectives. First, it looks at different attack types and considers the prospective attack from a digital information perspective. Second, based on this, techniques for securing keys are considered. Third, the design of keys is considered from the perspective of making them more difficult to duplicate using visible light sensing and 3D printing. Policy and legal considerations are discussed.
Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho
2014-01-01
An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme. PMID:25276847
Theoretical and Experimental Investigation of Opinion Dynamics in Small Social Networks
2016-07-01
Sciences, Social Informatics and Telecommunications Engineering 2013 96 M. Gabbay described. Section 4 illustrates the application of the methodology...group of cyber terrorists has already gained access to multiple computers. The attack will attempt to disrupt and destroy a large oil refinery; at
An effective and secure key-management scheme for hierarchical access control in E-medicine system.
Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit
2013-04-01
Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems.
Fatal dog attacks in Canada, 1990–2007
Raghavan, Malathi
2008-01-01
In Canada, public debates on dog attacks are dominated by studies from the United States. An electronic search of media reports in the Canadian Newsstand database, for the years 1990 to 2007, identified 28 fatalities from dog-bite injuries. Predominant factors in this case series were owned, known dogs; residential location; children’s unsupervised access to area with dogs; and rural/remote areas, including aboriginal reserves in the prairies. A higher proportion of sled dogs and, possibly, mixed-breed dogs in Canada than in the United States caused fatalities, as did multiple dogs rather than single dogs. Free-roaming dog packs, reported only from rural communities, caused most on-reserve fatalities. Future studies are needed to assess if this rural/urban divide is observed in nonfatal attacks and if the breeds that bite in Canada are different from the breeds that killed. Breed representation in this paper and, perhaps, multiple-dog overrepresentation should be understood in the context of the overall Canadian dog population. PMID:18624067
Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information.
Wang, Chundong; Zhu, Likun; Gong, Liangyi; Zhao, Zhentang; Yang, Lei; Liu, Zheli; Cheng, Xiaochun
2018-03-15
With the development of the Internet-of-Things (IoT), wireless network security has more and more attention paid to it. The Sybil attack is one of the famous wireless attacks that can forge wireless devices to steal information from clients. These forged devices may constantly attack target access points to crush the wireless network. In this paper, we propose a novel Sybil attack detection based on Channel State Information (CSI). This detection algorithm can tell whether the static devices are Sybil attackers by combining a self-adaptive multiple signal classification algorithm with the Received Signal Strength Indicator (RSSI). Moreover, we develop a novel tracing scheme to cluster the channel characteristics of mobile devices and detect dynamic attackers that change their channel characteristics in an error area. Finally, we experiment on mobile and commercial WiFi devices. Our algorithm can effectively distinguish the Sybil devices. The experimental results show that our Sybil attack detection system achieves high accuracy for both static and dynamic scenarios. Therefore, combining the phase and similarity of channel features, the multi-dimensional analysis of CSI can effectively detect Sybil nodes and improve the security of wireless networks.
Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information
Wang, Chundong; Zhao, Zhentang; Yang, Lei; Liu, Zheli; Cheng, Xiaochun
2018-01-01
With the development of the Internet-of-Things (IoT), wireless network security has more and more attention paid to it. The Sybil attack is one of the famous wireless attacks that can forge wireless devices to steal information from clients. These forged devices may constantly attack target access points to crush the wireless network. In this paper, we propose a novel Sybil attack detection based on Channel State Information (CSI). This detection algorithm can tell whether the static devices are Sybil attackers by combining a self-adaptive multiple signal classification algorithm with the Received Signal Strength Indicator (RSSI). Moreover, we develop a novel tracing scheme to cluster the channel characteristics of mobile devices and detect dynamic attackers that change their channel characteristics in an error area. Finally, we experiment on mobile and commercial WiFi devices. Our algorithm can effectively distinguish the Sybil devices. The experimental results show that our Sybil attack detection system achieves high accuracy for both static and dynamic scenarios. Therefore, combining the phase and similarity of channel features, the multi-dimensional analysis of CSI can effectively detect Sybil nodes and improve the security of wireless networks. PMID:29543773
The non-trusty clown attack on model-based speaker recognition systems
NASA Astrophysics Data System (ADS)
Farrokh Baroughi, Alireza; Craver, Scott
2015-03-01
Biometric detectors for speaker identification commonly employ a statistical model for a subject's voice, such as a Gaussian Mixture Model, that combines multiple means to improve detector performance. This allows a malicious insider to amend or append a component of a subject's statistical model so that a detector behaves normally except under a carefully engineered circumstance. This allows an attacker to force a misclassification of his or her voice only when desired, by smuggling data into a database far in advance of an attack. Note that the attack is possible if attacker has access to database even for a limited time to modify victim's model. We exhibit such an attack on a speaker identification, in which an attacker can force a misclassification by speaking in an unusual voice, and replacing the least weighted component of victim's model by the most weighted competent of the unusual voice of the attacker's model. The reason attacker make his or her voice unusual during the attack is because his or her normal voice model can be in database, and by attacking with unusual voice, the attacker has the option to be recognized as himself or herself when talking normally or as the victim when talking in the unusual manner. By attaching an appropriately weighted vector to a victim's model, we can impersonate all users in our simulations, while avoiding unwanted false rejections.
NASA Astrophysics Data System (ADS)
Keen, Arthur A.
2006-04-01
This paper describes technology being developed at 21st Century Technologies to automate Computer Network Operations (CNO). CNO refers to DoD activities related to Attacking and Defending Computer Networks (CNA & CND). Next generation cyber threats are emerging in the form of powerful Internet services and tools that automate intelligence gathering, planning, testing, and surveillance. We will focus on "Search-Engine Hacks", queries that can retrieve lists of router/switch/server passwords, control panels, accessible cameras, software keys, VPN connection files, and vulnerable web applications. Examples include "Titan Rain" attacks against DoD facilities and the Santy worm, which identifies vulnerable sites by searching Google for URLs containing application-specific strings. This trend will result in increasingly sophisticated and automated intelligence-driven cyber attacks coordinated across multiple domains that are difficult to defeat or even understand with current technology. One traditional method of CNO relies on surveillance detection as an attack predictor. Unfortunately, surveillance detection is difficult because attackers can perform search engine-driven surveillance such as with Google Hacks, and avoid touching the target site. Therefore, attack observables represent only about 5% of the attacker's total attack time, and are inadequate to provide warning. In order to predict attacks and defend against them, CNO must also employ more sophisticated techniques and work to understand the attacker's Motives, Means and Opportunities (MMO). CNO must use automated reconnaissance tools, such as Google, to identify information vulnerabilities, and then utilize Internet tools to observe the intelligence gathering, planning, testing, and collaboration activities that represent 95% of the attacker's effort.
A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks
Wang, Changji; Yuan, Yuan; Wu, Jiayuan
2017-01-01
Handover authentication is a critical issue in wireless networks, which is being used to ensure mobile nodes wander over multiple access points securely and seamlessly. A variety of handover authentication schemes for wireless networks have been proposed in the literature. Unfortunately, existing handover authentication schemes are vulnerable to a few security attacks, or incur high communication and computation costs. Recently, He et al. proposed a handover authentication scheme PairHand and claimed it can resist various attacks without rigorous security proofs. In this paper, we show that PairHand does not meet forward secrecy and strong anonymity. More seriously, it is vulnerable to key compromise attack, where an adversary can recover the private key of any mobile node. Then, we propose a new efficient and provably secure handover authentication scheme for wireless networks based on elliptic curve cryptography. Compared with existing schemes, our proposed scheme can resist key compromise attack, and achieves forward secrecy and strong anonymity. Moreover, it is more efficient in terms of computation and communication. PMID:28632171
A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks.
Wang, Changji; Yuan, Yuan; Wu, Jiayuan
2017-06-20
Handover authentication is a critical issue in wireless networks, which is being used to ensure mobile nodes wander over multiple access points securely and seamlessly. A variety of handover authentication schemes for wireless networks have been proposed in the literature. Unfortunately, existing handover authentication schemes are vulnerable to a few security attacks, or incur high communication and computation costs. Recently, He et al. proposed a handover authentication scheme PairHand and claimed it can resist various attacks without rigorous security proofs. In this paper, we show that PairHand does not meet forward secrecy and strong anonymity. More seriously, it is vulnerable to key compromise attack, where an adversary can recover the private key of any mobile node. Then, we propose a new efficient and provably secure handover authentication scheme for wireless networks based on elliptic curve cryptography. Compared with existing schemes, our proposed scheme can resist key compromise attack, and achieves forward secrecy and strong anonymity. Moreover, it is more efficient in terms of computation and communication.
Hereditary Angioedema Attacks: Local Swelling at Multiple Sites.
Hofman, Zonne L M; Relan, Anurag; Hack, C Erik
2016-02-01
Hereditary angioedema (HAE) patients experience recurrent local swelling in various parts of the body including painful swelling of the intestine and life-threatening laryngeal oedema. Most HAE literature is about attacks located in one anatomical site, though it is mentioned that HAE attacks may also involve multiple anatomical sites simultaneously. A detailed description of such multi-location attacks is currently lacking. This study investigated the occurrence, severity and clinical course of HAE attacks with multiple anatomical locations. HAE patients included in a clinical database of recombinant human C1-inhibitor (rhC1INH) studies were evaluated. Visual analog scale scores filled out by the patients for various symptoms at various locations and investigator symptoms scores during the attack were analysed. Data of 219 eligible attacks in 119 patients was analysed. Thirty-three patients (28%) had symptoms at multiple locations in anatomically unrelated regions at the same time during their first attack. Up to five simultaneously affected locations were reported. The observation that severe HAE attacks often affect multiple sites in the body suggests that HAE symptoms result from a systemic rather than from a local process as is currently believed.
NASA Astrophysics Data System (ADS)
Zhang, Yichen; Li, Zhengyu; Zhao, Yijia; Yu, Song; Guo, Hong
2017-02-01
We analyze the security of the two-way continuous-variable quantum key distribution protocol in reverse reconciliation against general two-mode attacks, which represent all accessible attacks at fixed channel parameters. Rather than against one specific attack model, the expression of secret key rates of the two-way protocol are derived against all accessible attack models. It is found that there is an optimal two-mode attack to minimize the performance of the protocol in terms of both secret key rates and maximal transmission distances. We identify the optimal two-mode attack, give the specific attack model of the optimal two-mode attack and show the performance of the two-way protocol against the optimal two-mode attack. Even under the optimal two-mode attack, the performances of two-way protocol are still better than the corresponding one-way protocol, which shows the advantage of making double use of the quantum channel and the potential of long-distance secure communication using a two-way protocol.
Heavy-tailed distribution of the SSH Brute-force attack duration in a multi-user environment
NASA Astrophysics Data System (ADS)
Lee, Jae-Kook; Kim, Sung-Jun; Park, Chan Yeol; Hong, Taeyoung; Chae, Huiseung
2016-07-01
Quite a number of cyber-attacks to be place against supercomputers that provide highperformance computing (HPC) services to public researcher. Particularly, although the secure shell protocol (SSH) brute-force attack is one of the traditional attack methods, it is still being used. Because stealth attacks that feign regular access may occur, they are even harder to detect. In this paper, we introduce methods to detect SSH brute-force attacks by analyzing the server's unsuccessful access logs and the firewall's drop events in a multi-user environment. Then, we analyze the durations of the SSH brute-force attacks that are detected by applying these methods. The results of an analysis of about 10 thousands attack source IP addresses show that the behaviors of abnormal users using SSH brute-force attacks are based on human dynamic characteristics of a typical heavy-tailed distribution.
An approach to detecting deliberately introduced defects and micro-defects in 3D printed objects
NASA Astrophysics Data System (ADS)
Straub, Jeremy
2017-05-01
In prior work, Zeltmann, et al. demonstrated the negative impact that can be created by defects of various sizes in 3D printed objects. These defects may make the object unsuitable for its application or even present a hazard, if the object is being used for a safety-critical application. With the uses of 3D printing proliferating and consumer access to printers increasing, the desire of a nefarious individual or group to subvert the desired printing quality and safety attributes of a printer or printed object must be considered. Several different approaches to subversion may exist. Attackers may physically impair the functionality of the printer or launch a cyber-attack. Detecting introduced defects, from either attack, is critical to maintaining public trust in 3D printed objects and the technology. This paper presents an alternate approach. It applies a quality assurance technology based on visible light sensing to this challenge and assesses its capability for detecting introduced defects of multiple sizes.
On the designing of a tamper resistant prescription RFID access control system.
Safkhani, Masoumeh; Bagheri, Nasour; Naderi, Majid
2012-12-01
Recently, Chen et al. have proposed a novel tamper resistant prescription RFID access control system, published in the Journal of Medical Systems. In this paper we consider the security of the proposed protocol and identify some existing weaknesses. The main attack is a reader impersonation attack which allows an active adversary to impersonate a legitimate doctor, e.g. the patient's doctor, to access the patient's tag and change the patient prescription. The presented attack is quite efficient. To impersonate a doctor, the adversary should eavesdrop one session between the doctor and the patient's tag and then she can impersonate the doctor with the success probability of '1'. In addition, we present efficient reader-tag to back-end database impersonation, de-synchronization and traceability attacks against the protocol. Finally, we propose an improved version of protocol which is more efficient compared to the original protocol while provides the desired security against the presented attacks.
2017-01-01
Localization of the wireless sensor network is a vital area acquiring an impressive research concern and called upon to expand more with the rising of its applications. As localization is gaining prominence in wireless sensor network, it is vulnerable to jamming attacks. Jamming attacks disrupt communication opportunity among the sender and receiver and deeply impact the localization process, leading to a huge error of the estimated sensor node position. Therefore, detection and elimination of jamming influence are absolutely indispensable. Range-based techniques especially Received Signal Strength (RSS) is facing severe impact of these attacks. This paper proposes algorithms based on Combination Multiple Frequency Multiple Power Localization (C-MFMPL) and Step Function Multiple Frequency Multiple Power Localization (SF-MFMPL). The algorithms have been tested in the presence of multiple types of jamming attacks including capture and replay, random and constant jammers over a log normal shadow fading propagation model. In order to overcome the impact of random and constant jammers, the proposed method uses two sets of frequencies shared by the implemented anchor nodes to obtain the averaged RSS readings all over the transmitted frequencies successfully. In addition, three stages of filters have been used to cope with the replayed beacons caused by the capture and replay jammers. In this paper the localization performance of the proposed algorithms for the ideal case which is defined by without the existence of the jamming attack are compared with the case of jamming attacks. The main contribution of this paper is to achieve robust localization performance in the presence of multiple jamming attacks under log normal shadow fading environment with a different simulation conditions and scenarios. PMID:28493977
Multiple operating system rotation environment moving target defense
DOE Office of Scientific and Technical Information (OSTI.GOV)
Evans, Nathaniel; Thompson, Michael
Systems and methods for providing a multiple operating system rotation environment ("MORE") moving target defense ("MTD") computing system are described. The MORE-MTD system provides enhanced computer system security through a rotation of multiple operating systems. The MORE-MTD system increases attacker uncertainty, increases the cost of attacking the system, reduces the likelihood of an attacker locating a vulnerability, and reduces the exposure time of any located vulnerability. The MORE-MTD environment is effectuated by rotation of the operating systems at a given interval. The rotating operating systems create a consistently changing attack surface for remote attackers.
Behavioral Modeling of Adversaries with Multiple Objectives in Counterterrorism.
Mazicioglu, Dogucan; Merrick, Jason R W
2018-05-01
Attacker/defender models have primarily assumed that each decisionmaker optimizes the cost of the damage inflicted and its economic repercussions from their own perspective. Two streams of recent research have sought to extend such models. One stream suggests that it is more realistic to consider attackers with multiple objectives, but this research has not included the adaption of the terrorist with multiple objectives to defender actions. The other stream builds off experimental studies that show that decisionmakers deviate from optimal rational behavior. In this article, we extend attacker/defender models to incorporate multiple objectives that a terrorist might consider in planning an attack. This includes the tradeoffs that a terrorist might consider and their adaption to defender actions. However, we must also consider experimental evidence of deviations from the rationality assumed in the commonly used expected utility model in determining such adaption. Thus, we model the attacker's behavior using multiattribute prospect theory to account for the attacker's multiple objectives and deviations from rationality. We evaluate our approach by considering an attacker with multiple objectives who wishes to smuggle radioactive material into the United States and a defender who has the option to implement a screening process to hinder the attacker. We discuss the problems with implementing such an approach, but argue that research in this area must continue to avoid misrepresenting terrorist behavior in determining optimal defensive actions. © 2017 Society for Risk Analysis.
On the routing protocol influence on the resilience of wireless sensor networks to jamming attacks.
Del-Valle-Soto, Carolina; Mex-Perera, Carlos; Monroy, Raul; Nolazco-Flores, Juan Arturo
2015-03-27
In this work, we compare a recently proposed routing protocol, the multi-parent hierarchical (MPH) protocol, with two well-known protocols, the ad hoc on-demand distance vector (AODV) and dynamic source routing (DSR). For this purpose, we have developed a simulator, which faithfully reifies the workings of a given protocol, considering a fixed, reconfigurable ad hoc network given by the number and location of participants, and general network conditions. We consider a scenario that can be found in a large number of wireless sensor network applications, a single sink node that collects all of the information generated by the sensors. The metrics used to compare the protocols were the number of packet retransmissions, carrier sense multiple access (CSMA) inner loop retries, the number of nodes answering the queries from the coordinator (sink) node and the energy consumption. We tested the network under ordinary (without attacks) conditions (and combinations thereof) and when it is subject to different types of jamming attacks (in particular, random and reactive jamming attacks), considering several positions for the jammer. Our results report that MPH has a greater ability to tolerate such attacks than DSR and AODV, since it minimizes and encapsulates the network segment under attack. The self-configuring capabilities of MPH derived from a combination of a proactive routes update, on a periodic-time basis, and a reactive behavior provide higher resilience while offering a better performance (overhead and energy consumption) than AODV and DSR, as shown in our simulation results.
Pediatric multiple sclerosis: Clinical features and outcome.
Waldman, Amy; Ness, Jayne; Pohl, Daniela; Simone, Isabella Laura; Anlar, Banu; Amato, Maria Pia; Ghezzi, Angelo
2016-08-30
Multiple sclerosis (MS) in children manifests with a relapsing-remitting MS (RRMS) disease course. Acute relapses consist of new neurologic deficits persisting greater than 24 hours, in the absence of intercurrent illness, and occur with a higher frequency early in the disease as compared to adult-onset RRMS. Most pediatric patients with MS recover well from these early relapses, and cumulative physical disability is rare in the first 10 years of disease. Brainstem attacks, poor recovery from a single attack, and a higher frequency of attacks portend a greater likelihood of future disability. Although prospective pediatric-onset MS cohorts have been established in recent years, there remains very limited prospective data detailing the longer-term clinical outcome of pediatric-onset MS into adulthood. Whether the advent of MS therapies, and the largely off-label access to such therapies in pediatric MS, has improved prognosis is unknown. MS onset during the key formative academic years, concurrent with active cognitive maturation, is an important determinant of long-term outcome, and is discussed in detail in another article in this supplement. Finally, increasing recognition of pediatric MS worldwide, recent launch of phase III trials for new agents in the pediatric MS population, and the clear imperative to more fully appreciate health-related quality of life in pediatric MS through adulthood highlight the need for standardized, validated, and robust outcome measures. © 2016 American Academy of Neurology.
Enabling analytical and Modeling Tools for Enhanced Disease Surveillance
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dawn K. Manley
2003-04-01
Early detection, identification, and warning are essential to minimize casualties from a biological attack. For covert attacks, sick people are likely to provide the first indication of an attack. An enhanced medical surveillance system that synthesizes distributed health indicator information and rapidly analyzes the information can dramatically increase the number of lives saved. Current surveillance methods to detect both biological attacks and natural outbreaks are hindered by factors such as distributed ownership of information, incompatible data storage and analysis programs, and patient privacy concerns. Moreover, because data are not widely shared, few data mining algorithms have been tested on andmore » applied to diverse health indicator data. This project addressed both integration of multiple data sources and development and integration of analytical tools for rapid detection of disease outbreaks. As a first prototype, we developed an application to query and display distributed patient records. This application incorporated need-to-know access control and incorporated data from standard commercial databases. We developed and tested two different algorithms for outbreak recognition. The first is a pattern recognition technique that searches for space-time data clusters that may signal a disease outbreak. The second is a genetic algorithm to design and train neural networks (GANN) that we applied toward disease forecasting. We tested these algorithms against influenza, respiratory illness, and Dengue Fever data. Through this LDRD in combination with other internal funding, we delivered a distributed simulation capability to synthesize disparate information and models for earlier recognition and improved decision-making in the event of a biological attack. The architecture incorporates user feedback and control so that a user's decision inputs can impact the scenario outcome as well as integrated security and role-based access-control for communicating between distributed data and analytical tools. This work included construction of interfaces to various commercial database products and to one of the data analysis algorithms developed through this LDRD.« less
Defeating Insider Attacks via Autonomic Self-Protective Networks
ERIC Educational Resources Information Center
Sibai, Faisal M.
2012-01-01
There has been a constant growing security concern with insider attacks on network accessible computer systems. Users with power credentials can do almost anything they want with the systems they own with very little control or oversight. Most breaches occurring nowadays by power users are considered legitimate access and not necessarily…
Phenomenology of panic attacks: a descriptive study of panic disorder patients' self-reports.
Aronson, T A; Logue, C M
1988-01-01
The phenomenology of panic disorder and panic attacks was systematically assessed in 46 consecutive patients. The results suggest that DSM-III criteria include several symptoms that are not frequently present during a panic attack and that DSM-III's characterization of a panic attack is imprecise and misleading. Panic attacks were found to vary in intensity, frequency, spontaneity, and associated symptoms. A panic attack typically presents as a unified symptom complex of psychic anxiety and multiple somatic symptoms in multiple body systems. It occurs in a crescendolike pattern, is self-limited, and often leaves the subject weak or shaken. The temporal course as much as the symptomatic presentation defines a panic attack.
Nam, Junghyun; Choo, Kim-Kwang Raymond; Han, Sangchul; Kim, Moonseong; Paik, Juryon; Won, Dongho
2015-01-01
A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks).
Nam, Junghyun; Choo, Kim-Kwang Raymond; Han, Sangchul; Kim, Moonseong; Paik, Juryon; Won, Dongho
2015-01-01
A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks). PMID:25849359
Protecting complex infrastructures against multiple strategic attackers
NASA Astrophysics Data System (ADS)
Hausken, Kjell
2011-01-01
Infrastructures are analysed subject to defence by a strategic defender and attack by multiple strategic attackers. A framework is developed where each agent determines how much to invest in defending versus attacking each of multiple targets. A target can have economic, human and symbolic values, which generally vary across agents. Investment expenditure functions for each agent can be linear in the investment effort, concave, convex, logistic, can increase incrementally, or can be subject to budget constraints. Contest success functions (e.g., ratio and difference forms) determine the probability of a successful attack on each target, dependent on the relative investments of the defender and attackers on each target, and on characteristics of the contest. Targets can be in parallel, in series, interlinked, interdependent or independent. The defender minimises the expected damage plus the defence expenditures. Each attacker maximises the expected damage minus the attack expenditures. The number of free choice variables equals the number of agents times the number of targets, or lower if there are budget constraints. Each agent is interested in how his investments vary across the targets, and the impact on his utilities. Alternative optimisation programmes are discussed, together with repeated games, dynamic games and incomplete information. An example is provided for illustration.
... from cell to cell. NMO is different from multiple sclerosis (MS). Attacks are usually more severe in NMO ... from cell to cell. NMO is different from multiple sclerosis (MS). Attacks are usually more severe in NMO ...
Correlated Attack Modeling (CAM)
2003-10-01
describing attack models to a scenario recognition engine, a prototype of such an engine was developed, using components of the EMERALD intrusion...content. Results – The attacker gains information enabling remote access to database (i.e., privileged login information, database layout to allow...engine that uses attack specifications written in CAML. The implementation integrates two advanced technologies devel- oped in the EMERALD program [27, 31
Comprehensive security framework for the communication and storage of medical images
NASA Astrophysics Data System (ADS)
Slik, David; Montour, Mike; Altman, Tym
2003-05-01
Confidentiality, integrity verification and access control of medical imagery and associated metadata is critical for the successful deployment of integrated healthcare networks that extend beyond the department level. As medical imagery continues to become widely accessed across multiple administrative domains and geographically distributed locations, image data should be able to travel and be stored on untrusted infrastructure, including public networks and server equipment operated by external entities. Given these challenges associated with protecting large-scale distributed networks, measures must be taken to protect patient identifiable information while guarding against tampering, denial of service attacks, and providing robust audit mechanisms. The proposed framework outlines a series of security practices for the protection of medical images, incorporating Transport Layer Security (TLS), public and secret key cryptography, certificate management and a token based trusted computing base. It outlines measures that can be utilized to protect information stored within databases, online and nearline storage, and during transport over trusted and untrusted networks. In addition, it provides a framework for ensuring end-to-end integrity of image data from acquisition to viewing, and presents a potential solution to the challenges associated with access control across multiple administrative domains and institution user bases.
Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment
NASA Technical Reports Server (NTRS)
Kebert, Alan; Barnejee, Bikramjit; Solano, Juan; Solano, Wanda
2013-01-01
The cloud computing environment offers malicious users the ability to spawn multiple instances of cloud nodes that are similar to virtual machines, except that they can have separate external IP addresses. In this paper we demonstrate how this ability can be exploited by an attacker to distribute his/her attack, in particular SQL injection attacks, in such a way that an intrusion detection system (IDS) could fail to identify this attack. To demonstrate this, we set up a small private cloud, established a vulnerable website in one instance, and placed an IDS within the cloud to monitor the network traffic. We found that an attacker could quite easily defeat the IDS by periodically altering its IP address. To detect such an attacker, we propose to use multi-agent plan recognition, where the multiple source IPs are considered as different agents who are mounting a collaborative attack. We show that such a formulation of this problem yields a more sophisticated approach to detecting SQL injection attacks within a cloud computing environment.
Detecting Payload Attacks on Programmable Logic Controllers (PLCs)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yang, Huan
Programmable logic controllers (PLCs) play critical roles in industrial control systems (ICS). Providing hardware peripherals and firmware support for control programs (i.e., a PLC’s “payload”) written in languages such as ladder logic, PLCs directly receive sensor readings and control ICS physical processes. An attacker with access to PLC development software (e.g., by compromising an engineering workstation) can modify the payload program and cause severe physical damages to the ICS. To protect critical ICS infrastructure, we propose to model runtime behaviors of legitimate PLC payload program and use runtime behavior monitoring in PLC firmware to detect payload attacks. By monitoring themore » I/O access patterns, network access patterns, as well as payload program timing characteristics, our proposed firmware-level detection mechanism can detect abnormal runtime behaviors of malicious PLC payload. Using our proof-of-concept implementation, we evaluate the memory and execution time overhead of implementing our proposed method and find that it is feasible to incorporate our method into existing PLC firmware. In addition, our evaluation results show that a wide variety of payload attacks can be effectively detected by our proposed approach. The proposed firmware-level payload attack detection scheme complements existing bumpin- the-wire solutions (e.g., external temporal-logic-based model checkers) in that it can detect payload attacks that violate realtime requirements of ICS operations and does not require any additional apparatus.« less
Insecurity of Wireless Networks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sheldon, Frederick T; Weber, John Mark; Yoo, Seong-Moo
Wireless is a powerful core technology enabling our global digital infrastructure. Wi-Fi networks are susceptible to attacks on Wired Equivalency Privacy, Wi-Fi Protected Access (WPA), and WPA2. These attack signatures can be profiled into a system that defends against such attacks on the basis of their inherent characteristics. Wi-Fi is the standard protocol for wireless networks used extensively in US critical infrastructures. Since the Wired Equivalency Privacy (WEP) security protocol was broken, the Wi-Fi Protected Access (WPA) protocol has been considered the secure alternative compatible with hardware developed for WEP. However, in November 2008, researchers developed an attack on WPA,more » allowing forgery of Address Resolution Protocol (ARP) packets. Subsequent enhancements have enabled ARP poisoning, cryptosystem denial of service, and man-in-the-middle attacks. Open source systems and methods (OSSM) have long been used to secure networks against such attacks. This article reviews OSSMs and the results of experimental attacks on WPA. These experiments re-created current attacks in a laboratory setting, recording both wired and wireless traffic. The article discusses methods of intrusion detection and prevention in the context of cyber physical protection of critical Internet infrastructure. The basis for this research is a specialized (and undoubtedly incomplete) taxonomy of Wi-Fi attacks and their adaptations to existing countermeasures and protocol revisions. Ultimately, this article aims to provide a clearer picture of how and why wireless protection protocols and encryption must achieve a more scientific basis for detecting and preventing such attacks.« less
Passive Fingerprinting Of Computer Network Reconnaissance Tools
2009-09-01
v6 for version 6 MITM : Man-In-The-Middle Attack MSS: Maximum Segment Size NOP: No Operation Performed NPS: Naval Postgraduate School OS...specific, or man-in-the- middle ( MITM ) attacks. Depending on the attacker’s position to access the targeted network, the attacker may be able to...identification numbers. Both are ordinarily supposed to be initialized as a random number to make it difficult for an attacker to perform an injection MITM
An Assessment of User Response to Phishing Attacks: The Effects of Fear and Self-Confidence
ERIC Educational Resources Information Center
House, Deanna
2013-01-01
Phishing attacks have threatened the security of both home users and organizations in recent years. Individuals of varying levels of computer proficiency are potential targets for a phishing attack; all that is needed is an email address and Internet access. Phishing uses social engineering to fraudulently obtain information that is confidential…
Heart Attack - Multiple Languages
... Heart Attack - العربية (Arabic) Bilingual PDF Health Information Translations Bosnian (bosanski) Expand Section Heart Attack - bosanski (Bosnian) Bilingual PDF Health Information Translations Chinese, Simplified (Mandarin dialect) (简体中文) Expand Section Heart ...
A graph-based network-vulnerability analysis system
DOE Office of Scientific and Technical Information (OSTI.GOV)
Swiler, L.P.; Phillips, C.; Gaylor, T.
1998-05-03
This paper presents a graph based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example themore » class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level of effort for the attacker, various graph algorithms such as shortest path algorithms can identify the attack paths with the highest probability of success.« less
A graph-based network-vulnerability analysis system
DOE Office of Scientific and Technical Information (OSTI.GOV)
Swiler, L.P.; Phillips, C.; Gaylor, T.
1998-01-01
This report presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the classmore » of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.« less
Windows NT Attacks for the Evaluation of Intrusion Detection Systems
2000-06-01
their passwords never expire. Their privileges allow telnet access and FTP access to the system, but do not allow local logins . Each user can...default: • Administrator: This root account allows remote and local logins and full control of system software. • Guest: This default account, setup by...realizing that the Netbus server was installed. The attack also edits the Windows NT Registry so the Netbus server restarts at every login . This
2002-01-01
Submitted to ICN 2002 Organic Techniques for Protecting Virtual Private Network (VPN) Services from Access Link Flooding Attacks1 Ranga S. Ramanujan ...using these techniques is also described. Contact author: Dr. Ranga S. Ramanujan Architecture Technology Corporation 9971 Valley View Road Eden Prairie...OF ABSTRACT 18. NUMBER OF PAGES 15 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified b. ABSTRACT unclassified c . THIS PAGE unclassified
Three tenets for secure cyber-physical system design and assessment
NASA Astrophysics Data System (ADS)
Hughes, Jeff; Cybenko, George
2014-06-01
This paper presents a threat-driven quantitative mathematical framework for secure cyber-physical system design and assessment. Called The Three Tenets, this originally empirical approach has been used by the US Air Force Research Laboratory (AFRL) for secure system research and development. The Tenets were first documented in 2005 as a teachable methodology. The Tenets are motivated by a system threat model that itself consists of three elements which must exist for successful attacks to occur: - system susceptibility; - threat accessibility and; - threat capability. The Three Tenets arise naturally by countering each threat element individually. Specifically, the tenets are: Tenet 1: Focus on What's Critical - systems should include only essential functions (to reduce susceptibility); Tenet 2: Move Key Assets Out-of-Band - make mission essential elements and security controls difficult for attackers to reach logically and physically (to reduce accessibility); Tenet 3: Detect, React, Adapt - confound the attacker by implementing sensing system elements with dynamic response technologies (to counteract the attackers' capabilities). As a design methodology, the Tenets mitigate reverse engineering and subsequent attacks on complex systems. Quantified by a Bayesian analysis and further justified by analytic properties of attack graph models, the Tenets suggest concrete cyber security metrics for system assessment.
A hierarchical detection method in external communication for self-driving vehicles based on TDMA.
Alheeti, Khattab M Ali; Al-Ani, Muzhir Shaban; McDonald-Maier, Klaus
2018-01-01
Security is considered a major challenge for self-driving and semi self-driving vehicles. These vehicles depend heavily on communications to predict and sense their external environment used in their motion. They use a type of ad hoc network termed Vehicular ad hoc networks (VANETs). Unfortunately, VANETs are potentially exposed to many attacks on network and application level. This paper, proposes a new intrusion detection system to protect the communication system of self-driving cars; utilising a combination of hierarchical models based on clusters and log parameters. This security system is designed to detect Sybil and Wormhole attacks in highway usage scenarios. It is based on clusters, utilising Time Division Multiple Access (TDMA) to overcome some of the obstacles of VANETs such as high density, high mobility and bandwidth limitations in exchanging messages. This makes the security system more efficient, accurate and capable of real time detection and quick in identification of malicious behaviour in VANETs. In this scheme, each vehicle log calculates and stores different parameter values after receiving the cooperative awareness messages from nearby vehicles. The vehicles exchange their log data and determine the difference between the parameters, which is utilised to detect Sybil attacks and Wormhole attacks. In order to realize efficient and effective intrusion detection system, we use the well-known network simulator (ns-2) to verify the performance of the security system. Simulation results indicate that the security system can achieve high detection rates and effectively detect anomalies with low rate of false alarms.
Hejna, Petr; Zátopková, Lenka; Safr, Miroslav
2012-01-01
A rare case of an elephant attack is presented. A 44-year-old man working as an elephant keeper was attacked by a cow elephant when he tripped over a foot chain while the animal was being medically treated. The man fell down and was consequently repeatedly attacked with elephant tusks. The man sustained multiple stab injuries to both groin regions, a penetrating injury to the abdominal wall with traumatic prolapse of the loops of the small bowel, multiple defects of the mesentery, and incomplete laceration of the abdominal aorta with massive bleeding into the abdominal cavity. In addition to the penetrating injuries, the man sustained multiple rib fractures with contusion of both lungs and laceration of the right lobe of the liver, and comminuted fractures of the pelvic arch and left femoral body. The man died shortly after he had been received at the hospital. The cause of death was attributed to traumatic shock. © 2011 American Academy of Forensic Sciences.
Pathak, Hrishikesh; Borkar, Jaydeo; Dixit, Pradeep; Dhawane, Shailendra; Shrigiriwar, Manish; Dingre, Niraj
2013-10-10
Fatalities due to attacks by tigers on humans are uncommon and are rarely described in the medico-legal literature. We herein present a forensic investigation in a unique case of a fatal tiger attack in the wild on a 35 year old female in India by an Indian Bengal tiger (Panthera tigris tigris). The attack resulted in two pairs of puncture wounds over the nape area with occult cervical spine injuries resulting from transfixing of spine due to the tiger canines; multiple puncture wounds, numerous scratches and abrasions consistent with the tiger claw injuries and injury to the right jugulocarotid vessels. This case outlines the characteristic injury pattern from such an attack along with the multiple sources of the tiger injuries. The analysis of these injuries might reveal the motivation behind the attack and the big cat species involved in the attack. A tiger injury is sometimes compared with a stab injury, as the patterned injuries due to a tiger bite are characterized by multiple penetrating, stab-like wounds. So, a special attention is paid toward establishment of the cause of death from bites by the animal teeth under unknown circumstances of trauma and to exclude the possibility of a homicide beyond reasonable doubt in such cases. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.
NASA Technical Reports Server (NTRS)
Chow, Edward T.; Woo, Simon S.; James, Mark; Paloulian, George K.
2012-01-01
As communication and networking technologies advance, networks will become highly complex and heterogeneous, interconnecting different network domains. There is a need to provide user authentication and data protection in order to further facilitate critical mission operations, especially in the tactical and mission-critical net-centric networking environment. The Autonomous Information Unit (AIU) technology was designed to provide the fine-grain data access and user control in a net-centric system-testing environment to meet these objectives. The AIU is a fundamental capability designed to enable fine-grain data access and user control in the cross-domain networking environments, where an AIU is composed of the mission data, metadata, and policy. An AIU provides a mechanism to establish trust among deployed AIUs based on recombining shared secrets, authentication and verify users with a username, X.509 certificate, enclave information, and classification level. AIU achieves data protection through (1) splitting data into multiple information pieces using the Shamir's secret sharing algorithm, (2) encrypting each individual information piece using military-grade AES-256 encryption, and (3) randomizing the position of the encrypted data based on the unbiased and memory efficient in-place Fisher-Yates shuffle method. Therefore, it becomes virtually impossible for attackers to compromise data since attackers need to obtain all distributed information as well as the encryption key and the random seeds to properly arrange the data. In addition, since policy can be associated with data in the AIU, different user access and data control strategies can be included. The AIU technology can greatly enhance information assurance and security management in the bandwidth-limited and ad hoc net-centric environments. In addition, AIU technology can be applicable to general complex network domains and applications where distributed user authentication and data protection are necessary. AIU achieves fine-grain data access and user control, reducing the security risk significantly, simplifying the complexity of various security operations, and providing the high information assurance across different network domains.
Attack Helicopter Operations: Art or Science
1991-05-13
ATTACK HELICOPTER OPERATIONS: ART OR SCIENCE ? BY LIEUTENANT COLONEL JAN CALLEN United States Army DISTRIBUTION STATEMENT A: Approved for public release...TASK IWORK UNIT ELEMENT NO. NO. NO. ACCESSION NC 11. TITLE (Include Socurity Classification) Attack Helicopter Operations: Art or Science ? 12. PERSONAL...OPERATIONS: ART OR SCIENCE ? AN INDIVIDUAL STUDY PROJECT by Lieutenant Colonel Jan Callen United States Army Colonel Greg Snelgrove Project Adviser U.S
Classification of HTTP Attacks: A Study on the ECML/PKDD 2007 Discovery Challenge
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gallagher, Brian; Eliassi-Rad, Tina
2009-07-08
As the world becomes more reliant on Web applications for commercial, financial, and medical transactions, cyber attacks on the World Wide Web are increasing in frequency and severity. Web applications provide an attractive alternative to traditional desktop applications due to their accessibility and ease of deployment. However, the accessibility of Web applications also makes them extremely vulnerable to attack. This inherent vulnerability is intensified by the distributed nature ofWeb applications and the complexity of configuring application servers. These factors have led to a proliferation of Web-based attacks, in which attackers surreptitiously inject code into HTTP requests, allowing them to executemore » arbitrary commands on remote systems and perform malicious activities such as reading, altering, or destroying sensitive data. One approach for dealing with HTTP-based attacks is to identify malicious code in incoming HTTP requests and eliminate bad requests before they are processed. Using machine learning techniques, we can build a classifier to automatically label requests as “Valid” or “Attack.” For this study, we develop a simple, but effective HTTP attack classifier, based on the vector space model used commonly for Information Retrieval. Our classifier not only separates attacks from valid requests, but can also identify specific attack types (e.g., “SQL Injection” or “Path Traversal”). We demonstrate the effectiveness of our approach through experiments on the ECML/PKDD 2007 Discovery Challenge data set. Specifically, we show that our approach achieves higher precision and recall than previous methods. In addition, our approach has a number of desirable characteristics, including robustness to missing contextual information, interpretability of models, and scalability.« less
Disparities in adult awareness of heart attack warning signs and symptoms--14 states, 2005.
2008-02-22
In 2005, approximately 920,000 persons in the United States had a myocardial infarction (i.e., heart attack); in 2004, approximately 157,000 heart attacks were fatal. One study indicated that approximately half of cardiac deaths occur within 1 hour of symptom onset, before patients reach a hospital. Timely access to emergency cardiac care, receipt of advanced treatment, and potential for surviving a heart attack all depend on 1) early recognition of warning signs and symptoms of a heart attack by persons who are having a heart attack and bystanders and 2) immediately calling 9-1-1. Healthy People 2010 includes an objective to increase from 46% to 50% the proportion of adults aged > or =20 years who are aware of the early warning signs and symptoms of a heart attack and the importance of accessing rapid emergency care by calling 9-1-1 (objective 12-2). To update estimates of public awareness of heart attack warning signs and symptoms and knowledge of the importance of calling 9-1-1, CDC analyzed 2005 Behavioral Risk Factor Surveillance System (BRFSS) data from the 14 states that included questions on signs and symptoms of a heart attack. This report describes the results of that analysis, which indicated that although the awareness of certain individual warning signs was as high as 93% (i.e., for shortness of breath), awareness of all five warning signs was 31%, underscoring the need for public health measures to increase public awareness of heart attack warning signs and symptoms. In addition, disparities in awareness were observed by race/ethnicity, sex, and level of education, suggesting that new public health measures should target populations with the lowest levels of awareness.
Crony Attack: Strategic Attack’s Silver Bullet
2006-11-01
Politics. 1. Bueno de Mesquita et al ., “Policy Failure and Political Survival,” 14–1. 1. Ibid., 149. 19. Ibid., 0. 20. Kirschner, “Microfoundations of...fighting. Notes 1. See Bueno de Mesquita et al ., “Policy Failure and Political Survival,” 147–61. 2. For more discussion of leadership’s manipulation...accessed 2 April 2003). http://www.d-i.net/fcs/;ppt/ellis_ kosovo_aar.ppt#315,7,Short War Syndrome (accessed 14 July 2006). Bueno de Mesquita, Bruce, et al
Game Theory and Uncertainty Quantification for Cyber Defense Applications
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chatterjee, Samrat; Halappanavar, Mahantesh; Tipireddy, Ramakrishna
Cyber-system defenders face the challenging task of protecting critical assets and information continually against multiple types of malicious attackers. Defenders typically operate within resource constraints while attackers operate at relatively low costs. As a result, design and development of resilient cyber-systems that can support mission goals under attack while accounting for the dynamics between attackers and defenders is an important research problem.
A hierarchical detection method in external communication for self-driving vehicles based on TDMA
Al-ani, Muzhir Shaban; McDonald-Maier, Klaus
2018-01-01
Security is considered a major challenge for self-driving and semi self-driving vehicles. These vehicles depend heavily on communications to predict and sense their external environment used in their motion. They use a type of ad hoc network termed Vehicular ad hoc networks (VANETs). Unfortunately, VANETs are potentially exposed to many attacks on network and application level. This paper, proposes a new intrusion detection system to protect the communication system of self-driving cars; utilising a combination of hierarchical models based on clusters and log parameters. This security system is designed to detect Sybil and Wormhole attacks in highway usage scenarios. It is based on clusters, utilising Time Division Multiple Access (TDMA) to overcome some of the obstacles of VANETs such as high density, high mobility and bandwidth limitations in exchanging messages. This makes the security system more efficient, accurate and capable of real time detection and quick in identification of malicious behaviour in VANETs. In this scheme, each vehicle log calculates and stores different parameter values after receiving the cooperative awareness messages from nearby vehicles. The vehicles exchange their log data and determine the difference between the parameters, which is utilised to detect Sybil attacks and Wormhole attacks. In order to realize efficient and effective intrusion detection system, we use the well-known network simulator (ns-2) to verify the performance of the security system. Simulation results indicate that the security system can achieve high detection rates and effectively detect anomalies with low rate of false alarms. PMID:29315302
Kerr, Enda; Arulraj, Nolan; Scott, Maggie; McDowall, Mike; van Dijke, Margrethe; Keir, Sarah; Sandercock, Peter; Dennis, Martin
2010-07-02
Patients with transient ischaemic attack or stroke benefit from early diagnosis, specialist assessment, and treatment with thrombolysis, and from stroke unit care and secondary prevention. The challenge with such patients is to minimise delays and ensure that treatment is appropriate, and to provide this care with the available resources. An ongoing prospective audit of a transient ischaemic attack and stroke clinic (1 January 2005 to 30 September 2009), as part of the Scottish Stroke Care Audit, and a three month targeted audit of immediate telephone access to a specialist stroke consultant (1 February 2009 to 30 April 2009). Stroke and transient ischaemic attack services in Lothian, a region of Scotland with a population of 810,000. Delays to assessment at a rapid access transient ischaemic attack and stroke clinic; delays to appropriate treatment. In February 2007 we introduced a 24 hours a day, seven days a week hotline to a consultant, who provided immediate advice on diagnosis, investigation, and emergency treatment for patients with transient ischaemic attack or stroke, and suggested the most appropriate care pathway, which might include an early appointment in a transient ischaemic attack and stroke clinic. The introduction of the hotline was associated with an immediate and sustained reduction in delays to assessment (from 13 to three days) and treatment. The proportion of participants taking statins at the time of visiting the clinic increased from 40% before the introduction of the hotline to 60% after the hotline was in place. Also, the hotline contributed to a reduction in the delay from last event to carotid surgery, from 58 days to 21.5 days. A total of 376 calls were received during the three month audit. Of the 273 (88%) referrers who responded to our questionnaire, 257 (94%) were very satisfied with the advice given over the hotline. Although associated with some disruption to the activities of the consultants, a 24 hours a day, seven days a week telephone hotline to a consultant is a feasible and effective means of reducing delays to specialist assessment and treatment of patients with transient ischaemic attack or stroke.
A graph-based system for network-vulnerability analysis
DOE Office of Scientific and Technical Information (OSTI.GOV)
Swiler, L.P.; Phillips, C.
1998-06-01
This paper presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The graph-based tool can identify the set of attack paths that have a high probability of success (or a low effort cost) for the attacker. The system could be used to test the effectiveness of making configuration changes, implementing an intrusion detection system, etc. The analysis system requires as input a database of common attacks,more » broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.« less
de l'Escalopier, Nicolas; Mathieu, Laurent; Valade, Guillaume; Ficko, Cécile; Rigal, Sylvain
2016-05-01
In suicide bomber attacks (SBAs), the explosive forces may disperse fragments from the body of the bomber to which the device is attached. This biologic material can cause physical injury to bystanders and may represent a source of severe infectious diseases. Two French soldiers, victims of an SBA in Africa, were managed in the Percy Military Teaching Hospital. They sustained multiple injuries, including some caused by bony fragments converted into projectiles by the explosion. One patient had multiple superficial wounds managed conservatively. The other was treated surgically by serial debridement with removal of a bony piece related to the suicide bomber. The decision not to prescribe antiretroviral therapy was determined after discussion with infectious disease specialists. Blood tests for HIV, HCV and HBV were taken at months zero, three and six; all were negative. In the French Military Health Service, guidelines are based on evaluation of the viral status of the bomber and on the regional HIV prevalence breakpoint. There is no indication for HCV post-exposition prophylaxis (PEP). Accessible human foreign bodies related to an SBA should be removed as soon as possible, in association with antibiotic medication and a possible HIV PEP. These infectious risks have been discussed in some military and law enforcement literature. It should be a risk-based decision supported by medical intelligence.
ERIC Educational Resources Information Center
Falsetti, Sherry A.; Resnick, Heidi S.; Davis, Joanne
2005-01-01
A large proportion of patients who present for treatment of posttraumatic stress disorder (PTSD) experience comorbid panic attacks, yet it is unclear to what extent currently available PTSD treatment programs address this problem. Here we describe a newly developed treatment, multiple-channel exposure therapy (M-CET), for comorbid PTSD and panic…
Issa, Hussain; Al-Saif, Osama; Al-Momen, Sami; Bseiso, Bahaa; Al-Salem, Ahmed
2010-01-01
Roux-en-Y gastric bypass is a common surgical procedure used to treat patients with morbid obesity. One of the rare, but potentially fatal complications of gastric bypass is upper gastrointestinal bleeding, which can pose diagnostic and therapeutic dilemmas. This report describes a 39-year-old male with morbid obesity who underwent a Roux-en-Y gastric bypass. Three months postoperatively, he sustained repeated and severe upper attacks of upper gastrointestinal bleeding. He received multiple blood transfusions, and had repeated upper and lower endoscopies with no diagnostic yield. Finally, he underwent laparoscopic endoscopy which revealed a bleeding duodenal ulcer. About 5 ml of saline with adrenaline was injected, followed by electrocoagulation to seal the overlying cleft and blood vessel. He was also treated with a course of a proton pump inhibitor and given treatment for H pylori eradication with no further attacks of bleeding. Taking in consideration the difficulties in accessing the bypassed stomach endoscopically, laparoscopic endoscopy is a feasible and valuable diagnostic and therapeutic procedure in patients who had gastric bypass.
A quantum optical firewall based on simple quantum devices
NASA Astrophysics Data System (ADS)
Amellal, H.; Meslouhi, A.; Hassouni, Y.; El Baz, M.
2015-07-01
In order to enhance the transmission security in quantum communications via coherent states, we propose a quantum optical firewall device to protect a quantum cryptosystem against eavesdropping through optical attack strategies. Similar to the classical model of the firewall, the proposed device gives legitimate users the possibility of filtering, controlling (input/output states) and making a decision (access or deny) concerning the traveling states. To prove the security and efficiency of the suggested optical firewall, we analyze its performances against the family of intercept and resend attacks, especially against one of the most prominent attack schemes known as "Faked State Attack."
Cognitive-Behavior Therapy for Vietnamese Refugees with PTSD and Comorbid Panic Attacks
ERIC Educational Resources Information Center
Hinton, Devon E.; Safren, Steven A.; Pollack, Mark H.; Tran, Minh
2006-01-01
For Vietnamese refugees, we describe (a) how headache- and orthostasis-focused panic attacks are generated, (b) a culturally sensitive treatment for PTSD with comorbid headache- and orthostasis-focused panic attacks, and (c) the outcome of a treatment series. In a multiple-baseline, across-subjects design (N = 3), all patients demonstrated…
Unsupervised Anomaly Detection Based on Clustering and Multiple One-Class SVM
NASA Astrophysics Data System (ADS)
Song, Jungsuk; Takakura, Hiroki; Okabe, Yasuo; Kwon, Yongjin
Intrusion detection system (IDS) has played an important role as a device to defend our networks from cyber attacks. However, since it is unable to detect unknown attacks, i.e., 0-day attacks, the ultimate challenge in intrusion detection field is how we can exactly identify such an attack by an automated manner. Over the past few years, several studies on solving these problems have been made on anomaly detection using unsupervised learning techniques such as clustering, one-class support vector machine (SVM), etc. Although they enable one to construct intrusion detection models at low cost and effort, and have capability to detect unforeseen attacks, they still have mainly two problems in intrusion detection: a low detection rate and a high false positive rate. In this paper, we propose a new anomaly detection method based on clustering and multiple one-class SVM in order to improve the detection rate while maintaining a low false positive rate. We evaluated our method using KDD Cup 1999 data set. Evaluation results show that our approach outperforms the existing algorithms reported in the literature; especially in detection of unknown attacks.
Execute-Only Attacks against Execute-Only Defenses
2016-02-18
and network cards , do not undergo translation by the MMU and are unaffected by EPT permission. The idea of exploiting systems via DMA is well studied... dump . There are two ways an attacker can gain access to a file opened using O_DIRECT. In the most straightforward scenario, the victim process may
Designing, Implementing, and Evaluating Secure Web Browsers
ERIC Educational Resources Information Center
Grier, Christopher L.
2009-01-01
Web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems using browser-based attacks. Efforts that retrofit existing browsers have had limited success since modern browsers are not designed to withstand attack. To enable more secure web browsing, we design and implement new web browsers from the ground…
Multiple-image hiding using super resolution reconstruction in high-frequency domains
NASA Astrophysics Data System (ADS)
Li, Xiao-Wei; Zhao, Wu-Xiang; Wang, Jun; Wang, Qiong-Hua
2017-12-01
In this paper, a robust multiple-image hiding method using the computer-generated integral imaging and the modified super-resolution reconstruction algorithm is proposed. In our work, the host image is first transformed into frequency domains by cellular automata (CA), to assure the quality of the stego-image, the secret images are embedded into the CA high-frequency domains. The proposed method has the following advantages: (1) robustness to geometric attacks because of the memory-distributed property of elemental images, (2) increasing quality of the reconstructed secret images as the scheme utilizes the modified super-resolution reconstruction algorithm. The simulation results show that the proposed multiple-image hiding method outperforms other similar hiding methods and is robust to some geometric attacks, e.g., Gaussian noise and JPEG compression attacks.
Kroes, Anneke; Broekgaarden, Colette; Castellanos Uribe, Marcos; May, Sean; van Loon, Joop J A; Dicke, Marcel
2017-01-01
Plants are commonly attacked by multiple herbivorous species. Yet, little is known about transcriptional patterns underlying plant responses to multiple insect attackers feeding simultaneously. Here, we assessed transcriptomic responses of Arabidopsis thaliana plants to simultaneous feeding by Plutella xylostella caterpillars and Brevicoryne brassicae aphids in comparison to plants infested by P. xylostella caterpillars alone, using microarray analysis. We particularly investigated how aphid feeding interferes with the transcriptomic response to P. xylostella caterpillars and whether this interference is dependent on aphid density and time since aphid attack. Various JA-responsive genes were up-regulated in response to feeding by P. xylostella caterpillars. The additional presence of aphids, both at low and high densities, clearly affected the transcriptional plant response to caterpillars. Interestingly, some important modulators of plant defense signalling, including WRKY transcription factor genes and ABA-dependent genes, were differentially induced in response to simultaneous aphid feeding at low or high density compared with responses to P. xylostella caterpillars feeding alone. Furthermore, aphids affected the P. xylostella-induced transcriptomic response in a density-dependent manner, which caused an acceleration in plant response against dual insect attack at high aphid density compared to dual insect attack at low aphid density. In conclusion, our study provides evidence that aphids influence the caterpillar-induced transcriptional response of A. thaliana in a density-dependent manner. It highlights the importance of addressing insect density to understand how plant responses to single attackers interfere with responses to other attackers and thus underlines the importance of the dynamics of transcriptional plant responses to multiple herbivory.
Modeling and Managing Risk in Billing Infrastructures
NASA Astrophysics Data System (ADS)
Baiardi, Fabrizio; Telmon, Claudio; Sgandurra, Daniele
This paper discusses risk modeling and risk management in information and communications technology (ICT) systems for which the attack impact distribution is heavy tailed (e.g., power law distribution) and the average risk is unbounded. Systems with these properties include billing infrastructures used to charge customers for services they access. Attacks against billing infrastructures can be classified as peripheral attacks and backbone attacks. The goal of a peripheral attack is to tamper with user bills; a backbone attack seeks to seize control of the billing infrastructure. The probability distribution of the overall impact of an attack on a billing infrastructure also has a heavy-tailed curve. This implies that the probability of a massive impact cannot be ignored and that the average impact may be unbounded - thus, even the most expensive countermeasures would be cost effective. Consequently, the only strategy for managing risk is to increase the resilience of the infrastructure by employing redundant components.
Finite Energy and Bounded Actuator Attacks on Cyber-Physical Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M
As control system networks are being connected to enterprise level networks for remote monitoring, operation, and system-wide performance optimization, these same connections are providing vulnerabilities that can be exploited by malicious actors for attack, financial gain, and theft of intellectual property. Much effort in cyber-physical system (CPS) protection has focused on protecting the borders of the system through traditional information security techniques. Less effort has been applied to the protection of cyber-physical systems from intelligent attacks launched after an attacker has defeated the information security protections to gain access to the control system. In this paper, attacks on actuator signalsmore » are analyzed from a system theoretic context. The threat surface is classified into finite energy and bounded attacks. These two broad classes encompass a large range of potential attacks. The effect of theses attacks on a linear quadratic (LQ) control are analyzed, and the optimal actuator attacks for both finite and infinite horizon LQ control are derived, therefore the worst case attack signals are obtained. The closed-loop system under the optimal attack signals is given and a numerical example illustrating the effect of an optimal bounded attack is provided.« less
Two fatal tiger attacks in zoos.
Tantius, Britta; Wittschieber, Daniel; Schmidt, Sven; Rothschild, Markus A; Banaschak, Sibylle
2016-01-01
Two captive tiger attacks are presented that took place in Cologne and Münster zoos. Both attacks occurred when the handlers, intent on cleaning the enclosures, entered whilst the tigers accidently retained access to the location, and thus defended their territory against the perceived intruders. Both victims suffered fatal neck injuries from the bites. At Münster, colleagues managed to lure the tiger away from its victim to enable treatment, whilst the Cologne zoo tiger had to be shot in order to allow access to be gained. Whilst it was judged that human error led to the deaths of the experienced zookeepers, the investigation in Münster was closed as no third party was found to be at fault, whereas the Cologne zoo director was initially charged with being negligent. These charges were subsequently dismissed as safety regulations were found to be up to date.
DMP: Detouring Using Multiple Paths against Jamming Attack for Ubiquitous Networking System
Kim, Mihui; Chae, Kijoon
2010-01-01
To successfully realize the ubiquitous network environment including home automation or industrial control systems, it is important to be able to resist a jamming attack. This has recently been considered as an extremely threatening attack because it can collapse the entire network, despite the existence of basic security protocols such as encryption and authentication. In this paper, we present a method of jamming attack tolerant routing using multiple paths based on zones. The proposed scheme divides the network into zones, and manages the candidate forward nodes of neighbor zones. After detecting an attack, detour nodes decide zones for rerouting, and detour packets destined for victim nodes through forward nodes in the decided zones. Simulation results show that our scheme increases the PDR (Packet Delivery Ratio) and decreases the delay significantly in comparison with rerouting by a general routing protocol on sensor networks, AODV (Ad hoc On Demand Distance Vector), and a conventional JAM (Jammed Area Mapping) service with one reroute. PMID:22319316
DMP: detouring using multiple paths against jamming attack for ubiquitous networking system.
Kim, Mihui; Chae, Kijoon
2010-01-01
To successfully realize the ubiquitous network environment including home automation or industrial control systems, it is important to be able to resist a jamming attack. This has recently been considered as an extremely threatening attack because it can collapse the entire network, despite the existence of basic security protocols such as encryption and authentication. In this paper, we present a method of jamming attack tolerant routing using multiple paths based on zones. The proposed scheme divides the network into zones, and manages the candidate forward nodes of neighbor zones. After detecting an attack, detour nodes decide zones for rerouting, and detour packets destined for victim nodes through forward nodes in the decided zones. Simulation results show that our scheme increases the PDR (Packet Delivery Ratio) and decreases the delay significantly in comparison with rerouting by a general routing protocol on sensor networks, AODV (Ad hoc On Demand Distance Vector), and a conventional JAM (Jammed Area Mapping) service with one reroute.
Analysis of Access Control Policies in Operating Systems
ERIC Educational Resources Information Center
Chen, Hong
2009-01-01
Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…
Hybrid attacks on model-based social recommender systems
NASA Astrophysics Data System (ADS)
Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao
2017-10-01
With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.
Message Integrity Model for Wireless Sensor Networks
ERIC Educational Resources Information Center
Qleibo, Haider W.
2009-01-01
WSNs are susceptible to a variety of attacks. These attacks vary in the way they are performed and executed; they include but not limited to node capture, physical tampering, denial of service, and message alteration. It is of paramount importance to protect gathered data by WSNs and defend the network against illegal access and malicious…
The Threat Among Us: Insiders Intensify Aviation Terrorism
DOE Office of Scientific and Technical Information (OSTI.GOV)
Krull, Katie E.
Aviation terrorism is powerful and symbolic, and will likely remain a staple target for terrorists aiming to inflict chaos and cause mass casualties similar to the 9/11 attacks on the U.S. The majority of international and domestic aviation terrorist attacks involves outsiders, or people who do not have direct access to or affiliation with a target through employment. However, several significant attacks and plots against the industry involved malicious employees motivated by suicide or devotion to a terrorist organization. Malicious insiders’ access and knowledge of aviation security, systems, networks, and infrastructure is valuable to terrorists, providing a different pathway formore » attacking the industry through the insider threat. Indicators and warnings of insider threats in these cases exist, providing insight into how security agencies, such as the Transportation Security Administration, can better predict and identify insider involvement. Understanding previous aviation insider threat events will likely aid in stimulating proactive security measures, rather than reactive responses. However, similar to traditional airport security measures, there are social, political, and economic challenges in protecting against the insider threat, including privacy concerns and cost-benefit analysis.« less
Embedding multiple watermarks in the DFT domain using low- and high-frequency bands
NASA Astrophysics Data System (ADS)
Ganic, Emir; Dexter, Scott D.; Eskicioglu, Ahmet M.
2005-03-01
Although semi-blind and blind watermarking schemes based on Discrete Cosine Transform (DCT) or Discrete Wavelet Transform (DWT) are robust to a number of attacks, they fail in the presence of geometric attacks such as rotation, scaling, and translation. The Discrete Fourier Transform (DFT) of a real image is conjugate symmetric, resulting in a symmetric DFT spectrum. Because of this property, the popularity of DFT-based watermarking has increased in the last few years. In a recent paper, we generalized a circular watermarking idea to embed multiple watermarks in lower and higher frequencies. Nevertheless, a circular watermark is visible in the DFT domain, providing a potential hacker with valuable information about the location of the watermark. In this paper, our focus is on embedding multiple watermarks that are not visible in the DFT domain. Using several frequency bands increases the overall robustness of the proposed watermarking scheme. Specifically, our experiments show that the watermark embedded in lower frequencies is robust to one set of attacks, and the watermark embedded in higher frequencies is robust to a different set of attacks.
A Survey of Insider Attack Detection Research
2008-08-25
modeling of statistical features , such as the frequency of events, the duration of events, the co-occurrence of multiple events combined through...forms of attack that have been reported [Error! Reference source not found.]. For example: • Unauthorized extraction , duplication, or exfiltration...network level. Schultz pointed out that not one approach will work but solutions need to be based on multiple sensors to be able to find any combination
Gum spots in black cherry caused by natural attacks of peach bark beetle
Charles O. Rexrode
1981-01-01
Peach bark beetles, Phloeotribus liminaris (Harris), made abortive attacks on healthy black cherry, Prunus serotina Ehrh., trees. The beetle attacks caused five types of gum spots in the wood and a gummy exudate on the bark. The most extensive and common types of gum spot were single and multiple rows of interray gum spots that...
NASA Astrophysics Data System (ADS)
Thiel, M.; Flachenecker, G.; Schade, W.; Gorecki, C.; Thoma, A.; Rathje, R.
2017-11-01
Optical seals consisting of waveguide Bragg grating sensor structures in ultra thin glass transparencies have been developed to cover security relevant objects for detection of unauthorized access. For generation of optical signature in the seals, femtosecond laser pulses were used. The optical seals were connected with an optical fiber to enable external read out of the seal. Different attack scenarios for getting undetected access to the object, covered by the seal, were proven and evaluated. The results presented here, verify a very high level of security. An unauthorized detaching and subsequent replacement by original or copy of the seals for tampering would be accompanied with a very high technological effort, posing a substantial barrier towards an attacker. Additionally, environmental influences like temperature effects have a strong but reproducible influence on signature, which in context of a temperature reference database increases the level of security significantly.
Busingye, Doreen; Pedigo, Ashley; Odoi, Agricola
2011-12-01
The objective of this study was to investigate temporal changes in geographic access to emergency heart attack and stroke care. Network analysis was used to compute travel time to the nearest emergency room (ER), cardiac, and stroke centers in Middle Tennessee. Populations within 30, 60, and 90 min driving time to the nearest ER, cardiac and stroke centers were identified. There were improvements in timely access to cardiac and stroke centers over the study period (1999-2010). There were significant (p<0.0001) increases in the proportion of the population with access to cardiac centers within 30 min from 29.4% (1999) to 62.4% (2009) while that for stroke changed from 5.4% (2004) to 46.1% (2010). Most (96%) of the population had access to an ER within 30 min from 1999 to 2010. Access to care has improved in the last decade but more still needs to be done to address disparities in rural communities. Copyright © 2011 Elsevier Ltd. All rights reserved.
Semantic policy and adversarial modeling for cyber threat identification and avoidance
NASA Astrophysics Data System (ADS)
DeFrancesco, Anton; McQueary, Bruce
2009-05-01
Today's enterprise networks undergo a relentless barrage of attacks from foreign and domestic adversaries. These attacks may be perpetrated with little to no funding, but may wreck incalculable damage upon the enterprises security, network infrastructure, and services. As more services come online, systems that were once in isolation now provide information that may be combined dynamically with information from other systems to create new meaning on the fly. Security issues are compounded by the potential to aggregate individual pieces of information and infer knowledge at a higher classification than any of its constituent parts. To help alleviate these challenges, in this paper we introduce the notion of semantic policy and discuss how it's use is evolving from a robust approach to access control to preempting and combating attacks in the cyber domain, The introduction of semantic policy and adversarial modeling to network security aims to ask 'where is the network most vulnerable', 'how is the network being attacked', and 'why is the network being attacked'. The first aspect of our approach is integration of semantic policy into enterprise security to augment traditional network security with an overall awareness of policy access and violations. This awareness allows the semantic policy to look at the big picture - analyzing trends and identifying critical relations in system wide data access. The second aspect of our approach is to couple adversarial modeling with semantic policy to move beyond reactive security measures and into a proactive identification of system weaknesses and areas of vulnerability. By utilizing Bayesian-based methodologies, the enterprise wide meaning of data and semantic policy is applied to probability and high-level risk identification. This risk identification will help mitigate potential harm to enterprise networks by enabling resources to proactively isolate, lock-down, and secure systems that are most vulnerable.
S-Boxes Based on Affine Mapping and Orbit of Power Function
NASA Astrophysics Data System (ADS)
Khan, Mubashar; Azam, Naveed Ahmed
2015-06-01
The demand of data security against computational attacks such as algebraic, differential, linear and interpolation attacks has been increased as a result of rapid advancement in the field of computation. It is, therefore, necessary to develop such cryptosystems which can resist current cryptanalysis and more computational attacks in future. In this paper, we present a multiple S-boxes scheme based on affine mapping and orbit of the power function used in Advanced Encryption Standard (AES). The proposed technique results in 256 different S-boxes named as orbital S-boxes. Rigorous tests and comparisons are performed to analyse the cryptographic strength of each of the orbital S-boxes. Furthermore, gray scale images are encrypted by using multiple orbital S-boxes. Results and simulations show that the encryption strength of the orbital S-boxes against computational attacks is better than that of the existing S-boxes.
Gray Matter Is Targeted in First-Attack Multiple Sclerosis
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schutzer, Steven E.; Angel, Thomas E.; Liu, Tao
The cause of multiple sclerosis (MS), its driving pathogenesis at the earliest stages, and what factors allow the first clinical attack to manifest remain unknown. Some imaging studies suggest gray rather than white matter may be involved early, and some postulate this may be predictive of developing MS. Other imaging studies are in conflict. To determine if there was objective molecular evidence of gray matter involvement in early MS we used high-resolution mass spectrometry to identify proteins in the cerebrospinal fluid (CSF) of first-attack MS patients (two independent groups) compared to established relapsing remitting (RR) MS and controls. We foundmore » that the CSF proteins in first-attack patients were differentially enriched for gray matter components (axon, neuron, synapse). Myelin components did not distinguish these groups. The results support that gray matter dysfunction is involved early in MS, and also may be integral for the initial clinical presentation.« less
2014-01-01
Background There is little current information about the unmet mental health care need (UMHCN) and reasons for it among those exposed to the World Trade Center (WTC) terrorist attacks. The purpose of this study was to assess the level of UMHCN among symptomatic individuals enrolled in the WTC Health Registry (WTCHR) in 2011–2012, and to analyze the relationship between UMHCN due to attitudinal, cost, and access factors and mental health symptom severity, mental health care utilization, health insurance availability, and social support. Methods The WTCHR is a prospective cohort study of individuals with reported exposure to the 2001 WTC attacks. This study used data from 9,803 adults who completed the 2003–2004 (Wave 1) and 2011–2012 (Wave 3) surveys and had posttraumatic stress disorder (PTSD) or depression in 2011–2012. We estimated logistic regression models relating perceived attitudinal, cost and access barriers to symptom severity, health care utilization, a lack of health insurance, and social support after adjusting for sociodemographic characteristics. Results Slightly more than one-third (34.2%) of study participants reported an UMHCN. Symptom severity was a strong predictor of UMHCN due to attitudinal and perceived cost and access reasons. Attitudinal UMHCN was common among those not using mental health services, particularly those with relatively severe mental health symptoms. Cost-related UMHCN was significantly associated with a lack of health insurance but not service usage. Access-related barriers were significantly more common among those who did not use any mental health services. A higher level of social support served as an important buffer against cost and access UMHCN. Conclusions A significant proportion of individuals exposed to the WTC attacks with depression or PTSD 10 years later reported an UMHCN, and individuals with more severe and disabling conditions, those who lacked health insurance, and those with low levels of social support were particularly vulnerable. PMID:24885506
Navy Virginia (SSN-774) Class Attack Submarine Procurement: Background and Issues for Congress
2011-04-21
Procurement Congressional Research Service 4 Figure 1. Virginia-Class Attack Submarine Source: U.S. Navy file photo accessed by CRS on January...May 12, 2004, p. 1; Lolita C. Baldor, “Study Recommends Cutting Submarine Fleet,” NavyTimes.com, May 13, 2004. 44 U.S. Department of the Navy, An
Navy Virginia (SSN-774) Class Attack Submarine Procurement: Background and Issues for Congress
2011-04-12
Research Service 4 Figure 1. Virginia-Class Attack Submarine Source: U.S. Navy file photo accessed by CRS on January 11, 2011, at http...September 2001, p. 23. 42 Bryan Bender, “Navy Eyes Cutting Submarine Force,” Boston Globe, May 12, 2004, p. 1; Lolita C. Baldor, “Study Recommends
Cyberspace Superiority: Dominating the Digital Frontier
2014-01-01
2009/07/137_48261.html. 9 Lolita Baldor, “White House among targets of cyber attack: Other targets included NSA, Homeland Security and State...attackers appeared not to get the results for 10 Lolita Baldor, "White House among targets of cyber...Communications Commission (KCC) order service providers to deny access to 30,000 13 Lolita Baldor, "US
Report #18-P-0030, October 30, 2017. Weaknesses in the Identity and Access Management and Incident Response metric domains leave the CSB vulnerable to attacks occurring and not being detected in a timely manner.
Ab initio chemical kinetics for the HCCO + OH reaction
NASA Astrophysics Data System (ADS)
Mai, Tam V.-T.; Raghunath, P.; Le, Xuan T.; Huynh, Lam K.; Nam, Pham-Cam; Lin, M. C.
2014-01-01
The mechanism for the reaction of HCCO and OH has been investigated at different high-levels of theory. The reaction was found to occur on singlet and triplet potential energy surfaces with multiple accessible paths. Rate constants predicted by variational RRKM/ME calculations show that the reaction on both surfaces occurs primarily by barrierless OH attack at both C atoms producing excited intermediates which fragment to produce predominantly CO and 1,3HCOH with kS = 3.12 × 10-8T-0.59exp[-73.0/T] and kT = 6.29 × 10-11T0.13exp[108/T] cm3 molecule-1 s-1 at T = 300-2000 K, independent of pressure at P < 76 000 Torr.
A pipelined FPGA implementation of an encryption algorithm based on genetic algorithm
NASA Astrophysics Data System (ADS)
Thirer, Nonel
2013-05-01
With the evolution of digital data storage and exchange, it is essential to protect the confidential information from every unauthorized access. High performance encryption algorithms were developed and implemented by software and hardware. Also many methods to attack the cipher text were developed. In the last years, the genetic algorithm has gained much interest in cryptanalysis of cipher texts and also in encryption ciphers. This paper analyses the possibility to use the genetic algorithm as a multiple key sequence generator for an AES (Advanced Encryption Standard) cryptographic system, and also to use a three stages pipeline (with four main blocks: Input data, AES Core, Key generator, Output data) to provide a fast encryption and storage/transmission of a large amount of data.
Detecting Heap-Spraying Code Injection Attacks in Malicious Web Pages Using Runtime Execution
NASA Astrophysics Data System (ADS)
Choi, Younghan; Kim, Hyoungchun; Lee, Donghoon
The growing use of web services is increasing web browser attacks exponentially. Most attacks use a technique called heap spraying because of its high success rate. Heap spraying executes a malicious code without indicating the exact address of the code by copying it into many heap objects. For this reason, the attack has a high potential to succeed if only the vulnerability is exploited. Thus, attackers have recently begun using this technique because it is easy to use JavaScript to allocate the heap memory area. This paper proposes a novel technique that detects heap spraying attacks by executing a heap object in a real environment, irrespective of the version and patch status of the web browser. This runtime execution is used to detect various forms of heap spraying attacks, such as encoding and polymorphism. Heap objects are executed after being filtered on the basis of patterns of heap spraying attacks in order to reduce the overhead of the runtime execution. Patterns of heap spraying attacks are based on analysis of how an web browser accesses benign web sites. The heap objects are executed forcibly by changing the instruction register into the address of them after being loaded into memory. Thus, we can execute the malicious code without having to consider the version and patch status of the browser. An object is considered to contain a malicious code if the execution reaches a call instruction and then the instruction accesses the API of system libraries, such as kernel32.dll and ws_32.dll. To change registers and monitor execution flow, we used a debugger engine. A prototype, named HERAD(HEap spRAying Detector), is implemented and evaluated. In experiments, HERAD detects various forms of exploit code that an emulation cannot detect, and some heap spraying attacks that NOZZLE cannot detect. Although it has an execution overhead, HERAD produces a low number of false alarms. The processing time of several minutes is negligible because our research focuses on detecting heap spraying. This research can be applied to existing systems that collect malicious codes, such as Honeypot.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bri Rolston
2005-06-01
Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills,more » and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between those threats and the defensive capabilities of control systems can be analyzed. The results of the gap analysis drive changes in the cyber security of critical infrastructure networks to close the gap between current exploits and existing defenses. The analysis also provides defenders with an idea of how threat technology is evolving and how defenses will need to be modified to address these emerging trends.« less
Multiple sclerosis (MS) is a nervous system disease that affects your brain and spinal cord. It damages the ... attacks healthy cells in your body by mistake. Multiple sclerosis affects women more than men. It often begins ...
Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Obaidat, Mohammad S
2015-11-01
In order to access remote medical server, generally the patients utilize smart card to login to the server. It has been observed that most of the user (patient) authentication protocols suffer from smart card stolen attack that means the attacker can mount several common attacks after extracting smart card information. Recently, Lu et al.'s proposes a session key agreement protocol between the patient and remote medical server and claims that the same protocol is secure against relevant security attacks. However, this paper presents several security attacks on Lu et al.'s protocol such as identity trace attack, new smart card issue attack, patient impersonation attack and medical server impersonation attack. In order to fix the mentioned security pitfalls including smart card stolen attack, this paper proposes an efficient remote mutual authentication protocol using smart card. We have then simulated the proposed protocol using widely-accepted AVISPA simulation tool whose results make certain that the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. Moreover, the rigorous security analysis proves that the proposed protocol provides strong security protection on the relevant security attacks including smart card stolen attack. We compare the proposed scheme with several related schemes in terms of computation cost and communication cost as well as security functionalities. It has been observed that the proposed scheme is comparatively better than related existing schemes.
Chosen-plaintext attack on a joint transform correlator encrypting system
NASA Astrophysics Data System (ADS)
Barrera, John Fredy; Vargas, Carlos; Tebaldi, Myrian; Torroba, Roberto
2010-10-01
We demonstrate that optical encryption methods based on the joint transform correlator architecture are vulnerable to chosen-plaintext attack. An unauthorized user, who introduces three chosen plaintexts in the accessible encryption machine, can obtain the security key code mask. In this contribution, we also propose an alternative method to eliminate ambiguities that allows obtaining the right decrypting key.
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer
NASA Astrophysics Data System (ADS)
Mannan, Mohammad; van Oorschot, P. C.
Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users' financial accounts. Most existing or proposed solutions are vulnerable to session hijacking attacks. We propose a simple approach to counter these attacks, which cryptographically separates a user's long-term secret input from (typically untrusted) client PCs; a client PC performs most computations but has access only to temporary secrets. The user's long-term secret (typically short and low-entropy) is input through an independent personal trusted device such as a cellphone. The personal device provides a user's long-term secrets to a client PC only after encrypting the secrets using a pre-installed, "correct" public key of a remote service (the intended recipient of the secrets). The proposed protocol (
NASA Astrophysics Data System (ADS)
Acín, Antonio; Gisin, Nicolas; Scarani, Valerio
2004-01-01
We propose a class of quantum cryptography protocols that are robust against photon-number-splitting attacks (PNS) in a weak coherent-pulse implementation. We give a quite exhaustive analysis of several eavesdropping attacks on these schemes. The honest parties (Alice and Bob) use present-day technology, in particular an attenuated laser as an approximation of a single-photon source. The idea of the protocols is to exploit the nonorthogonality of quantum states to decrease the information accessible to Eve due to the multiphoton pulses produced by the imperfect source. The distance at which the key distribution becomes insecure due to the PNS attack is significantly increased compared to the existing schemes. We also show that strong-pulse implementations, where a strong pulse is included as a reference, allow for key distribution robust against photon-number-splitting attacks.
A Robust and Resilient Network Design Paradigm for Region-Based Faults Inflicted by WMD Attack
2016-04-01
MEASUREMENTS FOR GRID MONITORING AND CONTROL AGAINST POSSIBLE WMD ATTACKS We investigated big data processing of PMU measurements for grid monitoring and...control against possible WMD attacks. Big data processing and analytics of synchrophasor measurements, collected from multiple locations of power grids...collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources
Factors associated with recovery from acute optic neuritis in patients with multiple sclerosis.
Malik, Muhammad Taimur; Healy, Brian C; Benson, Leslie A; Kivisakk, Pia; Musallam, Alexander; Weiner, Howard L; Chitnis, Tanuja
2014-06-17
To identify clinical and demographic features associated with the severity and recovery from acute optic neuritis (AON) episodes in patients with multiple sclerosis (MS). Adult (n = 253) and pediatric (n = 38) patients whose first symptom was AON were identified from our MS database. Severity measured by loss of visual acuity (mild attack ≤20/40, moderate attack 20/50-20/190, and severe attack ≥20/200) and recovery in visual acuity at 1 year after the attack (complete recovery ≤20/20, fair recovery 20/40, and poor recovery ≥20/50) were recorded. Demographic and clinical features associated with attack severity and recovery were identified using proportional odds logistic regression. For another group of patients, blood samples were available within 6 months of an AON attack. In this group, the impact of vitamin D level on the severity/recovery was also assessed. Men (adjusted odds ratio [OR] = 2.28, p = 0.03) and subjects with severe attacks (adjusted OR = 5.24, p < 0.001) had worse recovery. AON severity was similar between the pediatric and adult subjects, but recovery was significantly better in pediatric subjects in the unadjusted analysis (p = 0.041) and the analysis adjusted for sex (p = 0.029). Season-adjusted vitamin D level was significantly associated with attack severity (OR for 10-U increase in vitamin D level = 0.47; 95% confidence interval: 0.32, 0.68; p < 0.001). Vitamin D level was not associated with recovery from the attack (p = 0.98) in univariate analysis or after accounting for attack severity (p = 0.10). Vitamin D levels affect AON severity, whereas younger age, attack severity, and male sex affect AON recovery. Underlying mechanisms and potential therapeutic targets may identify new measures to mitigate disability accrual in MS. © 2014 American Academy of Neurology.
DOE Office of Scientific and Technical Information (OSTI.GOV)
John Homer; Ashok Varikuti; Xinming Ou
Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions. This paper presents methodologies that can 1) automatically identify portions of an attack graph that do not help a user to understand the core security problems and so can be trimmed, and 2) automatically group similar attack steps as virtual nodes in a model of the network topology, to immediately increase the understandability ofmore » the data. We believe both methods are important steps toward improving visualization of attack graphs to make them more useful in configuration management for large enterprise networks. We implemented our methods using one of the existing attack-graph toolkits. Initial experimentation shows that the proposed approaches can 1) significantly reduce the complexity of attack graphs by trimming a large portion of the graph that is not needed for a user to understand the security problem, and 2) significantly increase the accessibility and understandability of the data presented in the attack graph by clearly showing, within a generated visualization of the network topology, the number and type of potential attacks to which each host is exposed.« less
Mode of de-esterification of alkaline and acidic pectin methyl esterases at different pH conditions.
Duvetter, Thomas; Fraeye, Ilse; Sila, Daniel N; Verlent, Isabel; Smout, Chantal; Hendrickx, Marc; Van Loey, Ann
2006-10-04
Highly esterified citrus pectin was de-esterified at pH 4.5 and 8.0 by a fungal pectin methyl esterase (PME) that was shown to have an acidic isoelectric pH (pI) and an acidic pH optimum and by a plant PME that was characterized by an alkaline pI and an alkaline pH optimum. Interchain and intrachain de-esterification patterns were studied by digestion of the pectin products with endo-polygalacturonase and subsequent analysis using size exclusion and anion-exchange chromatography. No effect of pH was observed on the de-esterification mode of either of the two enzymes. Acidic, fungal PME converted pectin according to a multiple-chain mechanism, with a limited degree of multiple attack at the intrachain level, both at pH 4.5 and at pH 8.0. A multiple-attack mechanism, with a high degree of multiple attack, was more appropriate to describe the action mode of alkaline, plant PME, both at pH 4.5 and at pH 8.0.
NASA Astrophysics Data System (ADS)
Du, Mao-Kang; He, Bo; Wang, Yong
2011-01-01
Recently, the cryptosystem based on chaos has attracted much attention. Wang and Yu (Commun. Nonlin. Sci. Numer. Simulat. 14 (2009) 574) proposed a block encryption algorithm based on dynamic sequences of multiple chaotic systems. We analyze the potential flaws in the algorithm. Then, a chosen-plaintext attack is presented. Some remedial measures are suggested to avoid the flaws effectively. Furthermore, an improved encryption algorithm is proposed to resist the attacks and to keep all the merits of the original cryptosystem.
NASA Technical Reports Server (NTRS)
Denning, Peter J.
1989-01-01
Two new books about intrusions and computer viruses remind us that attacks against our computers on networks are the actions of human beings. Cliff Stoll's book about the hacker who spent a year, beginning in Aug. 1986, attempting to use the Lawrence Berkeley Computer as a stepping-stone for access to military secrets is a spy thriller that illustrates the weaknesses of our password systems and the difficulties in compiling evidence against a hacker engaged in espionage. Pamela Kane's book about viruses that attack IBM PC's shows that viruses are the modern version of the old problem of a Trojan horse attack. It discusses the most famous viruses and their countermeasures, and it comes with a floppy disk of utility programs that will disinfect your PC and thwart future attack.
Cannabinoids inhibit neurodegeneration in models of multiple sclerosis.
Pryce, Gareth; Ahmed, Zubair; Hankey, Deborah J R; Jackson, Samuel J; Croxford, J Ludovic; Pocock, Jennifer M; Ledent, Catherine; Petzold, Axel; Thompson, Alan J; Giovannoni, Gavin; Cuzner, M Louise; Baker, David
2003-10-01
Multiple sclerosis is increasingly being recognized as a neurodegenerative disease that is triggered by inflammatory attack of the CNS. As yet there is no satisfactory treatment. Using experimental allergic encephalo myelitis (EAE), an animal model of multiple sclerosis, we demonstrate that the cannabinoid system is neuroprotective during EAE. Mice deficient in the cannabinoid receptor CB1 tolerate inflammatory and excitotoxic insults poorly and develop substantial neurodegeneration following immune attack in EAE. In addition, exogenous CB1 agonists can provide significant neuroprotection from the consequences of inflammatory CNS disease in an experimental allergic uveitis model. Therefore, in addition to symptom management, cannabis may also slow the neurodegenerative processes that ultimately lead to chronic disability in multiple sclerosis and probably other diseases.
Analyses of battle casualties by weapon type aboard U.S. Navy warships.
Blood, C G
1992-03-01
The number of casualties was determined for 513 incidents involving U.S. Navy warships sunk or damaged during World War II. Ship type and weapon were significant factors in determining the numbers of wounded and killed. Multiple weapon attacks and kamikazes yielded more wounded in action than other weapon types. Multiple weapons and torpedos resulted in a higher incidence of killed in action than other weapons. Penetrating wounds and burns were the most prominent injury types. Kamikaze attacks yielded significantly more burns than incidents involving bombs, gunfire, torpedos, mines, and multiple weapons. Mine explosions were responsible for more strains, sprains, and dislocations than the other weapon types.
Enhanced MHT encryption scheme for chosen plaintext attack
NASA Astrophysics Data System (ADS)
Xie, Dahua; Kuo, C. C. J.
2003-11-01
Efficient multimedia encryption algorithms play a key role in multimedia security protection. One multimedia encryption algorithm known as the MHT (Multiple Huffman Tables) method was recently developed by Wu and Kuo. Even though MHT has many desirable properties, it is vulnerable to the chosen-plaintext attack (CPA). An enhanced MHT algorithm is proposed in this work to overcome this drawback. It is proved mathematically that the proposed algorithm is secure against the chosen plaintext attack.
Internet firewalls: questions and answers
NASA Astrophysics Data System (ADS)
Ker, Keith
1996-03-01
As organizations consider connecting to the Internet, the issue of internetwork security becomes more important. There are many tools and components that can be used to secure a network, one of which is a firewall. Modern firewalls offer highly flexible private network security by controlling and monitoring all communications passing into or out of the private network. Specifically designed for security, firewalls become the private network's single point of attack from Internet intruders. Application gateways (or proxies) that have been written to be secure against even the most persistent attacks ensure that only authorized users and services access the private network. One-time passwords prevent intruders from `sniffing' and replaying the usernames and passwords of authorized users to gain access to the private network. Comprehensive logging permits constant and uniform system monitoring. `Address spoofing' attacks are prevented. The private network may use registered or unregistered IP addresses behind the firewall. Firewall-to-firewall encryption establishes a `virtual private network' across the Internet, preventing intruders from eavesdropping on private communications, eliminating the need for costly dedicated lines.
Securing SSL-VPN with LR-AKE to access personal health record.
Eizen, Kimura; Masato, Saito; Kazukuni, Kobara; Yoshihito, Nakato; Takuji, Kuroda; Ken, Ishihara
2013-01-01
Using SSL-VPN requires special considerations for well-known issues such as attackers exploiting web browser vulnerabilities and phishing sites using man-in-the-middle attacks. We used leakage-resilient authenticated key exchange (LR-AKE) to develop a comprehensive solution to SSL-VPN issues. Our results show that the LR-AKE should contribute to building a robust infrastructure for personal health records.
Design of Provider-Provisioned Website Protection Scheme against Malware Distribution
NASA Astrophysics Data System (ADS)
Yagi, Takeshi; Tanimoto, Naoto; Hariu, Takeo; Itoh, Mitsutaka
Vulnerabilities in web applications expose computer networks to security threats, and many websites are used by attackers as hopping sites to attack other websites and user terminals. These incidents prevent service providers from constructing secure networking environments. To protect websites from attacks exploiting vulnerabilities in web applications, service providers use web application firewalls (WAFs). WAFs filter accesses from attackers by using signatures, which are generated based on the exploit codes of previous attacks. However, WAFs cannot filter unknown attacks because the signatures cannot reflect new types of attacks. In service provider environments, the number of exploit codes has recently increased rapidly because of the spread of vulnerable web applications that have been developed through cloud computing. Thus, generating signatures for all exploit codes is difficult. To solve these problems, our proposed scheme detects and filters malware downloads that are sent from websites which have already received exploit codes. In addition, to collect information for detecting malware downloads, web honeypots, which automatically extract the communication records of exploit codes, are used. According to the results of experiments using a prototype, our scheme can filter attacks automatically so that service providers can provide secure and cost-effective network environments.
Brainjacking: Implant Security Issues in Invasive Neuromodulation.
Pycroft, Laurie; Boccard, Sandra G; Owen, Sarah L F; Stein, John F; Fitzgerald, James J; Green, Alexander L; Aziz, Tipu Z
2016-08-01
The security of medical devices is critical to good patient care, especially when the devices are implanted. In light of recent developments in information security, there is reason to be concerned that medical implants are vulnerable to attack. The ability of attackers to exert malicious control over brain implants ("brainjacking") has unique challenges that we address in this review, with particular focus on deep brain stimulation implants. To illustrate the potential severity of this risk, we identify several mechanisms through which attackers could manipulate patients if unauthorized access to an implant can be achieved. These include blind attacks in which the attacker requires no patient-specific knowledge and targeted attacks that require patient-specific information. Blind attacks include cessation of stimulation, draining implant batteries, inducing tissue damage, and information theft. Targeted attacks include impairment of motor function, alteration of impulse control, modification of emotions or affect, induction of pain, and modulation of the reward system. We also discuss the limitations inherent in designing implants and the trade-offs that must be made to balance device security with battery life and practicality. We conclude that researchers, clinicians, manufacturers, and regulatory bodies should cooperate to minimize the risk posed by brainjacking. Copyright © 2016 Elsevier Inc. All rights reserved.
On localization attacks against cloud infrastructure
NASA Astrophysics Data System (ADS)
Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali
2013-05-01
One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Acin, Antonio; Gisin, Nicolas; Scarani, Valerio
2004-01-01
We propose a class of quantum cryptography protocols that are robust against photon-number-splitting attacks (PNS) in a weak coherent-pulse implementation. We give a quite exhaustive analysis of several eavesdropping attacks on these schemes. The honest parties (Alice and Bob) use present-day technology, in particular an attenuated laser as an approximation of a single-photon source. The idea of the protocols is to exploit the nonorthogonality of quantum states to decrease the information accessible to Eve due to the multiphoton pulses produced by the imperfect source. The distance at which the key distribution becomes insecure due to the PNS attack is significantlymore » increased compared to the existing schemes. We also show that strong-pulse implementations, where a strong pulse is included as a reference, allow for key distribution robust against photon-number-splitting attacks.« less
Raccanello, Daniela; Burro, Roberto; Brondino, Margherita; Pasini, Margherita
2018-04-01
Notwithstanding the dramatically increasing frequency of acts of terrorism in Europe and the extent of their media coverage, there is lack of knowledge on people's affective reactions and associated emotion regulation strategies. We explored the affective impact on two cohorts of Italian students (n = 193) possibly exposed vicariously through the mass media to the 2015 Paris or the 2016 Brussels terrorist attacks, respectively. We accessed data from three online questionnaires: one on emotion regulation administered before each attack; one on daily affect administered just before and after each attack; and one on causes of weekly affect and life satisfaction administered at the end of the week in which each attack occurred. The attacks were perceived as relevant for influencing negative affect for 22% of the students. For them, suppression-less frequently used than reappraisal-was associated with an improvement of affect after each attack but negatively related to life satisfaction concerning the week in which the attacks occurred. Our data showed that the recent terrorist attacks occurring in Europe had an affective impact on people at some distance who were vicariously exposed and point to the protective role of emotion regulation as a key resource for individuals' well-being. Copyright © 2017 John Wiley & Sons, Ltd.
Pané-Farré, Christiane A; Fenske, Kristin; Stender, Jan P; Meyer, Christian; John, Ulrich; Rumpf, Hans-Jürgen; Hapke, Ulfert; Hamm, Alfons O
2013-06-01
Full-blown panic attacks are frequently associated with other mental disorders. Most comorbidity analyses did not discriminate between isolated panic attacks vs. panic attacks that occurred in the context of a panic disorder and rarely evaluated the impact of comorbid agoraphobia. Moreover, there are no larger scale epidemiological studies regarding the influence of sub-threshold panic attacks. 4075 German-speaking respondents aged 18-64 were interviewed using the fully structured Munich Composite International Diagnostic Interview. Limited symptom attacks, isolated panic attacks, and panic disorder were associated with other lifetime DSM-IV disorders with monotonically increasing odds and increasing tendency for multiple comorbidities across the three groups. The presence of agoraphobia was associated with more frequent comorbidity in all panic subgroups and also in persons who never experienced panic attacks. The present study suggests that populations with isolated or limited symptom should be carefully attended to in clinical practice, especially if agoraphobia is present. Copyright © 2013 Elsevier Ltd. All rights reserved.
DOE Office of Scientific and Technical Information (OSTI.GOV)
McDonald, K; Curran, B
I. Information Security Background (Speaker = Kevin McDonald) Evolution of Medical Devices Living and Working in a Hostile Environment Attack Motivations Attack Vectors Simple Safety Strategies Medical Device Security in the News Medical Devices and Vendors Summary II. Keeping Radiation Oncology IT Systems Secure (Speaker = Bruce Curran) Hardware Security Double-lock Requirements “Foreign” computer systems Portable Device Encryption Patient Data Storage System Requirements Network Configuration Isolating Critical Devices Isolating Clinical Networks Remote Access Considerations Software Applications / Configuration Passwords / Screen Savers Restricted Services / access Software Configuration Restriction Use of DNS to restrict accesse. Patches / Upgrades Awareness Intrusionmore » Prevention Intrusion Detection Threat Risk Analysis Conclusion Learning Objectives: Understanding how Hospital IT Requirements affect Radiation Oncology IT Systems. Illustrating sample practices for hardware, network, and software security. Discussing implementation of good IT security practices in radiation oncology. Understand overall risk and threats scenario in a networked environment.« less
Post-Stall Aerodynamic Modeling and Gain-Scheduled Control Design
NASA Technical Reports Server (NTRS)
Wu, Fen; Gopalarathnam, Ashok; Kim, Sungwan
2005-01-01
A multidisciplinary research e.ort that combines aerodynamic modeling and gain-scheduled control design for aircraft flight at post-stall conditions is described. The aerodynamic modeling uses a decambering approach for rapid prediction of post-stall aerodynamic characteristics of multiple-wing con.gurations using known section data. The approach is successful in bringing to light multiple solutions at post-stall angles of attack right during the iteration process. The predictions agree fairly well with experimental results from wind tunnel tests. The control research was focused on actuator saturation and .ight transition between low and high angles of attack regions for near- and post-stall aircraft using advanced LPV control techniques. The new control approaches maintain adequate control capability to handle high angle of attack aircraft control with stability and performance guarantee.
Strategic Delusions - The Cold Start Doctrine: Proactive Strategy
2016-05-26
recent tactical strike in Myanmar is miscued as a precursor for times to come in the regional context.10 These tactical actions also known as Hot...Attacks Militant Camps in Myanmar , Wall Street Journal, June 10, 2015, accessed August 24, 2015, http://www.wsj.com/articles/indian-army-attacks...militant-camps-in- myanmar -1433927858. 7 imperatives associated with the Indian PAS and its validation through the framework of strategy and the
Security of a kind of quantum secret sharing with entangled states.
Wang, Tian-Yin; Liu, Ying-Zhao; Wei, Chun-Yan; Cai, Xiao-Qiu; Ma, Jian-Feng
2017-05-30
We present a new collusion attack to a kind of quantum secret sharing schemes with entangled states. Using this attack, an unauthorized set of agents can gain access to the shared secret without the others' cooperation. Furthermore, we establish a general model for this kind of quantum secret sharing schemes and then give some necessary conditions to design a secure quantum secret sharing scheme under this model.
ERIC Educational Resources Information Center
Mason, Maria J.; Watkins, Amanda J.; Wakabayashi, Jordann; Buechler, Jennifer; Pepino, Christine; Brown, Michelle; Wright, William G.
2014-01-01
Previous research on sensitization in "Aplysia" was based entirely on unnatural noxious stimuli, usually electric shock, until our laboratory found that a natural noxious stimulus, a single sublethal lobster attack, causes short-term sensitization. We here extend that finding by demonstrating that multiple lobster attacks induce…
Towards an Iterated Game Model with Multiple Adversaries in Smart-World Systems.
He, Xiaofei; Yang, Xinyu; Yu, Wei; Lin, Jie; Yang, Qingyu
2018-02-24
Diverse and varied cyber-attacks challenge the operation of the smart-world system that is supported by Internet-of-Things (IoT) (smart cities, smart grid, smart transportation, etc.) and must be carefully and thoughtfully addressed before widespread adoption of the smart-world system can be fully realized. Although a number of research efforts have been devoted to defending against these threats, a majority of existing schemes focus on the development of a specific defensive strategy to deal with specific, often singular threats. In this paper, we address the issue of coalitional attacks, which can be launched by multiple adversaries cooperatively against the smart-world system such as smart cities. Particularly, we propose a game-theory based model to capture the interaction among multiple adversaries, and quantify the capacity of the defender based on the extended Iterated Public Goods Game (IPGG) model. In the formalized game model, in each round of the attack, a participant can either cooperate by participating in the coalitional attack, or defect by standing aside. In our work, we consider the generic defensive strategy that has a probability to detect the coalitional attack. When the coalitional attack is detected, all participating adversaries are penalized. The expected payoff of each participant is derived through the equalizer strategy that provides participants with competitive benefits. The multiple adversaries with the collusive strategy are also considered. Via a combination of theoretical analysis and experimentation, our results show that no matter which strategies the adversaries choose (random strategy, win-stay-lose-shift strategy, or even the adaptive equalizer strategy), our formalized game model is capable of enabling the defender to greatly reduce the maximum value of the expected average payoff to the adversaries via provisioning sufficient defensive resources, which is reflected by setting a proper penalty factor against the adversaries. In addition, we extend our game model and analyze the extortion strategy, which can enable one participant to obtain more payoff by extorting his/her opponents. The evaluation results show that the defender can combat this strategy by encouraging competition among the adversaries, and significantly suppress the total payoff of the adversaries via setting the proper penalty factor.
Towards an Iterated Game Model with Multiple Adversaries in Smart-World Systems †
Yang, Xinyu; Yu, Wei; Lin, Jie; Yang, Qingyu
2018-01-01
Diverse and varied cyber-attacks challenge the operation of the smart-world system that is supported by Internet-of-Things (IoT) (smart cities, smart grid, smart transportation, etc.) and must be carefully and thoughtfully addressed before widespread adoption of the smart-world system can be fully realized. Although a number of research efforts have been devoted to defending against these threats, a majority of existing schemes focus on the development of a specific defensive strategy to deal with specific, often singular threats. In this paper, we address the issue of coalitional attacks, which can be launched by multiple adversaries cooperatively against the smart-world system such as smart cities. Particularly, we propose a game-theory based model to capture the interaction among multiple adversaries, and quantify the capacity of the defender based on the extended Iterated Public Goods Game (IPGG) model. In the formalized game model, in each round of the attack, a participant can either cooperate by participating in the coalitional attack, or defect by standing aside. In our work, we consider the generic defensive strategy that has a probability to detect the coalitional attack. When the coalitional attack is detected, all participating adversaries are penalized. The expected payoff of each participant is derived through the equalizer strategy that provides participants with competitive benefits. The multiple adversaries with the collusive strategy are also considered. Via a combination of theoretical analysis and experimentation, our results show that no matter which strategies the adversaries choose (random strategy, win-stay-lose-shift strategy, or even the adaptive equalizer strategy), our formalized game model is capable of enabling the defender to greatly reduce the maximum value of the expected average payoff to the adversaries via provisioning sufficient defensive resources, which is reflected by setting a proper penalty factor against the adversaries. In addition, we extend our game model and analyze the extortion strategy, which can enable one participant to obtain more payoff by extorting his/her opponents. The evaluation results show that the defender can combat this strategy by encouraging competition among the adversaries, and significantly suppress the total payoff of the adversaries via setting the proper penalty factor. PMID:29495291
Kroes, Anneke; Weldegergis, Berhane T; Cappai, Francesco; Dicke, Marcel; van Loon, Joop J A
2017-12-01
One of the responses of plants to insect attack is the production of volatile organic compounds that mediate indirect defence of plants by attracting natural enemies of the attacking herbivores. Herbivore-induced plant volatiles (HIPVs) include terpenoids that play key roles in the attraction of natural enemies. Crosstalk between phytohormonal signalling pathways is well known to affect the regulation of plant defences, including the emission of HIPVs. Thus, simultaneous feeding on the same plant by caterpillars and aphids, can affect the attraction of parasitoids by the plant compared to single insect attack. The role of aphid density in the regulation of HIPV emission by plants under dual attack has not been studied previously. Here, we investigated the attraction of Diadegma semiclausum, a parasitoid of the Diamondback moth Plutella xylostella, to volatiles emitted by Arabidopsis thaliana plants, simultaneously attacked by host caterpillars, and by the non-host aphid Brevicoryne brassicae. Our study shows that the effect of aphid infestation on parasitoid attraction is influenced by the density of the aphids. Biosynthesis and emission of (E,E)-α-farnesene could be linked to the observed preference of D. semiclausum parasitoids for the HIPV blend emitted by plants dually infested by caterpillars and aphids at a high density compared to dually infested plants with a low aphid density. Parasitoids such as D. semiclausum are important enemies of herbivorous insects and a better understanding of how plants express indirect defence mechanisms in response to multiple insect attack will provide important knowledge on plant-herbivore-parasitoid interactions under multiple stress conditions.
Therapeutic principles of primaquine against relapse of Plasmodium vivax malaria
NASA Astrophysics Data System (ADS)
Baird, J. K.
2018-03-01
Plasmodium vivax causes tens of millions of clinical attacks annually all across the malarious globe. Unlike the other major cause of human malaria, Plasmodium falciparum, P. vivax places dormant stages called hypnozoites into the human liver that later awaken and provoke multiple clinical attacks in the weeks, months, and few years following the infectious anopheline mosquito bite. The only available treatment to prevent those recurrent attacks is primaquine (hypnozoitocide), and it must be administered with the drugs applied to end the acute attack (blood schizontocides). This paper reviews the therapeutic principles of applying primaquine to achieve radical cure of acute vivax malaria.
Why Does Mptcp Have To Make Things So Complicated : Cross Path Nids Evasion And Countermeasures
2016-09-01
previously only establish communication channels over single network paths to communicate over multiple network paths. MPTCP is an enhancement toTCP that...the attacker would fail to create a Command and Control (C2) channel unless the attacker had created a new mapping to the target on the splicing...machine. This would allow the attacker to conduct C2 over a spliced channel . This may even make the attacker’s C2 more evasive. In fact, the effect
Invasive plant species how they can affect trail access (and how you can help prevent their access)
James H. Miller
2004-01-01
The natural beauty of our southern forest landscapes is under attack and our access to lands and trails are becoming increasingly restricted. Alien invasive plants are the culprits and they are spreading, occupying and controlling our lands like armies of invaders that they are. Kudzu is a world-wide recognized invader of the South, but few people sense the threat from...
Identification and Illustration of Insecure Direct Object References and their Countermeasures
NASA Astrophysics Data System (ADS)
KumarShrestha, Ajay; Singh Maharjan, Pradip; Paudel, Santosh
2015-03-01
The insecure direct object reference simply represents the flaws in the system design without the full protection mechanism for the sensitive system resources or data. It basically occurs when the web application developer provides direct access to objects in accordance with the user input. So any attacker can exploit this web vulnerability and gain access to privileged information by bypassing the authorization. The main aim of this paper is to demonstrate the real effect and the identification of the insecure direct object references and then to provide the feasible preventive solutions such that the web applications do not allow direct object references to be manipulated by attackers. The experiment of the insecure direct object referencing is carried out using the insecure J2EE web application called WebGoat and its security testing is being performed using another JAVA based tool called BURP SUITE. The experimental result shows that the access control check for gaining access to privileged information is a very simple problem but at the same time its correct implementation is a tricky task. The paper finally presents some ways to overcome this web vulnerability.
A Network Access Control Framework for 6LoWPAN Networks
Oliveira, Luís M. L.; Rodrigues, Joel J. P. C.; de Sousa, Amaro F.; Lloret, Jaime
2013-01-01
Low power over wireless personal area networks (LoWPAN), in particular wireless sensor networks, represent an emerging technology with high potential to be employed in critical situations like security surveillance, battlefields, smart-grids, and in e-health applications. The support of security services in LoWPAN is considered a challenge. First, this type of networks is usually deployed in unattended environments, making them vulnerable to security attacks. Second, the constraints inherent to LoWPAN, such as scarce resources and limited battery capacity, impose a careful planning on how and where the security services should be deployed. Besides protecting the network from some well-known threats, it is important that security mechanisms be able to withstand attacks that have not been identified before. One way of reaching this goal is to control, at the network access level, which nodes can be attached to the network and to enforce their security compliance. This paper presents a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes. PMID:23334610
Ding, Fangyu; Ge, Quansheng; Fu, Jingying; Hao, Mengmeng
2017-01-01
Terror events can cause profound consequences for the whole society. Finding out the regularity of terrorist attacks has important meaning for the global counter-terrorism strategy. In the present study, we demonstrate a novel method using relatively popular and robust machine learning methods to simulate the risk of terrorist attacks at a global scale based on multiple resources, long time series and globally distributed datasets. Historical data from 1970 to 2015 was adopted to train and evaluate machine learning models. The model performed fairly well in predicting the places where terror events might occur in 2015, with a success rate of 96.6%. Moreover, it is noteworthy that the model with optimized tuning parameter values successfully predicted 2,037 terrorism event locations where a terrorist attack had never happened before. PMID:28591138
Ding, Fangyu; Ge, Quansheng; Jiang, Dong; Fu, Jingying; Hao, Mengmeng
2017-01-01
Terror events can cause profound consequences for the whole society. Finding out the regularity of terrorist attacks has important meaning for the global counter-terrorism strategy. In the present study, we demonstrate a novel method using relatively popular and robust machine learning methods to simulate the risk of terrorist attacks at a global scale based on multiple resources, long time series and globally distributed datasets. Historical data from 1970 to 2015 was adopted to train and evaluate machine learning models. The model performed fairly well in predicting the places where terror events might occur in 2015, with a success rate of 96.6%. Moreover, it is noteworthy that the model with optimized tuning parameter values successfully predicted 2,037 terrorism event locations where a terrorist attack had never happened before.
NASA Technical Reports Server (NTRS)
Barrett, C. A.
1985-01-01
Multiple linear regression analysis was used to determine an equation for estimating hot corrosion attack for a series of Ni base cast turbine alloys. The U transform (i.e., 1/sin (% A/100) to the 1/2) was shown to give the best estimate of the dependent variable, y. A complete second degree equation is described for the centered" weight chemistries for the elements Cr, Al, Ti, Mo, W, Cb, Ta, and Co. In addition linear terms for the minor elements C, B, and Zr were added for a basic 47 term equation. The best reduced equation was determined by the stepwise selection method with essentially 13 terms. The Cr term was found to be the most important accounting for 60 percent of the explained variability hot corrosion attack.
Brown, K M; Middaugh, S J; Haythornthwaite, J A; Bielory, L
2001-04-01
It was expected that stress and anxiety would be related to Raynaud's phenomenon (RP) attack characteristics when mild outdoor temperatures produced partial or no digital vasoconstriction. Hypotheses were that in warmer temperature categories, compared to those below 40 degrees F, higher stress or anxiety would be associated with more frequent, severe, and painful attacks. The Raynaud's Treatment Study recruited 313 participants with primary RP. Outcomes were attack rate, severity, and pain. Predictors were average daily outdoor temperature, stress, anxiety, age, gender, and a stress-by-temperature or an anxiety-by-temperature interaction. Outcomes were tested separately in multiple linear regression models. Stress and anxiety were tested in separate models. Stress was not a significant predictor of RP attack characteristics. Higher anxiety was related to more frequent attacks above 60 degrees F. It was also related to greater attack severity at all temperatures, and to greater pain above 60 degrees F and between 40 degrees and 49.9 degrees F.
Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems
NASA Astrophysics Data System (ADS)
Une, Masashi; Otsuka, Akira; Imai, Hideki
This paper will propose a wolf attack probability (WAP) as a new measure for evaluating security of biometric authentication systems. The wolf attack is an attempt to impersonate a victim by feeding “wolves” into the system to be attacked. The “wolf” means an input value which can be falsely accepted as a match with multiple templates. WAP is defined as a maximum success probability of the wolf attack with one wolf sample. In this paper, we give a rigorous definition of the new security measure which gives strength estimation of an individual biometric authentication system against impersonation attacks. We show that if one reestimates using our WAP measure, a typical fingerprint algorithm turns out to be much weaker than theoretically estimated by Ratha et al. Moreover, we apply the wolf attack to a finger-vein-pattern based algorithm. Surprisingly, we show that there exists an extremely strong wolf which falsely matches all templates for any threshold value.
Nirmal Raja, K; Maraline Beno, M
2017-07-01
In the wireless sensor network(WSN) security is a major issue. There are several network security schemes proposed in research. In the network, malicious nodes obstruct the performance of the network. The network can be vulnerable by Sybil attack. When a node illicitly assertions multiple identities or claims fake IDs, the WSN grieves from an attack named Sybil attack. This attack threatens wireless sensor network in data aggregation, synchronizing system, routing, fair resource allocation and misbehavior detection. Henceforth, the research is carried out to prevent the Sybil attack and increase the performance of the network. This paper presents the novel security mechanism and Fujisaki Okamoto algorithm and also application of the work. The Fujisaki-Okamoto (FO) algorithm is ID based cryptographic scheme and gives strong authentication against Sybil attack. By using Network simulator2 (NS2) the scheme is simulated. In this proposed scheme broadcasting key, time taken for different key sizes, energy consumption, Packet delivery ratio, Throughput were analyzed.
Realities of Deterrence and Retaliatory Options to Attacks in Space and Cyberspace
2012-02-15
instruments of power. It is an evolving landscape of electronic and kinetic threats that may merely scratch the surface of what might be at an...communications satellite; and in 2008, during two separate attacks, hackers accessed National Aeronautics and Space Administration ( NASA ) telemetry...unacceptable and to be avoided.23,24 Deterrence between the United States and the Soviet Union was bi-polar, between known adversaries. This is not
Shapiro, Lawrence
2018-04-01
Putnam's criticisms of the identity theory attack a straw man. Fodor's criticisms of reduction attack a straw man. Properly interpreted, Nagel offered a conception of reduction that captures everything a physicalist could want. I update Nagel, introducing the idea of overlap, and show why multiple realization poses no challenge to reduction so construed. Copyright © 2017 Elsevier Ltd. All rights reserved.
Simulation of Attacks for Security in Wireless Sensor Network.
Diaz, Alvaro; Sanchez, Pablo
2016-11-18
The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.
Formal Analysis of Key Integrity in PKCS#11
NASA Astrophysics Data System (ADS)
Falcone, Andrea; Focardi, Riccardo
PKCS#11 is a standard API to cryptographic devices such as smarcards, hardware security modules and usb crypto-tokens. Though widely adopted, this API has been shown to be prone to attacks in which a malicious user gains access to the sensitive keys stored in the devices. In 2008, Delaune, Kremer and Steel proposed a model to formally reason on this kind of attacks. We extend this model to also describe flaws that are based on integrity violations of the stored keys. In particular, we consider scenarios in which a malicious overwriting of keys might fool honest users into using attacker's own keys, while performing sensitive operations. We further enrich the model with a trusted key mechanism ensuring that only controlled, non-tampered keys are used in cryptographic operations, and we show how this modified API prevents the above mentioned key-replacement attacks.
Almogy, Gidon; Belzberg, Howard; Mintz, Yoaz; Pikarsky, Alon K.; Zamir, Gideon; Rivkind, Avraham I.
2004-01-01
Objective: To review the experience of a large-volume trauma center in managing and treating casualties of suicide bombing attacks. Summary Background Data: The threat of suicide bombing attacks has escalated worldwide. The ability of the suicide bomber to deliver a relatively large explosive load accompanied by heavy shrapnel to the proximity of his or her victims has caused devastating effects. Methods: The authors reviewed and analyzed the experience obtained in treating victims of suicide bombings at the level I trauma center of the Hadassah University Hospital in Jerusalem, Israel from 2000 to 2003. Results: Evacuation is usually rapid due to the urban setting of these attacks. Numerous casualties are brought into the emergency department over a short period. The setting in which the device is detonated has implications on the type of injuries sustained by survivors. The injuries sustained by victims of suicide bombing attacks in semi-confined spaces are characterized by the degree and extent of widespread tissue damage and include multiple penetrating wounds of varying severity and location, blast injury, and burns. Conclusions: The approach to victims of suicide bombings is based on the guidelines for trauma management. Attention is given to the moderately injured, as these patients may harbor immediate life-threatening injuries. The concept of damage control can be modified to include rapid packing of multiple soft-tissue entry sites. Optimal utilization of manpower and resources is achieved by recruiting all available personnel, adopting a predetermined plan, and a centrally coordinated approach. Suicide bombing attacks seriously challenge the most experienced medical facilities. PMID:15075644
Suicide bombing attacks: update and modifications to the protocol.
Almogy, Gidon; Belzberg, Howard; Mintz, Yoaz; Pikarsky, Alon K; Zamir, Gideon; Rivkind, Avraham I
2004-03-01
To review the experience of a large-volume trauma center in managing and treating casualties of suicide bombing attacks. The threat of suicide bombing attacks has escalated worldwide. The ability of the suicide bomber to deliver a relatively large explosive load accompanied by heavy shrapnel to the proximity of his or her victims has caused devastating effects. The authors reviewed and analyzed the experience obtained in treating victims of suicide bombings at the level I trauma center of the Hadassah University Hospital in Jerusalem, Israel from 2000 to 2003. Evacuation is usually rapid due to the urban setting of these attacks. Numerous casualties are brought into the emergency department over a short period. The setting in which the device is detonated has implications on the type of injuries sustained by survivors. The injuries sustained by victims of suicide bombing attacks in semi-confined spaces are characterized by the degree and extent of widespread tissue damage and include multiple penetrating wounds of varying severity and location, blast injury, and burns. The approach to victims of suicide bombings is based on the guidelines for trauma management. Attention is given to the moderately injured, as these patients may harbor immediate life-threatening injuries. The concept of damage control can be modified to include rapid packing of multiple soft-tissue entry sites. Optimal utilization of manpower and resources is achieved by recruiting all available personnel, adopting a predetermined plan, and a centrally coordinated approach. Suicide bombing attacks seriously challenge the most experienced medical facilities.
A study of IEEE 802.15.4 security framework for wireless body area networks.
Saleem, Shahnaz; Ullah, Sana; Kwak, Kyung Sup
2011-01-01
A Wireless Body Area Network (WBAN) is a collection of low-power and lightweight wireless sensor nodes that are used to monitor the human body functions and the surrounding environment. It supports a number of innovative and interesting applications, including ubiquitous healthcare and Consumer Electronics (CE) applications. Since WBAN nodes are used to collect sensitive (life-critical) information and may operate in hostile environments, they require strict security mechanisms to prevent malicious interaction with the system. In this paper, we first highlight major security requirements and Denial of Service (DoS) attacks in WBAN at Physical, Medium Access Control (MAC), Network, and Transport layers. Then we discuss the IEEE 802.15.4 security framework and identify the security vulnerabilities and major attacks in the context of WBAN. Different types of attacks on the Contention Access Period (CAP) and Contention Free Period (CFP) parts of the superframe are analyzed and discussed. It is observed that a smart attacker can successfully corrupt an increasing number of GTS slots in the CFP period and can considerably affect the Quality of Service (QoS) in WBAN (since most of the data is carried in CFP period). As we increase the number of smart attackers the corrupted GTS slots are eventually increased, which prevents the legitimate nodes to utilize the bandwidth efficiently. This means that the direct adaptation of IEEE 802.15.4 security framework for WBAN is not totally secure for certain WBAN applications. New solutions are required to integrate high level security in WBAN.
A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Networks
Saleem, Shahnaz; Ullah, Sana; Kwak, Kyung Sup
2011-01-01
A Wireless Body Area Network (WBAN) is a collection of low-power and lightweight wireless sensor nodes that are used to monitor the human body functions and the surrounding environment. It supports a number of innovative and interesting applications, including ubiquitous healthcare and Consumer Electronics (CE) applications. Since WBAN nodes are used to collect sensitive (life-critical) information and may operate in hostile environments, they require strict security mechanisms to prevent malicious interaction with the system. In this paper, we first highlight major security requirements and Denial of Service (DoS) attacks in WBAN at Physical, Medium Access Control (MAC), Network, and Transport layers. Then we discuss the IEEE 802.15.4 security framework and identify the security vulnerabilities and major attacks in the context of WBAN. Different types of attacks on the Contention Access Period (CAP) and Contention Free Period (CFP) parts of the superframe are analyzed and discussed. It is observed that a smart attacker can successfully corrupt an increasing number of GTS slots in the CFP period and can considerably affect the Quality of Service (QoS) in WBAN (since most of the data is carried in CFP period). As we increase the number of smart attackers the corrupted GTS slots are eventually increased, which prevents the legitimate nodes to utilize the bandwidth efficiently. This means that the direct adaptation of IEEE 802.15.4 security framework for WBAN is not totally secure for certain WBAN applications. New solutions are required to integrate high level security in WBAN. PMID:22319358
Technique Selectively Represses Immune System
... from attacking myelin in a mouse model of multiple sclerosis. Dr David Furness, Wellcome Images. All rights reserved ... devised a way to successfully treat symptoms resembling multiple sclerosis in a mouse model. With further development, the ...
Random Visitor: Defense against Identity Attacks in P2P Networks
NASA Astrophysics Data System (ADS)
Gu, Jabeom; Nah, Jaehoon; Kwon, Hyeokchan; Jang, Jonsoo; Park, Sehyun
Various advantages of cooperative peer-to-peer networks are strongly counterbalanced by the open nature of a distributed, serverless network. In such networks, it is relatively easy for an attacker to launch various attacks such as misrouting, corrupting, or dropping messages as a result of a successful identifier forgery. The impact of an identifier forgery is particularly severe because the whole network can be compromised by attacks such as Sybil or Eclipse. In this paper, we present an identifier authentication mechanism called random visitor, which uses one or more randomly selected peers as delegates of identity proof. Our scheme uses identity-based cryptography and identity ownership proof mechanisms collectively to create multiple, cryptographically protected indirect bindings between two peers, instantly when needed, through the delegates. Because of these bindings, an attacker cannot achieve an identifier forgery related attack against interacting peers without breaking the bindings. Therefore, our mechanism limits the possibility of identifier forgery attacks efficiently by disabling an attacker's ability to break the binding. The design rationale and framework details are presented. A security analysis shows that our scheme is strong enough against identifier related attacks and that the strength increases if there are many peers (more than several thousand) in the network.
SiC: An Agent Based Architecture for Preventing and Detecting Attacks to Ubiquitous Databases
NASA Astrophysics Data System (ADS)
Pinzón, Cristian; de Paz, Yanira; Bajo, Javier; Abraham, Ajith; Corchado, Juan M.
One of the main attacks to ubiquitous databases is the structure query language (SQL) injection attack, which causes severe damages both in the commercial aspect and in the user’s confidence. This chapter proposes the SiC architecture as a solution to the SQL injection attack problem. This is a hierarchical distributed multiagent architecture, which involves an entirely new approach with respect to existing architectures for the prevention and detection of SQL injections. SiC incorporates a kind of intelligent agent, which integrates a case-based reasoning system. This agent, which is the core of the architecture, allows the application of detection techniques based on anomalies as well as those based on patterns, providing a great degree of autonomy, flexibility, robustness and dynamic scalability. The characteristics of the multiagent system allow an architecture to detect attacks from different types of devices, regardless of the physical location. The architecture has been tested on a medical database, guaranteeing safe access from various devices such as PDAs and notebook computers.
Khyâl attacks: a key idiom of distress among traumatized cambodia refugees.
Hinton, Devon E; Pich, Vuth; Marques, Luana; Nickerson, Angela; Pollack, Mark H
2010-06-01
Traumatized Cambodian refugees with PTSD often complain of khyâl attacks. The current study investigates khyâl attacks from multiple perspectives and examines the validity of a model of how khyâl attacks are generated. The study found that khyâl attacks had commonly been experienced in the previous 4 weeks and that their severity was strongly correlated with the severity of PTSD (PTSD Checklist). It was found that khyâl attacks were triggered by various processes--such as worry, trauma recall, standing up, going to a mall--and that khyâl attacks almost always met panic attack criteria. It was also found that during a khyâl attack there was great fear that death might occur from bodily dysfunction. It was likewise found that a complex nosology of khyâl attacks exists that rates the attacks on a scale of severity, that the severity determines how the khyâl attacks should be treated and that those treatments are often complex. As illustrated by the article, khyâl attacks constitute a key aspect of trauma ontology in this group, a culturally specific experiencing of anxiety and trauma-related disorder. The article also contributes to the study of trauma somatics, that is, to the study of how trauma results in specific symptoms in a specific cultural context, showing that a key part of the trauma-somatic reticulum is often a cultural syndrome.
NASA Astrophysics Data System (ADS)
Mayer, Irak Vicarte
2017-05-01
The speed of IoT devices currently connected in our daily lives has drastically accelerated in the last couple of years. The lack of standardization, regulation, and an efficient process to integrate these devices to our ecosystem has led to a relaxed security and an ineffective use of the data generated. This paper presents a new approach to the IoT ecosystem management that improves data sharing and security by categorizing and micromanaging the connected devices. The use of micromanaging multiple access points (M2AP) allows the architecture to respond faster and efficiently to events and attacks to the digital hive. The "local beehive"/ "master beehive" approach seals a compromise of delegating tasks and improving the network management capacity. Finally, an efficient data storage and compact reports of the raw information collected can then be transmitted to cloud services for further analysis if required.
Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network.
Omala, Anyembe Andrew; Mbandu, Angolo Shem; Mutiria, Kamenyi Domenic; Jin, Chunhua; Li, Fagen
2018-04-28
Wireless body area network (WBAN) provides a medium through which physiological information could be harvested and transmitted to application provider (AP) in real time. Integrating WBAN in a heterogeneous Internet of Things (IoT) ecosystem would enable an AP to monitor patients from anywhere and at anytime. However, the IoT roadmap of interconnected 'Things' is still faced with many challenges. One of the challenges in healthcare is security and privacy of streamed medical data from heterogeneously networked devices. In this paper, we first propose a heterogeneous signcryption scheme where a sender is in a certificateless cryptographic (CLC) environment while a receiver is in identity-based cryptographic (IBC) environment. We then use this scheme to design a heterogeneous access control protocol. Formal security proof for indistinguishability against adaptive chosen ciphertext attack and unforgeability against adaptive chosen message attack in random oracle model is presented. In comparison with some of the existing access control schemes, our scheme has lower computation and communication cost.
Anzio to Libya: Strategic Direction in Coalition Warfare
2012-03-22
and Nettuno—2,300 British, 7,862 Americans, a cross or star bearing their names. A list in marble contains the names of 3,094 Americans missing in...Article 5 of the North Atlantic Treaty. Article 5 specifies that an attack on one nation is considered an attack on all. The impact of the Greek debt...the Jordanians and Qataris provided airlift, the Italians, French, and Greeks hosted the air armada and Germany provided logistics and access to United
Competition in the domain of wireless networks security
NASA Astrophysics Data System (ADS)
Bednarczyk, Mariusz
2017-04-01
Wireless networks are very popular and have found wide spread usage amongst various segments, also in military environment. The deployment of wireless infrastructures allow to reduce the time it takes to install and dismantle communications networks. With wireless, users are more mobile and can easily get access to the network resources all the time. However, wireless technologies like WiFi or Bluetooth have security issues that hackers have extensively exploited over the years. In the paper several serious security flaws in wireless technologies are presented. Most of them enable to get access to the internal networks and easily carry out man-in-the-middle attacks. Very often, they are used to launch massive denial of service attacks that target the physical infrastructure as well as the RF spectrum. For instance, there are well known instances of Bluetooth connection spoofing in order to steal WiFi password stored in the mobile device. To raise the security awareness and protect wireless networks against an adversary attack, an analysis of attack methods and tools over time is presented in the article. The particular attention is paid to the severity, possible targets as well as the ability to persist in the context of protective measures. Results show that an adversary can take complete control of the victims' mobile device features if the users forget to use simple safety principles.
NASA Astrophysics Data System (ADS)
Nikolopoulos, Georgios M.
2018-01-01
We consider a recently proposed entity authentication protocol in which a physical unclonable key is interrogated by random coherent states of light, and the quadratures of the scattered light are analyzed by means of a coarse-grained homodyne detection. We derive a sufficient condition for the protocol to be secure against an emulation attack in which an adversary knows the challenge-response properties of the key and moreover, he can access the challenges during the verification. The security analysis relies on Holevo's bound and Fano's inequality, and suggests that the protocol is secure against the emulation attack for a broad range of physical parameters that are within reach of today's technology.
Mental health impact of the World Trade Center attacks on displaced Chinese workers.
Thiel de Bocanegra, Heike; Brickman, Ellen
2004-02-01
To identify psychological sequelae of the World Trade Center attacks in immigrant Chinese displaced workers, we interviewed 77 displaced workers in May 2002. One third of the sample was classified as at least moderately depressed, and 21% met diagnostic criteria for posttraumatic stress disorder; however, few had utilized mental health services. Depression and PTSD scores were positively correlated with age, age at immigration to the United States, and prescription drug use after September 11th, among other variables. Results suggest the need for mental health outreach in this community. This outreach should target both displaced workers and their informal support networks to facilitate identification of and service access for those impacted by the attacks.
Epileptic negative drop attacks in atypical benign partial epilepsy: a neurophysiological study.
Hirano, Yoshiko; Oguni, Hirokazu; Osawa, Makiko
2009-03-01
We conducted a computer-assisted polygraphic analysis of drop attacks in a child with atypical benign partial epilepsy (ABPE) to investigate neurophysiological characteristics. The patient was a six-year two-month-old girl, who had started to have focal motor seizures, later combined with daily epileptic negative myoclonus (ENM) and drop attacks, causing multiple injuries. We studied episodes of ENM and drop attacks using video-polygraphic and computer-assisted back-averaging analysis. A total of 12 ENM episodes, seven involving the left arm (ENMlt) and five involving both arms (ENMbil), and five drop attacks were captured for analysis. All episodes were time-locked to spike-and-wave complexes (SWC) arising from both centro-temporo-parietal (CTP) areas. The latency between the onset of SWC and ENMlt, ENMbil, and drop attacks reached 68 ms, 42 ms, and 8 ms, respectively. The height of the spike as well as the slow-wave component of SWC for drop attacks were significantly larger than that for both ENMlt and ENMbil (p < 0.05). Drop attacks were considered to be epileptic negative myoclonus involving not only upper proximal but also axial muscles, causing the body to fall. Thus, drop attacks in ABPE are considered to be epileptic negative drop attacks arising from bilateral CTP foci and differ from drop attacks of a generalized origin seen in Lennox-Gastaut syndrome and myoclonic-astatic epilepsy.
Vehicle barrier with access delay
Swahlan, David J; Wilke, Jason
2013-09-03
An access delay vehicle barrier for stopping unauthorized entry into secure areas by a vehicle ramming attack includes access delay features for preventing and/or delaying an adversary from defeating or compromising the barrier. A horizontally deployed barrier member can include an exterior steel casing, an interior steel reinforcing member and access delay members disposed within the casing and between the casing and the interior reinforcing member. Access delay members can include wooden structural lumber, concrete and/or polymeric members that in combination with the exterior casing and interior reinforcing member act cooperatively to impair an adversarial attach by thermal, mechanical and/or explosive tools.
Simulation of Attacks for Security in Wireless Sensor Network
Diaz, Alvaro; Sanchez, Pablo
2016-01-01
The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node’s software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work. PMID:27869710
NASA Astrophysics Data System (ADS)
Bassuoni, Mohamed Tamer F.
The growing use of self-consolidating concrete (SCC) in various infrastructure applications exposed to sulfate-rich environments necessitates conducting comprehensive research to evaluate its durability to external sulfate attack. Since the reliability and adequacy of standard sulfate immersion tests have been questioned, the current thesis introduced an integrated testing approach for assessing the durability of a wide scope of SCC mixtures to external sulfate attack. This testing approach involved progressive levels of complexity from single to multiple damage processes. A new series of sulfate attack tests involving multiple field-like parameters and combined damage mechanisms (various cations, controlled pH, wetting-drying, partial immersion, freezing-thawing, and cyclic cold-hot conditions with or without sustained flexural loading) were designed to evaluate the performance (suitability) of the SCC mixtures under various sulfate attack exposure scenarios. The main mixture design variables of SCC included the type of binder (single, binary, ternary and quaternary), air-entrainment, sand-to-aggregate mass ratio and hybrid fibre reinforcement. The comprehensive database and knowledge obtained from this research were used to develop smart models (fuzzy and neuro-fuzzy inference systems) based on artificial-intelligence to evaluate and predict the performance of the SCC mixtures under various sulfate attack exposure regimes implemented in this study. In full immersion tests involving high concentration sodium and magnesium sulfate solutions with controlled pH, the low penetrability of SCC was responsible for the high durability of specimens. Ternary and quaternary cementitious systems with or without limestone materials provided a passivating layer, with or without acid neutralization capacity, which protected SCC from severe damage in the aggressive sulfuric acid and ammonium sulfate solutions. In contrast to conclusions drawn from the sodium sulfate immersion tests, the combined sulfate attack tests captured performance risks and complex damage mechanisms associated with the SCC pore structure and constituent materials. Sodium sulfate attack with wetting-drying cycles and/or partial immersion under temperate-hot conditions synergistically caused significant damage to specimens, especially to quaternary cementitious systems having very fine pore structure, due to the build-up of salt crystals and sulfate reaction products. The deleterious effects of sulfate reaction products and salt crystallization on all cementitious systems were more severe under the combined sodium sulfate and freezing-thawing exposure, with a potential of sudden brittle failure. Laboratory experiments in the current work documented evidence for the occurrence of thaumasite sulfate attack (TSA) in cementitious systems containing limestone filler, not only under cold but also under temperate-hot conditions, which made specimens more vulnerable to damage in the combined sulfate attack tests. The field-like combined exposure of sodium sulfate, cyclic environments and flexural loading had synergistic effects on SCC specimens and caused the coexistence of multiple-complex degradation mechanisms (sulfate attack, TSA, stress-corrosion, salt crystallization, surface scaling and corrosion of surface steel fibres) depending on the mixture design variables. The current thesis demonstrates that relying only on sulfate immersion tests to evaluate the performance of cement-based materials can be risky. It also shows that linear and deterministic modeling of the performance of concrete structures under external sulfate attack is unrealistic. Fuzzy and adaptive-neuro fuzzy inference systems developed in the current thesis accurately and rationally predicted the serviceability, deterioration in engineering properties and time to failure of the SCC mixtures under the various sulfate attack exposure regimes adopted in the integrated testing approach. A durability evaluation factor from multiple performance criteria was created for the ammonium sulfate exposure. Environmental charts were developed to determine the level of aggression associated with sodium sulfate attack from temperature, RH and degree of wetting-drying expected in service. This novel modeling approach showed promising success in handling complex durability topics such as the sulfate attack of concrete, which involves non-linearity, ambiguity and interface with operator approximation. The current thesis provides needed fundamental knowledge on the durability of a wide scope of SCC mixtures to various sulfate attack exposure scenarios. It elucidates complex deterioration mechanisms and failure modes of cement-based materials under multi-mechanistic aging processes. It also proposes carefully engineered integrated sulfate attack tests that replicate various sulfate attack exposure regimes, which could be refined and standardized in the future. In addition, the current work introduced original knowledge-based smart models capable of handling uncertainty and providing reliable predictions for the behaviour of concrete under external sulfate attack. The models do not require conducting exhaustive laboratory experiments and/or making assumptions, thus facilitating the selection of optimum concrete mixtures for a specified exposure. Overall, this research should effectively contribute to the development of performance-based standards and specifications for, and improvement of durability-based design and life-cycle analysis of concrete structures subjected to external sulfate attack. Keywords. Sulfate attack, self-consolidating concrete, integrated testing, composite cements, air-entrainment, hybrid fibres, full immersion, cations, pH, wetting-drying, partial immersion, freezing-thawing, cyclic cold-hot conditions, flexural loading, thaumasite, salt crystallization, fuzzy, neuro-fuzzy, systems.
Panic Attacks and Panic Disorder in the American Indian Community
Sawchuk, Craig N.; Roy-Byrne, Peter; Noonan, Carolyn; Craner, Julia R.; Goldberg, Jack; Manson, Spero; Buchwald, Dedra
2016-01-01
Panic disorder is a common mental health condition, but little is known about panic disorder in non-Caucasian populations. The purpose of this study is to describe the epidemiology, clinical features, and comorbidities of panic attacks and panic disorder in two large American Indian (AI) tribes (N = 3,084). A culturally-adapted version of the Composite International Diagnostic Interview assessed panic attacks, panic disorder, and various psychiatric comorbidities. After adjusting for age, gender, and tribe, linear and logistic regression analyses were conducted to compare AIs with panic disorder to those with panic attacks only on clinical characteristics and panic symptoms. Approximately 8.5% (N = 234) of American Indians reported a lifetime history of panic attacks. Among individuals with panic attacks, comorbid posttraumatic stress disorder was higher in females (p = 0.03) and comorbid alcohol-related disorders were higher in males (p ≤ 0.001). The prevalence and clinical features of panic attacks and panic disorder in American Indians were similar to epidemiologic studies with majority populations. However, in contrast to earlier research, panic symptoms were similar in both males and females, and different patterns of comorbidity emerged. Future research should examine the availability and accessibility of evidence-based panic treatments for this traditionally underserved population. PMID:27720578
Panic attacks and panic disorder in the American Indian community.
Sawchuk, Craig N; Roy-Byrne, Peter; Noonan, Carolyn; Craner, Julia R; Goldberg, Jack; Manson, Spero; Buchwald, Dedra
2017-05-01
Panic disorder is a common mental health condition, but little is known about panic disorder in non-Caucasian populations. The purpose of this study is to describe the epidemiology, clinical features, and comorbidities of panic attacks and panic disorder in two large American Indian (AI) tribes (N=3084). A culturally-adapted version of the Composite International Diagnostic Interview assessed panic attacks, panic disorder, and various psychiatric comorbidities. After adjusting for age, gender, and tribe, linear and logistic regression analyses were conducted to compare AIs with panic disorder to those with panic attacks only on clinical characteristics and panic symptoms. Approximately 8.5% (N=234) of American Indians reported a lifetime history of panic attacks. Among individuals with panic attacks, comorbid posttraumatic stress disorder was higher in females (p=0.03) and comorbid alcohol-related disorders were higher in males (p≤0.001). The prevalence and clinical features of panic attacks and panic disorder in American Indians were similar to epidemiologic studies with majority populations. However, in contrast to earlier research, panic symptoms were similar in both males and females, and different patterns of comorbidity emerged. Future research should examine the availability and accessibility of evidence-based panic treatments for this traditionally underserved population. Copyright © 2016 Elsevier Ltd. All rights reserved.
Authenticated IGMP for Controlling Access to Multicast Distribution Tree
NASA Astrophysics Data System (ADS)
Park, Chang-Seop; Kang, Hyun-Sun
A receiver access control scheme is proposed to protect the multicast distribution tree from DoS attack induced by unauthorized use of IGMP, by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, a key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP (Content Provider), NSP (Network Service Provider), and group members.
A Trustworthy Key Generation Prototype Based on DDR3 PUF for Wireless Sensor Networks
Liu, Wenchao; Zhang, Zhenhua; Li, Miaoxin; Liu, Zhenglin
2014-01-01
Secret key leakage in wireless sensor networks (WSNs) is a high security risk especially when sensor nodes are deployed in hostile environment and physically accessible to attackers. With nowadays semi/fully-invasive attack techniques attackers can directly derive the cryptographic key from non-volatile memory (NVM) storage. Physically Unclonable Function (PUF) is a promising technology to resist node capture attacks, and it also provides a low cost and tamper-resistant key provisioning solution. In this paper, we designed a PUF based on double-data-rate SDRAM Type 3 (DDR3) memory by exploring its memory decay characteristics. We also described a prototype of 128-bit key generation based on DDR3 PUF with integrated fuzzy extractor. Due to the wide adoption of DDR3 memory in WSN, our proposed DDR3 PUF technology with high security levels and no required hardware changes is suitable for a wide range of WSN applications. PMID:24984058
Protecting Accelerator Control Systems in the Face of Sophisticated Cyber Attacks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hartman, Steven M
2012-01-01
Cyber security for industrial control systems has received significant attention in the past two years. The news coverage of the Stuxnet attack, believed to be targeted at the control system for a uranium enrichment plant, brought the issue to the attention of news media and policy makers. This has led to increased scrutiny of control systems for critical infrastructure such as power generation and distribution, and industrial systems such as chemical plants and petroleum refineries. The past two years have also seen targeted network attacks aimed at corporate and government entities including US Department of Energy National Laboratories. Both ofmore » these developments have potential repercussions for the control systems of particle accelerators. The need to balance risks from potential attacks with the operational needs of an accelerator present a unique challenge for the system architecture and access model.« less
Shark attack-related injuries: Epidemiology and implications for plastic surgeons.
Ricci, Joseph A; Vargas, Christina R; Singhal, Dhruv; Lee, Bernard T
2016-01-01
The increased media attention to shark attacks has led to a heightened fear and public awareness. Although few sharks are considered dangerous, attacks on humans can result in large soft tissue defects necessitating the intervention of reconstructive surgeons. This study aims to evaluate and describe the characteristics of shark-related injuries in order to improve treatment. The Global Shark Accident File, maintained by the Shark Research Institute (Princeton, NJ, USA), is a compilation of all known worldwide shark attacks. Database records since the 1900s were reviewed to identify differences between fatal and nonfatal attacks, including: geography, injury pattern, shark species, and victim activity. Since the 1900s, there have been 5034 reported shark attacks, of which 1205 (22.7%) were fatal. Although the incidence of attacks per decade has increased, the percentage of fatalities has decreased. Characteristics of fatal attacks included swimming (p = 0.001), boating (p = 0.001), three or more bite sites (p = 0.03), limb loss (p = 0.001), or tiger shark attack (p = 0.002). The most common attacks were bites to the legs (41.8%) or arms (18.4%), with limb loss occurring in 7% of attacks. Geographically, the majority of attacks occurred in North America (36.7%) and Australia (26.5%). Most attacks in the USA occurred in Florida (49.1%) and California (13.6%). Although rare, shark attacks result in devastating injuries to patients. As these injuries often involve multiple sites and limb loss, this creates a significant challenge for reconstructive surgeons. Proper identification of the characteristics of the attack can aid in providing optimal care for those affected. Copyright © 2015 British Association of Plastic, Reconstructive and Aesthetic Surgeons. Published by Elsevier Ltd. All rights reserved.
Using Unix system auditing for detecting network intrusions
DOE Office of Scientific and Technical Information (OSTI.GOV)
Christensen, M.J.
1993-03-01
Intrusion Detection Systems (IDSs) are designed to detect actions of individuals who use computer resources without authorization as well as legitimate users who exceed their privileges. This paper describes a novel approach to IDS research, namely a decision aiding approach to intrusion detection. The introduction of a decision tree represents the logical steps necessary to distinguish and identify different types of attacks. This tool, the Intrusion Decision Aiding Tool (IDAT), utilizes IDS-based attack models and standard Unix audit data. Since attacks have certain characteristics and are based on already developed signature attack models, experienced and knowledgeable Unix system administrators knowmore » what to look for in system audit logs to determine if a system has been attacked. Others, however, are usually less able to recognize common signatures of unauthorized access. Users can traverse the tree using available audit data displayed by IDAT and general knowledge they possess to reach a conclusion regarding suspicious activity. IDAT is an easy-to-use window based application that gathers, analyzes, and displays pertinent system data according to Unix attack characteristics. IDAT offers a more practical approach and allows the user to make an informed decision regarding suspicious activity.« less
Chaudhry, Shehzad Ashraf; Mahmood, Khalid; Naqvi, Husnain; Khan, Muhammad Khurram
2015-11-01
Telecare medicine information system (TMIS) offers the patients convenient and expedite healthcare services remotely anywhere. Patient security and privacy has emerged as key issues during remote access because of underlying open architecture. An authentication scheme can verify patient's as well as TMIS server's legitimacy during remote healthcare services. To achieve security and privacy a number of authentication schemes have been proposed. Very recently Lu et al. (J. Med. Syst. 39(3):1-8, 2015) proposed a biometric based three factor authentication scheme for TMIS to confiscate the vulnerabilities of Arshad et al.'s (J. Med. Syst. 38(12):136, 2014) scheme. Further, they emphasized the robustness of their scheme against several attacks. However, in this paper we establish that Lu et al.'s scheme is vulnerable to numerous attacks including (1) Patient anonymity violation attack, (2) Patient impersonation attack, and (3) TMIS server impersonation attack. Furthermore, their scheme does not provide patient untraceability. We then, propose an improvement of Lu et al.'s scheme. We have analyzed the security of improved scheme using popular automated tool ProVerif. The proposed scheme while retaining the plusses of Lu et al.'s scheme is also robust against known attacks.
Sevim, Serhan; Kaleağası, Hakan; Fidancı, Halit
2015-09-01
Sleep bruxism refers to a nocturnal parafunctional activity including the clenching, grinding or gnashing of teeth. While most of the nocturnal bruxism cases seen in the general population are apparently idiopathic, it has been reported to be associated with a range of neurological diseases such as Huntington's disease, cranio-cervical dystonia and post-anoxic brain damage, but not multiple sclerosis (MS). We describe three cases of MS patients who have had moderate to severe complaints of bruxism in the two weeks following their relevant MS attacks. None of the three patients had a diagnosis of bruxism prior to her attack. The diagnosis was confirmed in one out of three by a polysomnography. One patient did not have any complaints related to bruxism previous to her attack, whereas two had mild and infrequent complaints. The symptoms of the relevant attacks were left hemihypesthesia in all and hemiparesis in two. None of the patients had spasticity that could result in severe teeth clenching. All three patients presented with morning headaches and jaw pain or tightness and were treated successfully with botulinum toxin (Btx) injections applied to their masseter and temporalis muscles. The cause of bruxism is controversial but lesions of the cortico-basalganglia-thalamo-cotrical loops are thought to be most likely. However, acute or chronic lesions in those pathways were not demonstrated in the 3 patients. It is feasible that they had normal appearing white matter interruptions in their cortico-basalganglia-thalamocortical loops along with their relevant attack. Copyright © 2015 Elsevier B.V. All rights reserved.
Interactive effects of pests increase seed yield.
Gagic, Vesna; Riggi, Laura Ga; Ekbom, Barbara; Malsher, Gerard; Rusch, Adrien; Bommarco, Riccardo
2016-04-01
Loss in seed yield and therefore decrease in plant fitness due to simultaneous attacks by multiple herbivores is not necessarily additive, as demonstrated in evolutionary studies on wild plants. However, it is not clear how this transfers to crop plants that grow in very different conditions compared to wild plants. Nevertheless, loss in crop seed yield caused by any single pest is most often studied in isolation although crop plants are attacked by many pests that can cause substantial yield losses. This is especially important for crops able to compensate and even overcompensate for the damage. We investigated the interactive impacts on crop yield of four insect pests attacking different plant parts at different times during the cropping season. In 15 oilseed rape fields in Sweden, we estimated the damage caused by seed and stem weevils, pollen beetles, and pod midges. Pest pressure varied drastically among fields with very low correlation among pests, allowing us to explore interactive impacts on yield from attacks by multiple species. The plant damage caused by each pest species individually had, as expected, either no, or a negative impact on seed yield and the strongest negative effect was caused by pollen beetles. However, seed yield increased when plant damage caused by both seed and stem weevils was high, presumably due to the joint plant compensatory reaction to insect attack leading to overcompensation. Hence, attacks by several pests can change the impact on yield of individual pest species. Economic thresholds based on single species, on which pest management decisions currently rely, may therefore result in economically suboptimal choices being made and unnecessary excessive use of insecticides.
Robustness analysis of interdependent networks under multiple-attacking strategies
NASA Astrophysics Data System (ADS)
Gao, Yan-Li; Chen, Shi-Ming; Nie, Sen; Ma, Fei; Guan, Jun-Jie
2018-04-01
The robustness of complex networks under attacks largely depends on the structure of a network and the nature of the attacks. Previous research on interdependent networks has focused on two types of initial attack: random attack and degree-based targeted attack. In this paper, a deliberate attack function is proposed, where six kinds of deliberate attacking strategies can be derived by adjusting the tunable parameters. Moreover, the robustness of four types of interdependent networks (BA-BA, ER-ER, BA-ER and ER-BA) with different coupling modes (random, positive and negative correlation) is evaluated under different attacking strategies. Interesting conclusions could be obtained. It can be found that the positive coupling mode can make the vulnerability of the interdependent network to be absolutely dependent on the most vulnerable sub-network under deliberate attacks, whereas random and negative coupling modes make the vulnerability of interdependent network to be mainly dependent on the being attacked sub-network. The robustness of interdependent network will be enhanced with the degree-degree correlation coefficient varying from positive to negative. Therefore, The negative coupling mode is relatively more optimal than others, which can substantially improve the robustness of the ER-ER network and ER-BA network. In terms of the attacking strategies on interdependent networks, the degree information of node is more valuable than the betweenness. In addition, we found a more efficient attacking strategy for each coupled interdependent network and proposed the corresponding protection strategy for suppressing cascading failure. Our results can be very useful for safety design and protection of interdependent networks.
Impact of pine tip moth attack on loblolly pine
Roy Hedden
1999-01-01
Data on the impact of Nantucket pine tip moth, Rhyacionia frustrana, attack on the height of loblolly pine, Pinus taeda, in the first three growing seasons after planting from three locations in eastern North Carolina (U.S.A.) was used to develop multiple linear regression models relating tree height to tip moth infestation level in each growing season. These models...
Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection
Kaliappan, Jayakumar; Thiagarajan, Revathi; Sundararajan, Karpagam
2015-01-01
An intrusion detection system (IDS) helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. This paper is designed on the idea that each IDS is efficient in detecting a specific type of attack. In proposed Multiple IDS Unit (MIU), there are five IDS units, and each IDS follows a unique algorithm to detect attacks. The feature selection is done with the help of genetic algorithm. The selected features of the input traffic are passed on to the MIU for processing. The decision from each IDS is termed as local decision. The fusion unit inside the MIU processes all the local decisions with the help of majority voting rule and makes the final decision. The proposed system shows a very good improvement in detection rate and reduces the false alarm rate. PMID:26295058
Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection.
Kaliappan, Jayakumar; Thiagarajan, Revathi; Sundararajan, Karpagam
2015-01-01
An intrusion detection system (IDS) helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. This paper is designed on the idea that each IDS is efficient in detecting a specific type of attack. In proposed Multiple IDS Unit (MIU), there are five IDS units, and each IDS follows a unique algorithm to detect attacks. The feature selection is done with the help of genetic algorithm. The selected features of the input traffic are passed on to the MIU for processing. The decision from each IDS is termed as local decision. The fusion unit inside the MIU processes all the local decisions with the help of majority voting rule and makes the final decision. The proposed system shows a very good improvement in detection rate and reduces the false alarm rate.
Nature, nurture, and microbes: The development of multiple sclerosis.
Wekerle, H
2017-11-01
This paper argues that multiple sclerosis (MS) is the result of an autoimmune attack against components of the central nervous system (CNS). The effector cells involved in the pathogenic process are CNS-autoreactive T cells present in the healthy immune system in a resting state. Upon activation, these cells cross the blood-brain barrier and attack the CNS target tissue. Recent evidence indicates that autoimmune activation may happen in the intestine, following an interaction of bacterial components of the gut flora with local CNS autoreactive T cells. The consequences of this concept are discussed. © 2017 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.
Simple Criteria to Determine the Set of Key Parameters of the DRPE Method by a Brute-force Attack
NASA Astrophysics Data System (ADS)
Nalegaev, S. S.; Petrov, N. V.
Known techniques of breaking Double Random Phase Encoding (DRPE), which bypass the resource-intensive brute-force method, require at least two conditions: the attacker knows the encryption algorithm; there is an access to the pairs of source and encoded images. Our numerical results show that for the accurate recovery by numerical brute-force attack, someone needs only some a priori information about the source images, which can be quite general. From the results of our numerical experiments with optical data encryption DRPE with digital holography, we have proposed four simple criteria for guaranteed and accurate data recovery. These criteria can be applied, if the grayscale, binary (including QR-codes) or color images are used as a source.
Yau, Wei-Chuen; Phan, Raphael C-W
2013-12-01
Many authentication schemes have been proposed for telecare medicine information systems (TMIS) to ensure the privacy, integrity, and availability of patient records. These schemes are crucial for TMIS systems because otherwise patients' medical records become susceptible to tampering thus hampering diagnosis or private medical conditions of patients could be disclosed to parties who do not have a right to access such information. Very recently, Hao et al. proposed a chaotic map-based authentication scheme for telecare medicine information systems in a recent issue of Journal of Medical Systems. They claimed that the authentication scheme can withstand various attacks and it is secure to be used in TMIS. In this paper, we show that this authentication scheme is vulnerable to key-compromise impersonation attacks, off-line password guessing attacks upon compromising of a smart card, and parallel session attacks. We also exploit weaknesses in the password change phase of the scheme to mount a denial-of-service attack. Our results show that this scheme cannot be used to provide security in a telecare medicine information system.
Detection of Spoofed MAC Addresses in 802.11 Wireless Networks
NASA Astrophysics Data System (ADS)
Tao, Kai; Li, Jing; Sampalli, Srinivas
Medium Access Control (MAC) address spoofing is considered as an important first step in a hacker's attempt to launch a variety of attacks on 802.11 wireless networks. Unfortunately, MAC address spoofing is hard to detect. Most current spoofing detection systems mainly use the sequence number (SN) tracking technique, which has drawbacks. Firstly, it may lead to an increase in the number of false positives. Secondly, such techniques cannot be used in systems with wireless cards that do not follow standard 802.11 sequence number patterns. Thirdly, attackers can forge sequence numbers, thereby causing the attacks to go undetected. We present a new architecture called WISE GUARD (Wireless Security Guard) for detection of MAC address spoofing on 802.11 wireless LANs. It integrates three detection techniques - SN tracking, Operating System (OS) fingerprinting & tracking and Received Signal Strength (RSS) fingerprinting & tracking. It also includes the fingerprinting of Access Point (AP) parameters as an extension to the OS fingerprinting for detection of AP address spoofing. We have implemented WISE GUARD on a test bed using off-the-shelf wireless devices and open source drivers. Experimental results show that the new design enhances the detection effectiveness and reduces the number of false positives in comparison with current approaches.
Factors influencing care seeking for a self-defined worst panic attack.
Katerndahl, David A
2002-04-01
Only 60 percent of persons who experience panic attacks seek treatment for them, many at the emergency department. The author documented care-seeking behaviors among persons living in the community who had experienced panic attacks and studied determinants of care seeking. In-depth structured interviews were conducted with 97 randomly selected community-dwelling adults who met DSM-III-R criteria for panic attacks. Participants were asked whether they had contemplated using or had actually used medical, alternative, and family sources of care when they had experienced their worst attack. Seventy-seven participants (79 percent) had considered using a general medical or mental health site when they experienced their worst attack. Of these, 50 (52 percent) had actually used such a site. General medical sites were contemplated more often (72 percent of participants) than mental health sites (27 percent), particularly emergency departments (43 percent) and family physicians' offices (34 percent). Other sources, such as friends or family members, alternative sites, and self-treatment, were contemplated less often. Once contemplated, certain sources were readily used, such as ambulances, family members, and self-treatment. Several factors were significantly associated with whether a person contemplated seeking care: access or barriers to treatment, perception of symptoms and of the reasons for the panic attack, and family-related variables. Contemplation and use of a mental health site after a panic attack was rare among the participants in this study. Further study of determinants of care seeking may help explain why persons who experience panic attacks fail to seek treatment or seek treatment from non-mental health sources.
802.11 Wireless Infrastructure To Enhance Medical Response to Disasters
Arisoylu, Mustafa; Mishra, Rajesh; Rao, Ramesh; Lenert, Leslie A.
2005-01-01
802.11 (WiFi) is a well established network communications protocol that has wide applicability in civil infrastructure. This paper describes research that explores the design of 802.11 networks enhanced to support data communications in disaster environments. The focus of these efforts is to create network infrastructure to support operations by Metropolitan Medical Response System (MMRS) units and Federally-sponsored regional teams that respond to mass casualty events caused by a terrorist attack with chemical, biological, nuclear or radiological weapons or by a hazardous materials spill. In this paper, we describe an advanced WiFi-based network architecture designed to meet the needs of MMRS operations. This architecture combines a Wireless Distribution Systems for peer-to-peer multihop connectivity between access points with flexible and shared access to multiple cellular backhauls for robust connectivity to the Internet. The architecture offers a high bandwidth data communications infrastructure that can penetrate into buildings and structures while also supporting commercial off-the-shelf end-user equipment such as PDAs. It is self-configuring and is self-healing in the event of a loss of a portion of the infrastructure. Testing of prototype units is ongoing. PMID:16778990
Using Differential Evolution to Optimize Learning from Signals and Enhance Network Security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Harmer, Paul K; Temple, Michael A; Buckner, Mark A
2011-01-01
Computer and communication network attacks are commonly orchestrated through Wireless Access Points (WAPs). This paper summarizes proof-of-concept research activity aimed at developing a physical layer Radio Frequency (RF) air monitoring capability to limit unauthorizedWAP access and mprove network security. This is done using Differential Evolution (DE) to optimize the performance of a Learning from Signals (LFS) classifier implemented with RF Distinct Native Attribute (RF-DNA) fingerprints. Performance of the resultant DE-optimized LFS classifier is demonstrated using 802.11a WiFi devices under the most challenging conditions of intra-manufacturer classification, i.e., using emissions of like-model devices that only differ in serial number. Using identicalmore » classifier input features, performance of the DE-optimized LFS classifier is assessed relative to a Multiple Discriminant Analysis / Maximum Likelihood (MDA/ML) classifier that has been used for previous demonstrations. The comparative assessment is made using both Time Domain (TD) and Spectral Domain (SD) fingerprint features. For all combinations of classifier type, feature type, and signal-to-noise ratio considered, results show that the DEoptimized LFS classifier with TD features is uperior and provides up to 20% improvement in classification accuracy with proper selection of DE parameters.« less
Knowles, Martyn; Nation, David A; Timaran, David E; Gomez, Luis F; Baig, M Shadman; Valentine, R James; Timaran, Carlos H
2015-01-01
Fenestrated endovascular aortic aneurysm repair (FEVAR) is an alternative to open repair in patients with complex abdominal aortic aneurysms who are neither fit nor suitable for standard open or endovascular repair. Chimney and snorkel grafts are other endovascular alternatives but frequently require bilateral upper extremity access that has been associated with a 3% to 10% risk of stroke. However, upper extremity access is also frequently required for FEVAR because of the caudal orientation of the visceral vessels. The purpose of this study was to assess the use of upper extremity access for FEVAR and the associated morbidity. During a 5-year period, 148 patients underwent FEVAR, and upper extremity access for FEVAR was used in 98 (66%). Outcomes were compared between those who underwent upper extremity access and those who underwent femoral access alone. The primary end point was a cerebrovascular accident or transient ischemic attack, and the secondary end point was local access site complications. The mean number of fenestrated vessels was 3.07 ± 0.81 (median, 3) for a total of 457 vessels stented. Percutaneous upper extremity access was used in 12 patients (12%) and open access in 86 (88%). All patients who required a sheath size >7F underwent high brachial open access, with the exception of one patient who underwent percutaneous axillary access with a 12F sheath. The mean sheath size was 10.59F ± 2.51F (median, 12F), which was advanced into the descending thoracic aorta, allowing multiple wire and catheter exchanges. One hemorrhagic stroke (one of 98 [1%]) occurred in the upper extremity access group, and one ischemic stroke (one of 54 [2%]) occurred in the femoral-only access group (P = .67). The stroke in the upper extremity access group occurred 5 days after FEVAR and was related to uncontrolled hypertension, whereas the stroke in the femoral group occurred on postoperative day 3. Neither patient had signs or symptoms of a stroke immediately after FEVAR. The right upper extremity was accessed six times without a stroke (0%) compared with the left being accessed 92 times with one stroke (1%; P = .8). Four patients (4%) had local complications related to upper extremity access. One (1%) required exploration for an expanding hematoma after manual compression for a 7F sheath, one (1%) required exploration for hematoma and neurologic symptoms after open access for a 12F sheath, and two patients (2%) with small hematomas did not require intervention. Two (two of 12 [17%]) of these complications were in the percutaneous access group, which were significantly more frequent than in the open group (two of 86 [2%]; P = .02). Upper extremity access appears to be a safe and feasible approach for patients undergoing FEVAR. Open exposure in the upper extremity may be safer than percutaneous access during FEVAR. Unlike chimney and snorkel grafts, upper extremity access during FEVAR is not associated with an increased risk of stroke, despite the need for multiple visceral vessel stenting. Copyright © 2015 Society for Vascular Surgery. All rights reserved.
NASA Astrophysics Data System (ADS)
Dong, Yumin; Xiao, Shufen; Ma, Hongyang; Chen, Libo
2016-12-01
Cloud computing and big data have become the developing engine of current information technology (IT) as a result of the rapid development of IT. However, security protection has become increasingly important for cloud computing and big data, and has become a problem that must be solved to develop cloud computing. The theft of identity authentication information remains a serious threat to the security of cloud computing. In this process, attackers intrude into cloud computing services through identity authentication information, thereby threatening the security of data from multiple perspectives. Therefore, this study proposes a model for cloud computing protection and management based on quantum authentication, introduces the principle of quantum authentication, and deduces the quantum authentication process. In theory, quantum authentication technology can be applied in cloud computing for security protection. This technology cannot be cloned; thus, it is more secure and reliable than classical methods.
Research in Computer Forensics
2002-06-01
systems and how they can aid in the recovery of digital evidence in a forensic analysis. Exposures to hacking techniques and tools in CS3675—Internet...cryptography, access control, authentication, biometrics, actions to be taken during an attack and case studies of hacking and information warfare. 11...chat, surfing, instant messaging and hacking with powerful access control and filter capabilities. The monitor can operates in a Prevention mode to
ERIC Educational Resources Information Center
Minnaar, A.
2011-01-01
E-learning includes the use of the internet for accessing learning materials, interacting with learning content and with instructors and students to obtain support during the learning process in order to gain knowledge and personal meaning and to grow. It occurs when students have electronic access to resources and where they are in regular online…
Costa Gondim, João José; de Oliveira Albuquerque, Robson; Clayton Alves Nascimento, Anderson; García Villalba, Luis Javier; Kim, Tai-Hoon
2016-01-01
Concerns about security on Internet of Things (IoT) cover data privacy and integrity, access control, and availability. IoT abuse in distributed denial of service attacks is a major issue, as typical IoT devices’ limited computing, communications, and power resources are prioritized in implementing functionality rather than security features. Incidents involving attacks have been reported, but without clear characterization and evaluation of threats and impacts. The main purpose of this work is to methodically assess the possible impacts of a specific class–amplified reflection distributed denial of service attacks (AR-DDoS)–against IoT. The novel approach used to empirically examine the threat represented by running the attack over a controlled environment, with IoT devices, considered the perspective of an attacker. The methodology used in tests includes that perspective, and actively prospects vulnerabilities in computer systems. This methodology defines standardized procedures for tool-independent vulnerability assessment based on strategy, and the decision flows during execution of penetration tests (pentests). After validation in different scenarios, the methodology was applied in amplified reflection distributed denial of service (AR-DDoS) attack threat assessment. Results show that, according to attack intensity, AR-DDoS saturates reflector infrastructure. Therefore, concerns about AR-DDoS are founded, but expected impact on abused IoT infrastructure and devices will be possibly as hard as on final victims. PMID:27827931
Contextual Factors Among Indiscriminate or Large Attacks on Food or Water Supplies, 1946-2015
Hunter, Paul R.
2016-01-01
This research updates previous inventories of malicious attacks on food and water and includes data from 1946 through mid-2015. A systematic search of news reports, databases, and previous inventories of poisoning events was undertaken. Incidents that threatened or were intended to achieve direct harm to humans and that were either relatively large (more than 4 victims) or indiscriminate in intent or realization were included. Agents could be chemical, biological, or radionuclear. Reports of candidate incidents were subjected to systematic inclusion and exclusion criteria as well as validity analysis (not always clearly undertaken in previous inventories of such attacks). We summarize contextual aspects of the attacks that may be important for scenario prioritization, modelling, and defensive preparedness. Opportunity, and particularly access to dangerous agents, is key to most realized attacks. The most common motives and relative success rate in causing harm were very different between food and water attacks. The likelihood that people were made ill or died also varied by food or water mode and according to motive and opportunity for delivery of the hazardous agent. Deaths and illness associated with attacks during food manufacture and prior to sale have been fewer than those in some other contexts. Valuable opportunities for food defense improvements are identified in other contexts, especially food prepared in private or community settings. PMID:26889577
Costa Gondim, João José; de Oliveira Albuquerque, Robson; Clayton Alves Nascimento, Anderson; García Villalba, Luis Javier; Kim, Tai-Hoon
2016-11-04
Concerns about security on Internet of Things (IoT) cover data privacy and integrity, access control, and availability. IoT abuse in distributed denial of service attacks is a major issue, as typical IoT devices' limited computing, communications, and power resources are prioritized in implementing functionality rather than security features. Incidents involving attacks have been reported, but without clear characterization and evaluation of threats and impacts. The main purpose of this work is to methodically assess the possible impacts of a specific class-amplified reflection distributed denial of service attacks (AR-DDoS)-against IoT. The novel approach used to empirically examine the threat represented by running the attack over a controlled environment, with IoT devices, considered the perspective of an attacker. The methodology used in tests includes that perspective, and actively prospects vulnerabilities in computer systems. This methodology defines standardized procedures for tool-independent vulnerability assessment based on strategy, and the decision flows during execution of penetration tests (pentests). After validation in different scenarios, the methodology was applied in amplified reflection distributed denial of service (AR-DDoS) attack threat assessment. Results show that, according to attack intensity, AR-DDoS saturates reflector infrastructure. Therefore, concerns about AR-DDoS are founded, but expected impact on abused IoT infrastructure and devices will be possibly as hard as on final victims.
When You Visit Your Doctor After a Heart Attack
... products will be searched. Shopping Cart Description Qty Price The Harvard Medical School 6-Week Plan for ... Memory: Understanding Age-Related Memory Loss (PDF - Lowest Price!) $18.00 Harvard Health Letter (Print & Online Access ( ...
Drug discovery: Fighting evolution with chemical synthesis
NASA Astrophysics Data System (ADS)
Yan, Ming; Baran, Phil S.
2016-05-01
A synthetic strategy has been developed that provides easy access to structurally diverse analogues of naturally occurring antibiotics, providing a fresh means of attack in the war against drug-resistant bacteria. See Article p.338
Comparison of Force and Moment Coefficients for the Same Test Article in Multiple Wind Tunnels
NASA Technical Reports Server (NTRS)
Deloach, Richard
2013-01-01
This paper compares the results of force and moment measurements made on the same test article and with the same balance in three transonic wind tunnels. Comparisons are made for the same combination of Reynolds number, Mach number, sideslip angle, control surface configuration, and angle of attack range. Between-tunnel force and moment differences are quantified. An analysis of variance was performed at four unique sites in the design space to assess the statistical significance of between-tunnel variation and any interaction with angle of attack. Tunnel to tunnel differences too large to attribute to random error were detected were observed for all forces and moments. In some cases these differences were independent of angle of attack and in other cases they changed with angle of attack.
Miller, S; Watkins, L; Matharu, M
2017-02-01
Chronic cluster headache is a rare, highly disabling primary headache condition. When medically intractable, occipital nerve stimulation can offer effective treatment. Open-label series have provided data on small cohorts only. We analyzed 51 subjects to evaluate the long-term outcomes of highly intractable chronic cluster headache with occipital nerve stimulation. Patients with intractable chronic cluster headache were implanted with occipital nerve stimulators during the period 2007-2014. The primary endpoint was improvement in daily attack frequency. Secondary endpoints included attack severity, attack duration, quality-of-life measures, headache disability scores and adverse events. We studied 51 patients [35 males; mean age at implant 47.78 (range 31-70) years; mean follow-up 39.17 (range 2-81) months]. Nineteen patients had other chronic headache types in addition in chronic cluster headache. At final follow-up, there was a 46.1% improvement in attack frequency (P < 0001) across all patients, 49.5% (P < 0.001) in those with cluster headache alone and 40.3% (P = 0.036) in those with multiple phenotypes. There were no significant differences in response in those with or without multiple headache types. The overall response rate (defined as at least a 50% improvement in attack frequency) was 52.9%. Significant reductions were also seen in attack duration and severity. Improvements were noted in headache disability scores and quality-of-life measures. Triptan use of responders dropped by 62.56%, resulting in significant cost savings. Adverse event rates were highly favorable. Occipital nerve stimulation appears to be a safe and efficacious treatment for highly intractable chronic cluster headache even after a mean follow-up of over 3 years. © 2016 EAN.
2014-11-01
SV © Her Majesty the Queen in Right of Canada, as represented by the Minister of National Defence, 2014 © Sa Majesté la Reine (en droit du Canada... dragged over to fire hydrants to be attached to the steamer caps. Bolt cutters can be used to cut holes in fences allowing better access to the train...derailment fire. Ground monitors (for blitz fire) can be positioned for fire attack. 65mm attack lines can be dragged from fire engines and
2015-10-02
hour per response, including the time for reviewing instructions, searching existing data sources , gathering and maintaining the data needed, and...architecture of MECH v0.1 is shown in Figure 1. The Android MECH-App shown on the left side of the figure is for end users to request tactical risk...when or where the next attack will take place. 3 2 MECH-App MECH-App runs on a touch screen based Android device for end users to access the
Cuthbertson, Andrew G. S.; Braham, Mohamed
2018-01-01
The almond bark beetle, Scolytus amygdali Geurin-Meneville, is responsible for significant loss of fruit production in almond orchards throughout the world. Here, we studied the damage and the incidences of S. amygdali attack on two different scales: (1) at the level of a single tree; and (2) in an entire orchard. Our results revealed no differences in attack level among four orientations (east, west, south and north sides) for the whole tree. However, the bark that was facing west side in the direction of the prevailing wind was found to be the most suitable for females to initiate attack in Stratum S2. Attack distribution remains the same among different strata (strata is vertical divisions of the tree from the ground to the uppermost twigs with ~40 cm intervals). More than 50% of attack was observed in the trunk of the tree and upper strata. However, multiplication rate (number of emerged adults/maternal gallery) varies significantly between strata. In addition, we studied attack intensity (holes produced by beetle per tree) comparing it to tree morphology (flowers, leaves and circumferences) and gum deposit. Our results revealed a positive correlation between attack intensity and gum deposits, and a negative correlation between attack intensity and tree morphology. This revealed that gum on the tree was an indicator for attack intensity. A positive correlation between attack intensity and the circumference of the tree revealed that older trees were more susceptible to S. amygdali attack. These results, while preliminary, aim to help in the monitoring of S. amygdali populations before deciding to apply any control measures. PMID:29301271
Active Detection for Exposing Intelligent Attacks in Control Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Weerakkody, Sean; Ozel, Omur; Griffioen, Paul
In this paper, we consider approaches for detecting integrity attacks carried out by intelligent and resourceful adversaries in control systems. Passive detection techniques are often incorporated to identify malicious behavior. Here, the defender utilizes finely-tuned algorithms to process information and make a binary decision, whether the system is healthy or under attack. We demonstrate that passive detection can be ineffective against adversaries with model knowledge and access to a set of input/output channels. We then propose active detection as a tool to detect attacks. In active detection, the defender leverages degrees of freedom he has in the system to detectmore » the adversary. Specifically, the defender will introduce a physical secret kept hidden from the adversary, which can be utilized to authenticate the dynamics. In this regard, we carefully review two approaches for active detection: physical watermarking at the control input, and a moving target approach for generating system dynamics. We examine practical considerations for implementing these technologies and discuss future research directions.« less
Song, Min Su; Lee, Jae Dong; Jeong, Young-Sik; Jeong, Hwa-Young; Park, Jong Hyuk
2014-01-01
Despite the convenience, ubiquitous computing suffers from many threats and security risks. Security considerations in the ubiquitous network are required to create enriched and more secure ubiquitous environments. The address resolution protocol (ARP) is a protocol used to identify the IP address and the physical address of the associated network card. ARP is designed to work without problems in general environments. However, since it does not include security measures against malicious attacks, in its design, an attacker can impersonate another host using ARP spoofing or access important information. In this paper, we propose a new detection scheme for ARP spoofing attacks using a routing trace, which can be used to protect the internal network. Tracing routing can find the change of network movement path. The proposed scheme provides high constancy and compatibility because it does not alter the ARP protocol. In addition, it is simple and stable, as it does not use a complex algorithm or impose extra load on the computer system.
Song, Min Su; Lee, Jae Dong; Jeong, Hwa-Young; Park, Jong Hyuk
2014-01-01
Despite the convenience, ubiquitous computing suffers from many threats and security risks. Security considerations in the ubiquitous network are required to create enriched and more secure ubiquitous environments. The address resolution protocol (ARP) is a protocol used to identify the IP address and the physical address of the associated network card. ARP is designed to work without problems in general environments. However, since it does not include security measures against malicious attacks, in its design, an attacker can impersonate another host using ARP spoofing or access important information. In this paper, we propose a new detection scheme for ARP spoofing attacks using a routing trace, which can be used to protect the internal network. Tracing routing can find the change of network movement path. The proposed scheme provides high constancy and compatibility because it does not alter the ARP protocol. In addition, it is simple and stable, as it does not use a complex algorithm or impose extra load on the computer system. PMID:25243205
Discrete Walsh Hadamard transform based visible watermarking technique for digital color images
NASA Astrophysics Data System (ADS)
Santhi, V.; Thangavelu, Arunkumar
2011-10-01
As the size of the Internet is growing enormously the illegal manipulation of digital multimedia data become very easy with the advancement in technology tools. In order to protect those multimedia data from unauthorized access the digital watermarking system is used. In this paper a new Discrete walsh Hadamard Transform based visible watermarking system is proposed. As the watermark is embedded in transform domain, the system is robust to many signal processing attacks. Moreover in this proposed method the watermark is embedded in tiling manner in all the range of frequencies to make it robust to compression and cropping attack. The robustness of the algorithm is tested against noise addition, cropping, compression, Histogram equalization and resizing attacks. The experimental results show that the algorithm is robust to common signal processing attacks and the observed peak signal to noise ratio (PSNR) of watermarked image is varying from 20 to 30 db depends on the size of the watermark.
Hardware Assisted Stealthy Diversity (CHECKMATE)
2013-09-01
applicable across multiple architectures. Figure 29 shows an example an attack against an interpreted environment with a Java executable. CHECKMATE can...Architectures ARM PPCx86 Java VM Java VMJava VM Java Executable Attack APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED 33 a user executes “/usr/bin/wget...Server 1 - Administration Server 2 – Database ( mySQL ) Server 3 – Web server (Mongoose) Server 4 – File server (SSH) Server 5 – Email server
Secure Multiparty Computation for Cooperative Cyber Risk Assessment
2016-11-01
the scope of data available; the more attacks that are represented in the dataset the easier it will be to determine which vulnerabilities are most...assessments by pooling their data, as a dataset that covers the infrastructure of multiple institutions would allow each of them to account for...attacks that others had experienced [4]. Sharing information to produce a broad dataset would greatly improve the ability of each organization involved to
Reconstruction of improvised explosive device blast loading to personnel in the open
NASA Astrophysics Data System (ADS)
Wiri, Suthee; Needham, Charles
2016-05-01
Significant advances in reconstructing attacks by improvised explosive devices (IEDs) and other blast events are reported. A high-fidelity three-dimensional computational fluid dynamics tool, called Second-order Hydrodynamic Automatic Mesh Refinement Code, was used for the analysis. Computer-aided design models for subjects or vehicles in the scene accurately represent geometries of objects in the blast field. A wide range of scenario types and blast exposure levels were reconstructed including free field blast, enclosed space of vehicle cabin, IED attack on a vehicle, buried charges, recoilless rifle operation, rocket-propelled grenade attack and missile attack with single subject or multiple subject exposure to pressure levels from ˜ 27.6 kPa (˜ 4 psi) to greater than 690 kPa (>100 psi). To create a full 3D pressure time-resolved reconstruction of a blast event for injury and blast exposure analysis, a combination of intelligence data and Blast Gauge data can be used to reconstruct an actual in-theatre blast event. The methodology to reconstruct an event and the "lessons learned" from multiple reconstructions in open space are presented. The analysis uses records of blast pressure at discrete points, and the output is a spatial and temporal blast load distribution for all personnel involved.
Finding Effective Responses Against Cyber Attacks for Divided Nations
2015-12-01
Coordination Center LTE Long Term Evolution MAC Media Access Control MCRC Master Control and Reporting Center MEI Ministry of Electronics...satellites that aid Internet connections. Individual users can access the Internet via not only a wired connection up to 1 Gbps, but also by 4G LTE ...operate air-gapped intranets with security measures such as cryptographic modules that correspond to security levels. The MND does maintain the public
Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Li, Xiong
2015-11-01
The E-health care systems employ IT infrastructure for maximizing health care resources utilization as well as providing flexible opportunities to the remote patient. Therefore, transmission of medical data over any public networks is necessary in health care system. Note that patient authentication including secure data transmission in e-health care system is critical issue. Although several user authentication schemes for accessing remote services are available, their security analysis show that none of them are free from relevant security attacks. We reviewed Das et al.'s scheme and demonstrated their scheme lacks proper protection against several security attacks such as user anonymity, off-line password guessing attack, smart card theft attack, user impersonation attack, server impersonation attack, session key discloser attack. In order to overcome the mentioned security pitfalls, this paper proposes an anonymity preserving remote patient authentication scheme usable in E-health care systems. We then validated the security of the proposed scheme using BAN logic that ensures secure mutual authentication and session key agreement. We also presented the experimental results of the proposed scheme using AVISPA software and the results ensure that our scheme is secure under OFMC and CL-AtSe models. Moreover, resilience of relevant security attacks has been proved through both formal and informal security analysis. The performance analysis and comparison with other schemes are also made, and it has been found that the proposed scheme overcomes the security drawbacks of the Das et al.'s scheme and additionally achieves extra security requirements.
Critical Infrastructure Protection: EMP Impacts on the U.S. Electric Grid
NASA Astrophysics Data System (ADS)
Boston, Edwin J., Jr.
The purpose of this research is to identify the United States electric grid infrastructure systems vulnerabilities to electromagnetic pulse attacks and the cyber-based impacts of those vulnerabilities to the electric grid. Additionally, the research identifies multiple defensive strategies designed to harden the electric grid against electromagnetic pulse attack that include prevention, mitigation and recovery postures. Research results confirm the importance of the electric grid to the United States critical infrastructures system and that an electromagnetic pulse attack against the electric grid could result in electric grid degradation, critical infrastructure(s) damage and the potential for societal collapse. The conclusions of this research indicate that while an electromagnetic pulse attack against the United States electric grid could have catastrophic impacts on American society, there are currently many defensive strategies under consideration designed to prevent, mitigate and or recover from an electromagnetic pulse attack. However, additional research is essential to further identify future target hardening opportunities, efficient implementation strategies and funding resources.
Kutz, Amanda; Marshall, Erin; Bernstein, Amit; Zvolensky, Michael J
2010-01-01
The current study investigated anxiety sensitivity, distress tolerance (Simons & Gaher, 2005), and discomfort intolerance (Schmidt, Richey, Cromer, & Buckner, 2007) in relation to panic-relevant responding (i.e., panic attack symptoms and panic-relevant cognitions) to a 10% carbon dioxide enriched air challenge. Participants were 216 adults (52.6% female; M(age)=22.4, SD=9.0). A series of hierarchical multiple regressions was conducted with covariates of negative affectivity and past year panic attack history in step one of the model, and anxiety sensitivity, discomfort intolerance, and distress tolerance entered simultaneously into step two. Results indicated that anxiety sensitivity, but not distress tolerance or discomfort intolerance, was significantly incrementally predictive of physical panic attack symptoms and cognitive panic attack symptoms. Additionally, anxiety sensitivity was significantly predictive of variance in panic attack status during the challenge. These findings emphasize the important, unique role of anxiety sensitivity in predicting risk for panic psychopathology, even when considered in the context of other theoretically relevant emotion vulnerability variables.
Footer, Katherine H A; Meyer, Sarah; Sherman, Susan G; Rubenstein, Leonard
2014-11-01
Globally, attacks on and interferences with health workers and healthcare delivery, including targeted violence towards providers, attacks on hospitals and delays and denial of health care, represent a serious humanitarian and human rights issue. However, gaps in research about these events persist, limiting the evidence base from which to understand and address the problem. This paper focuses on experiences of local health workers in eastern Burma's chronic conflict, including their strategies for addressing security and ensuring access to vulnerable ethnic communities in the region. Face-to-face in-depth interviews were conducted in June and August 2012 with 27 health workers from three health organizations that operate throughout eastern Burma, with their operational head quarters located in Mae Sot, Tak Province, Thailand. Qualitative analysis found that health workers in this setting experience violent and non-violent interferences with their work, and that the Burmese government's military activities in the region have severely impacted access to care, which remains restricted. Data show that innovative security strategies have emerged, including the important role of the community in ensuring securer access to health care. This study underscores health workers' concern for improved data collection to support the rights of health workers to provide health care, and the rights of community members to receive health care in conflict-affected settings. Findings will inform the development of an incident reporting form to improve systematic data collection and documentation of attacks on health in this setting. Copyright © 2014 Elsevier Ltd. All rights reserved.
The Bioterrorism Threat by Non-State Actors: Hype or Horror?
2006-12-01
renamed the town Rajneesh. It took control over the local schools while also converting the only local business into a vegetarian restaurant called...multiple targets. The April 1990 attack was perpetrated from three trucks at multiple locations. The cult targeted Narita Airport, the Diet , the
Wen, Fengtong
2013-12-01
User authentication plays an important role to protect resources or services from being accessed by unauthorized users. In a recent paper, Das et al. proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. This scheme uses three factors, e.g. biometrics, password, and smart card, to protect the security. It protects user privacy and is believed to have many abilities to resist a range of network attacks, even if the secret information stored in the smart card is compromised. In this paper, we analyze the security of Das et al.'s scheme, and show that the scheme is in fact insecure against the replay attack, user impersonation attacks and off-line guessing attacks. Then, we also propose a robust uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. Compared with the existing schemes, our protocol uses a different user authentication mechanism to resist replay attack. We show that our proposed scheme can provide stronger security than previous protocols. Furthermore, we demonstrate the validity of the proposed scheme through the BAN (Burrows, Abadi, and Needham) logic.
The Diabetic Foot Attack: "'Tis Too Late to Retreat!"
Vas, Prashanth R J; Edmonds, Michael; Kavarthapu, Venu; Rashid, Hisham; Ahluwalia, Raju; Pankhurst, Christian; Papanas, Nikolaos
2018-03-01
The "diabetic foot attack" is one of the most devastating presentations of diabetic foot disease, typically presenting as an acutely inflamed foot with rapidly progressive skin and tissue necrosis, at times associated with significant systemic symptoms. Without intervention, it may escalate over hours to limb-threatening proportions and poses a high amputation risk. There are only best practice approaches but no international protocols to guide management. Immediate recognition of a typical infected diabetic foot attack, predominated by severe infection, with prompt surgical intervention to debride all infected tissue alongside broad-spectrum antibiotic therapy is vital to ensure both limb and patient survival. Postoperative access to multidisciplinary and advanced wound care therapies is also necessary. More subtle forms exist: these include the ischemic diabetic foot attack and, possibly, in a contemporary categorization, acute Charcot neuroarthropathy. To emphasize the importance of timely action especially in the infected and ischemic diabetic foot attack, we revisit the concept of "time is tissue" and draw parallels with advances in acute myocardial infarction and stroke care. At the moment, international protocols to guide management of severe diabetic foot presentations do not specifically use the term. However, we believe that it may help increase awareness of the urgent actions required in some situations.
Internet-based information-seeking behavior for transient ischemic attack.
Abedi, Vida; Mbaye, Marieme; Tsivgoulis, Georgios; Male, Shailesh; Goyal, Nitin; Alexandrov, Andrei V; Zand, Ramin
2015-12-01
In recent years, Internet became an increasingly important tool for accessing health information and is being used more frequently to promote public health. To use Google search data to explore information seeking behavior for transient ischemic attack. We selected two groups of keywords related to transient ischemic attack: 'Transient Ischemic Attack' and 'Mini Stroke'. We obtained all available online search data performed in the United States from the Google search engine for a 10-year span--January 2004 to December 2013. The monthly and daily search data for the selected keywords were analyzed--using moving average--to explore the trends, peaks, and declining effects. There were three significant concurrent peaks in the Google search data for the selected keywords. Each peak was directly associated with media coverage and news headlines related to the incident of transient ischemic attack in a public figure. Following each event, it took three- to seven-days for the search trend to return to its respective average value. Furthermore, the trend was steady for 'Transient Ischemic Attack'; however, the search interest for the keyword 'Mini Stroke' shows a steady increase. The overall search interest for the selected keywords was significantly higher in the southeastern United States. Our study shows that changes in online search behavior can be associated with media coverage of key events (in our case transient ischemic attack) in public figures. These findings suggest that multimedia health promotion campaigns might be more effective, if increased promptly after similar media coverage. © 2015 World Stroke Organization.
Adaptive cyber-attack modeling system
NASA Astrophysics Data System (ADS)
Gonsalves, Paul G.; Dougherty, Edward T.
2006-05-01
The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.
Engaging the Nation’s Critical Infrastructure Sector to Deter Cyber Threats
2013-03-01
is the component of CyberOps that extends cyber power beyond the defensive boundaries of the GIG to detect, deter, deny, and defeat adversaries... economy .16 DDOS attacks are based on multiple, malware infected personal computers, organized into networks called botnets, and are directed by...not condemn the actions of those involved. Of the two attacks on Estonia and Georgia, it was Estonia that had the greatest damage to its economy
Angeli, A; Peat, T S; Bartolucci, G; Nocentini, A; Supuran, C T; Carta, F
2016-12-28
A mild, efficient and one pot procedure to access benzoxazoles using easily accessible acylselenoureas as starting materials has been discovered. Mechanistic studies revealed a pH dependent intramolecular oxidative deselenization, with ring closure due to an intramolecular nucleophilic attack of a phenoxide ion. All the benzoxazoles herein reported possessed a primary sulfonamide zinc binding group and showed effective inhibitory action on the enzymes, carbonic anhydrases.
Pakistan’s Security Paradox: Countering and Fomenting Insurgencies
2009-12-01
movement based on political grievances to form the independent state of Khalistan. Before the Golden Temple was attacked, the insurgency was actively...is Winning,” Newsweek, 2 May 2009, available at www.newsweek.com/id/195702; accessed October 2009. 111. See Haider A. H. Mullick, “Lions and Jackals ...hussein-mullick/lions-and- jackals ; accessed October 2009. 92 JSOU Report 09-9 112. Interview with a senior Pakistani military official, March 2009
Calling for an end to attacks on Syrian civilians and expanded humanitarian access.
Rep. Royce, Edward R. [R-CA-39
2014-03-14
House - 04/30/2014 Ordered to be Reported in the Nature of a Substitute (Amended) by Unanimous Consent. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Hamil-Luker, Jenifer; O'Rand, Angela M
2007-02-01
A growing body of evidence shows that childhood socioeconomic status (SES) is predictive of disease risk in later life, with those from the most disadvantaged backgrounds more likely to experience poor adult-health outcomes. Most of these studies, however are based on middle-aged male populations and pay insufficient attention to the pathways between childhood risks and specific adult disorders. This article examines gender differences in the link between childhood SES and heart attack risk trajectories and the mechanisms by which early environments affect future disease risk. By using methods that model both latent and path-specific influences, we identify heterogeneity in early life conditions and human, social, and health capital in adulthood that contribute to diverse heart attack risk trajectories between and among men and women as they age into their 60s and 70s. We find that key risk factors for heart attack operate differently for men and women. For men, childhood SES does not differentiate those at low, increasing, and high risk for heart attack. In contrast, women who grew up without a father and/or under adverse economic conditions are the most likely to experience elevated risk for heart attack, even after we adjust for the unequal distribution of working and living conditions, social relationships, access to health care, and adult lifestyle behaviors that influence health outcomes.
Modeling Resources Allocation in Attacker-Defender Games with "Warm Up" CSF.
Guan, Peiqiu; Zhuang, Jun
2016-04-01
Like many other engineering investments, the attacker's and defender's investments may have limited impact without initial capital to "warm up" the systems. This article studies such "warm up" effects on both the attack and defense equilibrium strategies in a sequential-move game model by developing a class of novel and more realistic contest success functions. We first solve a single-target attacker-defender game analytically and provide numerical solutions to a multiple-target case. We compare the results of the models with and without consideration of the investment "warm up" effects, and find that the defender would suffer higher expected damage, and either underestimate the attacker effort or waste defense investment if the defender falsely believes that no investment "warm up" effects exist. We illustrate the model results with real data, and compare the results of the models with and without consideration of the correlation between the "warm up" threshold and the investment effectiveness. Interestingly, we find that the defender is suggested to give up defending all the targets when the attack or the defense "warm up" thresholds are sufficiently high. This article provides new insights and suggestions on policy implications for homeland security resource allocation. © 2015 Society for Risk Analysis.
Burch, Heather; Kitley, Charles A; Naeem, Mohammed
2010-07-01
Following the events of the September 11th attack, there has been an increasing concern about the possibility of a future attack on our homeland. In response, the United States Department of Homeland Defense has planned for a future attack by formulating multiple scenarios which may occur in the event of such a disaster. Radiology will play a key role in each of these scenarios, assisting with triage, diagnosis, and therapy of the large populations which potentially could be involved. This article describes some of these scenarios as well the response which will be expected of the radiology community in the event of such a disaster.
Institute for Defense Analyses Tactical Warfare (TACWAR) Model. Program Maintenance Manual. Part II.
1977-09-06
Accession For XTIS GRA&I DTIC TAB U1nannounced Q Just if latlon B vl an/o .0EgsTe. Distriution l3L-j b ’On/ n4I Availbilit Code CONTENTS Section Page...the TACWAR modeln xx GLOSSARY Abbreviation -Meaning AAA antiaircraft artillery ABA airbase attacker * ABAE airbase attacker escort ABAS airbase...Do011010 End KS: .. US 001102 rsr ll rlOf do 1001) K spoft O tad-mi IDT *)WISIT 10046 ,tca ft K fmUt dhl IST INS ____nl ABA mcNOA Es AZ *in
A Secure and Efficient Handover Authentication Protocol for Wireless Networks
Wang, Weijia; Hu, Lei
2014-01-01
Handover authentication protocol is a promising access control technology in the fields of WLANs and mobile wireless sensor networks. In this paper, we firstly review an efficient handover authentication protocol, named PairHand, and its existing security attacks and improvements. Then, we present an improved key recovery attack by using the linearly combining method and reanalyze its feasibility on the improved PairHand protocol. Finally, we present a new handover authentication protocol, which not only achieves the same desirable efficiency features of PairHand, but enjoys the provable security in the random oracle model. PMID:24971471
Quantum Secure Group Communication.
Li, Zheng-Hong; Zubairy, M Suhail; Al-Amri, M
2018-03-01
We propose a quantum secure group communication protocol for the purpose of sharing the same message among multiple authorized users. Our protocol can remove the need for key management that is needed for the quantum network built on quantum key distribution. Comparing with the secure quantum network based on BB84, we show our protocol is more efficient and securer. Particularly, in the security analysis, we introduce a new way of attack, i.e., the counterfactual quantum attack, which can steal information by "invisible" photons. This invisible photon can reveal a single-photon detector in the photon path without triggering the detector. Moreover, the photon can identify phase operations applied to itself, thereby stealing information. To defeat this counterfactual quantum attack, we propose a quantum multi-user authorization system. It allows us to precisely control the communication time so that the attack can not be completed in time.
Systematic Poisoning Attacks on and Defenses for Machine Learning in Healthcare.
Mozaffari-Kermani, Mehran; Sur-Kolay, Susmita; Raghunathan, Anand; Jha, Niraj K
2015-11-01
Machine learning is being used in a wide range of application domains to discover patterns in large datasets. Increasingly, the results of machine learning drive critical decisions in applications related to healthcare and biomedicine. Such health-related applications are often sensitive, and thus, any security breach would be catastrophic. Naturally, the integrity of the results computed by machine learning is of great importance. Recent research has shown that some machine-learning algorithms can be compromised by augmenting their training datasets with malicious data, leading to a new class of attacks called poisoning attacks. Hindrance of a diagnosis may have life-threatening consequences and could cause distrust. On the other hand, not only may a false diagnosis prompt users to distrust the machine-learning algorithm and even abandon the entire system but also such a false positive classification may cause patient distress. In this paper, we present a systematic, algorithm-independent approach for mounting poisoning attacks across a wide range of machine-learning algorithms and healthcare datasets. The proposed attack procedure generates input data, which, when added to the training set, can either cause the results of machine learning to have targeted errors (e.g., increase the likelihood of classification into a specific class), or simply introduce arbitrary errors (incorrect classification). These attacks may be applied to both fixed and evolving datasets. They can be applied even when only statistics of the training dataset are available or, in some cases, even without access to the training dataset, although at a lower efficacy. We establish the effectiveness of the proposed attacks using a suite of six machine-learning algorithms and five healthcare datasets. Finally, we present countermeasures against the proposed generic attacks that are based on tracking and detecting deviations in various accuracy metrics, and benchmark their effectiveness.
Tanik, Nermin; Serin, Halil Ibrahim; Celikbilek, Asuman; Inan, Levent Ertugrul; Gundogdu, Fatma
2015-11-15
Multiple sclerosis (MS) is a neuroinflammatory and neurodegenerative disease that progresses to axonal loss and demyelinization. Olfactory dysfunction in patients with MS has been reported frequently. We were interested in the associations of olfactory bulb (OB) and olfactory sulcus depth (OSD) with disease duration and attack frequency. We included 25 patients with MS and 30 age- and sex-matched controls in this study. The Expanded Disability Status Scale, Beck Depression Inventory, and Mini Mental State Examination were applied. OB, OSD, and magnetic resonance imaging plaque numbers were calculated. OB volume and OSD in patients with MS were significantly lower than those in the control group (right and left OB: p<0.001; right OSD: p=0.001; and left OSD: p=0.039). Disease duration was negatively correlated with right and left OB volume (right OB: r=-0.434, p=0.030 and left OB: r=-0.518, p=0.008). Attack frequency was negatively correlated with left OB volume and left OSD (left OB: r=-0.428, p=0.033 and left OSD: r=-0.431, p=0.032). The OB and OSD were atrophied significantly in patients with MS, and this was correlated with disease duration and attack frequency. The left side tended to be dominant. Copyright © 2015 Elsevier B.V. All rights reserved.
Wang, Soon Joo; Choi, Jin Tae; Arnold, Jeffrey
2003-01-01
South Korea has experienced > 30 suspected terrorism-related events since 1958, including attacks against South Korean citizens in foreign countries. The most common types of terrorism used have included bombings, shootings, hijackings, and kidnappings. Prior to 1990, North Korea was responsible for almost all terrorism-related events inside of South Korea, including multiple assassination attempts on its presidents, regular kidnappings of South Korean fisherman, and several high-profile bombings. Since 1990, most of the terrorist attacks against South Korean citizens have occurred abroad and have been related to the emerging worldwide pattern of terrorism by international terrorist organizations or deranged individuals. The 1988 Seoul Olympic Games provided a major stimulus for South Korea to develop a national emergency response system for terrorism-related events based on the participation of multiple ministries. The 11 September 2001 World Trade Center and Pentagon attacks and the 2001 United States of America (US) anthrax letter attacks prompted South Korea to organize a new national system of emergency response for terrorism-related events. The system is based on five divisions for the response to specific types of terrorist events, involving conventional terrorism, bioterrorism, chemical terrorism, radiological terrorism, and cyber-terrorism. No terrorism-related events occurred during the 2002 World Cup and Asian Games held in South Korea. The emergency management of terrorism-related events in South Korea is adapting to the changing risk of terrorism in the new century.
Physical victimization, gender identity and suicide risk among transgender men and women.
Barboza, Gia Elise; Dominguez, Silvia; Chance, Elena
2016-12-01
We investigated whether being attacked physically due to one's gender identity or expression was associated with suicide risk among trans men and women living in Virginia. The sample consisted of 350 transgender men and women who participated in the Virginia Transgender Health Initiative Survey (THIS). Multivariate multinomial logistic regression was used to explore the competing outcomes associated with suicidal risk. Thirty-seven percent of trans men and women experienced at least one physical attack since the age of 13. On average, individuals experienced 3.97 (SD = 2.86) physical attacks; among these about half were attributed to one's gender identity or expression (mean = 2.08, SD = 1.96). In the multivariate multinomial regression, compared to those with no risk, being physically attacked increased the odds of both attempting and contemplating suicide regardless of gender attribution. Nevertheless, the relative impact of physical victimization on suicidal behavior was higher among those who were targeted on the basis of their gender identity or expression. Finally, no significant association was found between multiple measures of institutional discrimination and suicide risk once discriminatory and non-discriminatory physical victimization was taken into account. Trans men and women experience high levels of physical abuse and face multiple forms of discrimination. They are also at an increased risk for suicidal tendencies. Interventions that help transindividuals cope with discrimination and physical victimization simultaneously may be more effective in saving lives.
Proceedings of the Mobile Satellite System Architectures and Multiple Access Techniques Workshop
NASA Technical Reports Server (NTRS)
Dessouky, Khaled
1989-01-01
The Mobile Satellite System Architectures and Multiple Access Techniques Workshop served as a forum for the debate of system and network architecture issues. Particular emphasis was on those issues relating to the choice of multiple access technique(s) for the Mobile Satellite Service (MSS). These proceedings contain articles that expand upon the 12 presentations given in the workshop. Contrasting views on Frequency Division Multiple Access (FDMA), Code Division Multiple Access (CDMA), and Time Division Multiple Access (TDMA)-based architectures are presented, and system issues relating to signaling, spacecraft design, and network management constraints are addressed. An overview article that summarizes the issues raised in the numerous discussion periods of the workshop is also included.
Mass casualty response in the 2008 Mumbai terrorist attacks.
Roy, Nobhojit; Kapil, Vikas; Subbarao, Italo; Ashkenazi, Isaac
2011-12-01
The November 26-29, 2008, terrorist attacks on Mumbai were unique in its international media attention, multiple strategies of attack, and the disproportionate national fear they triggered. Everyone was a target: random members of the general population, iconic targets, and foreigners alike were under attack by the terrorists. A retrospective, descriptive study of the distribution of terror victims to various city hospitals, critical radius, surge capacity, and the nature of specialized medical interventions was gathered through police, legal reports, and interviews with key informants. Among the 172 killed and 304 injured people, about four-fifths were men (average age, 33 years) and 12% were foreign nationals. The case-fatality ratio for this event was 2.75:1, and the mortality rate among those who were critically injured was 12%. A total of 38.5% of patients arriving at the hospitals required major surgical intervention. Emergency surgical operations were mainly orthopedic (external fixation for compound fractures) and general surgical interventions (abdominal explorations for penetrating bullet/shrapnel injuries). The use of heavy-duty automatic weapons, explosives, hostages, and arson in these terrorist attacks alerts us to new challenges to medical counterterrorism response. The need for building central medical control for a coordinated response and for strengthening public hospital capacity are lessons learned for future attacks. These particular terrorist attacks had global consequences, in terms of increased security checks and alerts for and fears of further similar "Mumbai-style" attacks. The resilience of the citizens of Mumbai is a critical measure of the long-term effects of terror attacks.
Emergency access to protected health records.
Künzi, Julien; Koster, Paul; Petković, Milan
2009-01-01
Digital Rights Management (DRM) schemes are receiving increased attention in the healthcare domain for the protection of sensitive health records as they offer security against insider attacks and advance protection features such as usage control. However, to be accepted by health care providers, a DRM solution has to fulfill specific healthcare requirements including emergency access. In this paper, we propose such DRM solution that can be deployed in highly distributed environments of electronic or personal health record infrastructures.
Improved Aeroprediction Code. Part 1. Summary of New Methods and Comparison with Experiment
1993-05-01
and the results stored in tabular form as functions of Mach number, altitude, and angle of attack. This information can then be accessed by an...WIGBD9AI3OFGRAINUE 10 VALIDATIO ..... PRO .. SS7 . ..CON .......U... 5 ....... ... ........ .. . .. .. ...4-6 0 .......... NSWCDD/TR-93/9 I 256 AP 01 APIS3 1...Unit Block 13. Abstract. Include a brief (Maximum 200 Element Accession No. words) factual summary of the most significant information contained in
2006-12-29
access to scientific and technical information (S& T ) for legitimate uses while protecting it from potential terrorists poses difficult policy choices...September 11, 2001 terrorist attacks, controls increasingly have been placed on some unclassified research and S& T information, including that used to...identify SBU information, especially S& T information; how to keep it from terrorists, while allowing access for those who need to use it; and how to
Peter, Frank J.; Dalton, Larry J.; Plummer, David W.
2002-01-01
A new class of mechanical code comparators is described which have broad potential for application in safety, surety, and security applications. These devices can be implemented as micro-scale electromechanical systems that isolate a secure or otherwise controlled device until an access code is entered. This access code is converted into a series of mechanical inputs to the mechanical code comparator, which compares the access code to a pre-input combination, entered previously into the mechanical code comparator by an operator at the system security control point. These devices provide extremely high levels of robust security. Being totally mechanical in operation, an access control system properly based on such devices cannot be circumvented by software attack alone.
Defence against Black Hole and Selective Forwarding Attacks for Medical WSNs in the IoT †
Mathur, Avijit; Newe, Thomas; Rao, Muzaffar
2016-01-01
Wireless sensor networks (WSNs) are being used to facilitate monitoring of patients in hospital and home environments. These systems consist of a variety of different components/sensors and many processes like clustering, routing, security, and self-organization. Routing is necessary for medical-based WSNs because it allows remote data delivery and it facilitates network scalability in large hospitals. However, routing entails several problems, mainly due to the open nature of wireless networks, and these need to be addressed. This paper looks at two of the problems that arise due to wireless routing between the nodes and access points of a medical WSN (for IoT use): black hole and selective forwarding (SF) attacks. A solution to the former can readily be provided through the use of cryptographic hashes, while the latter makes use of a neighbourhood watch and threshold-based analysis to detect and correct SF attacks. The scheme proposed here is capable of detecting a selective forwarding attack with over 96% accuracy and successfully identifying the malicious node with 83% accuracy. PMID:26797620
Policies to Reduce Influenza in the Workplace: Impact Assessments Using an Agent-Based Model
Grefenstette, John J.; Galloway, David; Albert, Steven M.; Burke, Donald S.
2013-01-01
Objectives. We examined the impact of access to paid sick days (PSDs) and stay-at-home behavior on the influenza attack rate in workplaces. Methods. We used an agent-based model of Allegheny County, Pennsylvania, with PSD data from the US Bureau of Labor Statistics, standard influenza epidemic parameters, and the probability of staying home when ill. We compared the influenza attack rate among employees resulting from workplace transmission, focusing on the effects of presenteeism (going to work when ill). Results. In a simulated influenza epidemic (R0 = 1.4), the attack rate among employees owing to workplace transmission was 11.54%. A large proportion (72.00%) of this attack rate resulted from exposure to employees engaging in presenteeism. Universal PSDs reduced workplace infections by 5.86%. Providing 1 or 2 “flu days”—allowing employees with influenza to stay home—reduced workplace infections by 25.33% and 39.22%, respectively. Conclusions. PSDs reduce influenza transmission owing to presenteeism and, hence, the burden of influenza illness in workplaces. PMID:23763426
Defence against Black Hole and Selective Forwarding Attacks for Medical WSNs in the IoT.
Mathur, Avijit; Newe, Thomas; Rao, Muzaffar
2016-01-19
Wireless sensor networks (WSNs) are being used to facilitate monitoring of patients in hospital and home environments. These systems consist of a variety of different components/sensors and many processes like clustering, routing, security, and self-organization. Routing is necessary for medical-based WSNs because it allows remote data delivery and it facilitates network scalability in large hospitals. However, routing entails several problems, mainly due to the open nature of wireless networks, and these need to be addressed. This paper looks at two of the problems that arise due to wireless routing between the nodes and access points of a medical WSN (for IoT use): black hole and selective forwarding (SF) attacks. A solution to the former can readily be provided through the use of cryptographic hashes, while the latter makes use of a neighbourhood watch and threshold-based analysis to detect and correct SF attacks. The scheme proposed here is capable of detecting a selective forwarding attack with over 96% accuracy and successfully identifying the malicious node with 83% accuracy.
Known-plaintext attack on the double phase encoding and its implementation with parallel hardware
NASA Astrophysics Data System (ADS)
Wei, Hengzheng; Peng, Xiang; Liu, Haitao; Feng, Songlin; Gao, Bruce Z.
2008-03-01
A known-plaintext attack on the double phase encryption scheme implemented with parallel hardware is presented. The double random phase encoding (DRPE) is one of the most representative optical cryptosystems developed in mid of 90's and derives quite a few variants since then. Although the DRPE encryption system has a strong power resisting to a brute-force attack, the inherent architecture of DRPE leaves a hidden trouble due to its linearity nature. Recently the real security strength of this opto-cryptosystem has been doubted and analyzed from the cryptanalysis point of view. In this presentation, we demonstrate that the optical cryptosystems based on DRPE architecture are vulnerable to known-plain text attack. With this attack the two encryption keys in the DRPE can be accessed with the help of the phase retrieval technique. In our approach, we adopt hybrid input-output algorithm (HIO) to recover the random phase key in the object domain and then infer the key in frequency domain. Only a plaintext-ciphertext pair is sufficient to create vulnerability. Moreover this attack does not need to select particular plaintext. The phase retrieval technique based on HIO is an iterative process performing Fourier transforms, so it fits very much into the hardware implementation of the digital signal processor (DSP). We make use of the high performance DSP to accomplish the known-plaintext attack. Compared with the software implementation, the speed of the hardware implementation is much fast. The performance of this DSP-based cryptanalysis system is also evaluated.
Detection of complex cyber attacks
NASA Astrophysics Data System (ADS)
Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug
2006-05-01
One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.
Cyber attack analysis on cyber-physical systems: Detectability, severity, and attenuation strategy
NASA Astrophysics Data System (ADS)
Kwon, Cheolhyeon
Security of Cyber-Physical Systems (CPS) against malicious cyber attacks is an important yet challenging problem. Since most cyber attacks happen in erratic ways, it is usually intractable to describe and diagnose them systematically. Motivated by such difficulties, this thesis presents a set of theories and algorithms for a cyber-secure architecture of the CPS within the control theoretic perspective. Here, instead of identifying a specific cyber attack model, we are focused on analyzing the system's response during cyber attacks. Firstly, we investigate the detectability of the cyber attacks from the system's behavior under cyber attacks. Specifically, we conduct a study on the vulnerabilities in the CPS's monitoring system against the stealthy cyber attack that is carefully designed to avoid being detected by its detection scheme. After classifying three kinds of cyber attacks according to the attacker's ability to compromise the system, we derive the necessary and sufficient conditions under which such stealthy cyber attacks can be designed to cause the unbounded estimation error while not being detected. Then, the analytical design method of the optimal stealthy cyber attack that maximizes the estimation error is developed. The proposed stealthy cyber attack analysis is demonstrated with illustrative examples on Air Traffic Control (ATC) system and Unmanned Aerial Vehicle (UAV) navigation system applications. Secondly, in an attempt to study the CPSs' vulnerabilities in more detail, we further discuss a methodology to identify potential cyber threats inherent in the given CPSs and quantify the attack severity accordingly. We then develop an analytical algorithm to test the behavior of the CPS under various cyber attack combinations. Compared to a numerical approach, the analytical algorithm enables the prediction of the most effective cyber attack combinations without computing the severity of all possible attack combinations, thereby greatly reducing the computational cost. The proposed algorithm is validated through a linearized longitudinal motion of a UAV example. Finally, we propose an attack attenuation strategy via the controller design for CPSs that are robust to various types of cyber attacks. While the previous studies have investigated a secure control by assuming a specific attack strategy, in this research we propose a hybrid robust control scheme that contains multiple sub-controllers, each matched to a specific type of cyber attacks. Then the system can be adapted to various cyber attacks (including those that are not assumed for sub-controller design) by switching its sub-controllers to achieve the best performance. Then, a method for designing a secure switching logic to counter all possible cyber attacks is proposed and it verifies mathematically the system's performance and stability as well. The performance of the proposed control scheme is demonstrated by an example with the hybrid H2 - H-infinity controller applied to a UAV example.
MPH-M, AODV-M and DSR-M Performance Evaluation under Jamming Attacks.
Del-Valle-Soto, Carolina; Mex-Perera, Carlos; Monroy, Raul; Nolazco-Flores, Juan A
2017-07-05
In this work, we present the design of a mitigation scheme for jamming attacks integrated to the routing protocols MPH, AODV, and DSR. The resulting protocols are named MPH-M (Multi-Parent Hierarchical - Modified), AODV-M (Ad hoc On Demand Distance Vector - Modified), and DSR-M (Dynamic Source Routing - Modified). For the mitigation algorithm, if the detection algorithm running locally in each node produces a positive result then the node is isolated; second, the routing protocol adapts their paths avoiding the isolated nodes. We evaluated how jamming attacks affect different metrics for all these modified protocols. The metrics we employ to detect jamming attack are number of packet retransmissions, number of CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) retries while waiting for an idle channel and the energy wasted by the node. The metrics to evaluate the performance of the modified routing protocols are the throughput and resilience of the system and the energy used by the nodes. We evaluated all the modified protocols when the attacker position was set near, middle and far of the collector node. The results of our evaluation show that performance for MPH-M is much better than AODV-M and DSR-M. For example, the node energy for MPH-M is 138.13% better than AODV-M and 126.07% better than DSR-M. Moreover, we also find that MPH-M benefits much more of the mitigation scheme than AODV-M and DSR-M. For example, the node energy consumption is 34.61% lower for MPH-M and only 3.92% and 3.42% for AODV-M and DSR-M, respectively. On throughput, the MPH protocol presents a packet reception efficiency at the collector node of 16.4% on to AODV and DSR when there is no mitigation mechanism. Moreover, MPH-M has an efficiency greater than 7.7% with respect to AODV-M and DSR-M when there is a mitigation scheme. In addition, we have that with the mitigation mechanism AODV-M and DSR-M do not present noticeable modification. However, MPH-M improves its efficiency by 8.4%. We also measure the resilience of these algorithms from the average packet re-transmissions perspective, and we find that MPH-M has around a 15% lower change rate than AODV-M and DSR-M. The MPH-M recovery time is 5 s faster than AODV-M and 2 s faster than DSR-M.
MPH-M, AODV-M and DSR-M Performance Evaluation under Jamming Attacks
Del-Valle-Soto, Carolina
2017-01-01
In this work, we present the design of a mitigation scheme for jamming attacks integrated to the routing protocols MPH, AODV, and DSR. The resulting protocols are named MPH-M (Multi-Parent Hierarchical - Modified), AODV-M (Ad hoc On Demand Distance Vector - Modified), and DSR-M (Dynamic Source Routing - Modified). For the mitigation algorithm, if the detection algorithm running locally in each node produces a positive result then the node is isolated; second, the routing protocol adapts their paths avoiding the isolated nodes. We evaluated how jamming attacks affect different metrics for all these modified protocols. The metrics we employ to detect jamming attack are number of packet retransmissions, number of CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) retries while waiting for an idle channel and the energy wasted by the node. The metrics to evaluate the performance of the modified routing protocols are the throughput and resilience of the system and the energy used by the nodes. We evaluated all the modified protocols when the attacker position was set near, middle and far of the collector node. The results of our evaluation show that performance for MPH-M is much better than AODV-M and DSR-M. For example, the node energy for MPH-M is 138.13% better than AODV-M and 126.07% better than DSR-M. Moreover, we also find that MPH-M benefits much more of the mitigation scheme than AODV-M and DSR-M. For example, the node energy consumption is 34.61% lower for MPH-M and only 3.92% and 3.42% for AODV-M and DSR-M, respectively. On throughput, the MPH protocol presents a packet reception efficiency at the collector node of 16.4% on to AODV and DSR when there is no mitigation mechanism. Moreover, MPH-M has an efficiency greater than 7.7% with respect to AODV-M and DSR-M when there is a mitigation scheme. In addition, we have that with the mitigation mechanism AODV-M and DSR-M do not present noticeable modification. However, MPH-M improves its efficiency by 8.4%. We also measure the resilience of these algorithms from the average packet re-transmissions perspective, and we find that MPH-M has around a 15% lower change rate than AODV-M and DSR-M. The MPH-M recovery time is 5 s faster than AODV-M and 2 s faster than DSR-M. PMID:28678180
Twitter in the Cross Fire—The Use of Social Media in the Westgate Mall Terror Attack in Kenya
Simon, Tomer; Goldberg, Avishay; Aharonson-Daniel, Limor; Leykin, Dmitry; Adini, Bruria
2014-01-01
On September 2013 an attack on the Westgate mall in Kenya led to a four day siege, resulting in 67 fatalities and 175 wounded. During the crisis, Twitter became a crucial channel of communication between the government, emergency responders and the public, facilitating the emergency management of the event. The objectives of this paper are to present the main activities, use patterns and lessons learned from the use of the social media in the crisis. Using TwitterMate, a system developed to collect, store and analyze tweets, the main hashtags generated by the crowd and specific Twitter accounts of individuals, emergency responders and NGOs, were followed throughout the four day siege. A total of 67,849 tweets were collected and analyzed. Four main categories of hashtags were identified: geographical locations, terror attack, social support and organizations. The abundance of Twitter accounts providing official information made it difficult to synchronize and follow the flow of information. Many organizations posted simultaneously, by their manager and by the organization itself. Creating situational awareness was facilitated by information tweeted by the public. Threat assessment was updated through the information posted on social media. Security breaches led to the relay of sensitive data. At times, misinformation was only corrected after two days. Social media offer an accessible, widely available means for a bi-directional flow of information between the public and the authorities. In the crisis, all emergency responders used and leveraged social media networks for communicating both with the public and among themselves. A standard operating procedure should be developed to enable multiple responders to monitor, synchronize and integrate their social media feeds during emergencies. This will lead to better utilization and optimization of social media resources during crises, providing clear guidelines for communications and a hierarchy for dispersing information to the public and among responding organizations. PMID:25153889
Twitter in the cross fire--the use of social media in the Westgate Mall terror attack in Kenya.
Simon, Tomer; Goldberg, Avishay; Aharonson-Daniel, Limor; Leykin, Dmitry; Adini, Bruria
2014-01-01
On September 2013 an attack on the Westgate mall in Kenya led to a four day siege, resulting in 67 fatalities and 175 wounded. During the crisis, Twitter became a crucial channel of communication between the government, emergency responders and the public, facilitating the emergency management of the event. The objectives of this paper are to present the main activities, use patterns and lessons learned from the use of the social media in the crisis. Using TwitterMate, a system developed to collect, store and analyze tweets, the main hashtags generated by the crowd and specific Twitter accounts of individuals, emergency responders and NGOs, were followed throughout the four day siege. A total of 67,849 tweets were collected and analyzed. Four main categories of hashtags were identified: geographical locations, terror attack, social support and organizations. The abundance of Twitter accounts providing official information made it difficult to synchronize and follow the flow of information. Many organizations posted simultaneously, by their manager and by the organization itself. Creating situational awareness was facilitated by information tweeted by the public. Threat assessment was updated through the information posted on social media. Security breaches led to the relay of sensitive data. At times, misinformation was only corrected after two days. Social media offer an accessible, widely available means for a bi-directional flow of information between the public and the authorities. In the crisis, all emergency responders used and leveraged social media networks for communicating both with the public and among themselves. A standard operating procedure should be developed to enable multiple responders to monitor, synchronize and integrate their social media feeds during emergencies. This will lead to better utilization and optimization of social media resources during crises, providing clear guidelines for communications and a hierarchy for dispersing information to the public and among responding organizations.
Blossey, Bernd; Dávalos, Andrea; Nuzzo, Victoria
2017-09-01
Management of ungulates is contested ground that lacks stakeholder agreement on desirable population sizes and management approaches. Unfortunately, we often miss information about extent of local impacts, for example on plant communities, to guide management decisions. Typical vegetation impact assessments like the woody browse index do not assess herbaceous plants, and differences in browse severity can be a function of deer density, deer legacy effects, localized deer feeding preferences and/or differences in plant community composition. Furthermore, in heavily affected areas, few remnant plants may remain for assessments. We used a sentinel approach to assess impact of white-tailed deer ( Odocoileus virginianus ), rodent attack, invasive earthworms and three invasive plants on survival and growth of 3-month-old red oak ( Quercus rubra ) individuals. We planted cohorts in 2010 and 2011 into deer accessible and fenced 30 × 30 m plots at 12 forests in New York State. We found year and site-specific effects with high deer herbivory of unprotected individuals (70-90 % of oaks browsed by deer versus none in fenced areas) far exceeding importance of rodent attacks. Oaks planted at low earthworm density sites were at significantly higher risk of being browsed compared with oaks at high earthworm density sites, but there was no detectable negative effect of invasive plants. Surviving oaks grew (~2 cm per year) under forest canopy cover, but only when fenced. We consider planting of oak or other woody or herbaceous sentinels to assess deer browse pressure a promising method to provide quantifiable evidence for deer impacts and to gauge success of different management techniques. The strength of this approach is that typical problems associated with multiple stressor impacts can be avoided, areas devoid of forest floor vegetation but under heavy deer browse pressure can still be assessed and the method can be implemented by non-specialists. Implementation of regular assessments can guide ungulate management based on meaningful evidence.
Dávalos, Andrea; Nuzzo, Victoria
2017-01-01
Abstract Management of ungulates is contested ground that lacks stakeholder agreement on desirable population sizes and management approaches. Unfortunately, we often miss information about extent of local impacts, for example on plant communities, to guide management decisions. Typical vegetation impact assessments like the woody browse index do not assess herbaceous plants, and differences in browse severity can be a function of deer density, deer legacy effects, localized deer feeding preferences and/or differences in plant community composition. Furthermore, in heavily affected areas, few remnant plants may remain for assessments. We used a sentinel approach to assess impact of white-tailed deer (Odocoileus virginianus), rodent attack, invasive earthworms and three invasive plants on survival and growth of 3-month-old red oak (Quercus rubra) individuals. We planted cohorts in 2010 and 2011 into deer accessible and fenced 30 × 30 m plots at 12 forests in New York State. We found year and site-specific effects with high deer herbivory of unprotected individuals (70–90 % of oaks browsed by deer versus none in fenced areas) far exceeding importance of rodent attacks. Oaks planted at low earthworm density sites were at significantly higher risk of being browsed compared with oaks at high earthworm density sites, but there was no detectable negative effect of invasive plants. Surviving oaks grew (~2 cm per year) under forest canopy cover, but only when fenced. We consider planting of oak or other woody or herbaceous sentinels to assess deer browse pressure a promising method to provide quantifiable evidence for deer impacts and to gauge success of different management techniques. The strength of this approach is that typical problems associated with multiple stressor impacts can be avoided, areas devoid of forest floor vegetation but under heavy deer browse pressure can still be assessed and the method can be implemented by non-specialists. Implementation of regular assessments can guide ungulate management based on meaningful evidence. PMID:28894567
Freedman, Mark S; Leist, Thomas P; Comi, Giancarlo; Cree, Bruce Ac; Coyle, Patricia K; Hartung, Hans-Peter; Vermersch, Patrick; Damian, Doris; Dangond, Fernando
2017-01-01
Multiple sclerosis (MS) diagnostic criteria have changed since the ORACLE-MS study was conducted; 223 of 616 patients (36.2%) would have met the diagnosis of MS vs clinically isolated syndrome (CIS) using the newer criteria. The objective of this paper is to assess the effect of cladribine tablets in patients with a first clinical demyelinating attack fulfilling newer criteria (McDonald 2010) for MS vs CIS. A post hoc analysis for subgroups of patients retrospectively classified as fulfilling or not fulfilling newer criteria at the first clinical demyelinating attack was conducted. Cladribine tablets 3.5 mg/kg ( n = 68) reduced the risk of next attack or three-month confirmed Expanded Disability Status Scale (EDSS) worsening by 74% vs placebo ( n = 72); p = 0.0009 in patients meeting newer criteria for MS at baseline. Cladribine tablets 5.25 mg/kg ( n = 83) reduced the risk of next attack or three-month confirmed EDSS worsening by 37%, but nominal significance was not reached ( p = 0.14). In patients who were still CIS after applying newer criteria, cladribine tablets 3.5 mg/kg ( n = 138) reduced the risk of conversion to clinically definite multiple sclerosis (CDMS) by 63% vs placebo ( n = 134); p = 0.0003. Cladribine tablets 5.25 mg/kg ( n = 121) reduced the risk of conversion by 75% vs placebo ( n = 134); p < 0.0001. Regardless of the criteria used to define CIS or MS, 3.5 mg/kg cladribine tablets are effective in patients with a first clinical demyelinating attack. ClinicalTrials.gov registration: The ORACLE-MS study (NCT00725985).
Dangerous nutrients: evolution of phytoplankton resource uptake subject to virus attack.
Menge, Duncan N L; Weitz, Joshua S
2009-03-07
Phytoplankton need multiple resources to grow and reproduce (such as nitrogen, phosphorus, and iron), but the receptors through which they acquire resources are, in many cases, the same channels through which viruses attack. Therefore, phytoplankton can face a bottom-up vs. top-down tradeoff in receptor allocation: Optimize resource uptake or minimize virus attack? We investigate this top-down vs. bottom-up tradeoff using an evolutionary ecology model of multiple essential resources, specialist viruses that attack through the resource receptors, and a phytoplankton population that can evolve to alter the fraction of receptors used for each resource/virus type. Without viruses present the singular continuously stable strategy is to allocate receptors such that resources are co-limiting, which also minimizes the equilibrium concentrations of both resources. Only one virus type can be present at equilibrium (because phytoplankton, in this model, are a single resource for viruses), and when a virus type is present, it controls the equilibrium phytoplankton population size. Despite this top-down control on equilibrium densities, bottom-up control determines the evolutionary outcome. Regardless of which virus type is present, the allocation strategy that yields co-limitation between the two resources is continuously stable. This is true even when the virus type attacking through the limiting resource channel is present, even though selection for co-limitation in this case decreases the equilibrium phytoplankton population and does not decrease the equilibrium concentration of the limiting resource. Therefore, although moving toward co-limitation and decreasing the equilibrium concentration of the limiting resource often co-occur in models, it is co-limitation, and not necessarily the lowest equilibrium concentration of the limiting resource, that is the result of selection. This result adds to the growing body of literature suggesting that co-limitation at equilibrium is a winning strategy.
Notes on a Continuous-Variable Quantum Key Distribution Scheme
NASA Astrophysics Data System (ADS)
Ichikawa, Tsubasa; Hirano, Takuya; Matsubara, Takuto; Ono, Motoharu; Namiki, Ryo
2017-09-01
We develop a physical model to describe the signal transmission for a continuous-variable quantum key distribution scheme and investigate its security against a couple of eavesdropping attacks assuming that the eavesdropper's power is partly restricted owing to today's technological limitations. We consider an eavesdropper performing quantum optical homodyne measurement on the signal obtained by a type of beamsplitting attack. We also consider the case in which the eavesdropper Eve is unable to access a quantum memory and she performs heterodyne measurement on her signal without performing a delayed measurement. Our formulation includes a model in which the receiver's loss and noise are unaccessible by the eavesdropper. This setup enables us to investigate the condition that Eve uses a practical fiber differently from the usual beamsplitting attack where she can deploy a lossless transmission channel. The secret key rates are calculated in both the direct and reverse reconciliation scenarios.
DOT National Transportation Integrated Search
2017-02-01
Terrorists see transit and passenger rail as an attractive target. Designed for public convenience, trains and stations offer terrorists easy access to crowds of people in confined environments where there are minimal security risks and attacks can c...
A Comprehensive Review on Adaptability of Network Forensics Frameworks for Mobile Cloud Computing
Abdul Wahab, Ainuddin Wahid; Han, Qi; Bin Abdul Rahman, Zulkanain
2014-01-01
Network forensics enables investigation and identification of network attacks through the retrieved digital content. The proliferation of smartphones and the cost-effective universal data access through cloud has made Mobile Cloud Computing (MCC) a congenital target for network attacks. However, confines in carrying out forensics in MCC is interrelated with the autonomous cloud hosting companies and their policies for restricted access to the digital content in the back-end cloud platforms. It implies that existing Network Forensic Frameworks (NFFs) have limited impact in the MCC paradigm. To this end, we qualitatively analyze the adaptability of existing NFFs when applied to the MCC. Explicitly, the fundamental mechanisms of NFFs are highlighted and then analyzed using the most relevant parameters. A classification is proposed to help understand the anatomy of existing NFFs. Subsequently, a comparison is given that explores the functional similarities and deviations among NFFs. The paper concludes by discussing research challenges for progressive network forensics in MCC. PMID:25097880
A comprehensive review on adaptability of network forensics frameworks for mobile cloud computing.
Khan, Suleman; Shiraz, Muhammad; Wahab, Ainuddin Wahid Abdul; Gani, Abdullah; Han, Qi; Rahman, Zulkanain Bin Abdul
2014-01-01
Network forensics enables investigation and identification of network attacks through the retrieved digital content. The proliferation of smartphones and the cost-effective universal data access through cloud has made Mobile Cloud Computing (MCC) a congenital target for network attacks. However, confines in carrying out forensics in MCC is interrelated with the autonomous cloud hosting companies and their policies for restricted access to the digital content in the back-end cloud platforms. It implies that existing Network Forensic Frameworks (NFFs) have limited impact in the MCC paradigm. To this end, we qualitatively analyze the adaptability of existing NFFs when applied to the MCC. Explicitly, the fundamental mechanisms of NFFs are highlighted and then analyzed using the most relevant parameters. A classification is proposed to help understand the anatomy of existing NFFs. Subsequently, a comparison is given that explores the functional similarities and deviations among NFFs. The paper concludes by discussing research challenges for progressive network forensics in MCC.
NASA Technical Reports Server (NTRS)
Luckring, James M.; Rizzi, Arthur; Davis, M. Bruce
2014-01-01
A coordinated project has been underway to improve CFD predictions of slender airframe aerodynamics. The work is focused on two flow conditions and leverages a unique flight data set obtained with an F-16XL aircraft. These conditions, a low-speed high angleof- attack case and a transonic low angle-of-attack case, were selected from a prior prediction campaign wherein the CFD failed to provide acceptable results. In this paper the background, objectives and approach to the current project are presented. The work embodies predictions from multiple numerical formulations that are contributed from multiple organizations, and the context of this campaign to other multi-code, multiorganizational efforts is included. The relevance of this body of work toward future supersonic commercial transport concepts is also briefly addressed.
Naccarella, Lucio; Biuso, Catuscia; Jennings, Amanda; Patsamanis, Harry
2018-05-29
Evidence exists for the association between health literacy and heart health outcomes. Cardiac rehabilitation is critical for recovery from heart attack and reducing hospital readmissions. Despite this, <30% of people participate in a program. Significant patient, hospital and health system challenges exist to improve recovery through increased heart health literacy. This brief case study reflects and documents practice-based initiatives by Heart Foundation Victoria to improve access to recovery information for patients with low literacy levels. Three key initiatives, namely the Six Steps To Cardiac Recovery resource, the Love Your Heart book and the nurse ambassador program, were implemented informed by mixed methods that assessed need and capacity at the individual, organisational and systems levels. Key outcomes included increased access to recovery information for patients with low health literacy, nurse knowledge and confidence to engage with patients on recovery information, improved education of patients and improved availability and accessibility of information for patients in diverse formats. Given the challenges involved in addressing heart health literacy, multifaceted practice-based approaches are essential to improve access to recovery information for patients with low literacy levels. What is known about the topic? Significant challenges exist for patients with lower health literacy receiving recovery information after a heart attack in hospitals. What does this paper add? This case study provides insights into a practice-based initiative by Heart Foundation Victoria to improve access to recovery information for patients with low literacy levels. What are the implications for practitioners? Strategies to improve recovery through increased heart health literacy must address the needs of patients, nursing staff and the health system within hospitals. Such strategies need to be multifaceted and designed to build the capacity of nurses, heart patients and their carers, as well as support from hospital management.
Switching LPV Control for High Performance Tactical Aircraft
NASA Technical Reports Server (NTRS)
Lu, Bei; Wu, Fen; Kim, SungWan
2004-01-01
This paper examines a switching Linear Parameter-Varying (LPV) control approach to determine if it is practical to use for flight control designs within a wide angle of attack region. The approach is based on multiple parameter-dependent Lyapunov functions. The full parameter space is partitioned into overlapping subspaces and a family of LPV controllers are designed, each suitable for a specific parameter subspace. The hysteresis switching logic is used to accomplish the transition among different parameter subspaces. The proposed switching LPV control scheme is applied to an F-16 aircraft model with different actuator dynamics in low and high angle of attack regions. The nonlinear simulation results show that the aircraft performs well when switching among different angle of attack regions.
Time-marching transonic flutter solutions including angle-of-attack effects
NASA Technical Reports Server (NTRS)
Edwards, J. W.; Bennett, R. M.; Whitlow, W., Jr.; Seidel, D. A.
1982-01-01
Transonic aeroelastic solutions based upon the transonic small perturbation potential equation were studied. Time-marching transient solutions of plunging and pitching airfoils were analyzed using a complex exponential modal identification technique, and seven alternative integration techniques for the structural equations were evaluated. The HYTRAN2 code was used to determine transonic flutter boundaries versus Mach number and angle-of-attack for NACA 64A010 and MBB A-3 airfoils. In the code, a monotone differencing method, which eliminates leading edge expansion shocks, is used to solve the potential equation. When the effect of static pitching moment upon the angle-of-attack is included, the MBB A-3 airfoil can have multiple flutter speeds at a given Mach number.
A study of roll attractor and wing rock of delta wings at high angles of attack
NASA Technical Reports Server (NTRS)
Niranjana, T.; Rao, D. M.; Pamadi, Bandu N.
1993-01-01
Wing rock is a high angle of attack dynamic phenomenon of limited cycle motion predominantly in roll. The wing rock is one of the limitations to combat effectiveness of the fighter aircraft. Roll Attractor is the steady state or equilibrium trim angle (phi(sub trim)) attained by the free-to-roll model, held at some angle of attack, and released form rest at a given initial roll (bank) angle (phi(sub O)). Multiple roll attractors are attained at different trim angles depending on initial roll angle. The test facility (Vigyan's low speed wind tunnel) and experimental work is presented here along with mathematical modelling of roll attractor phenomenon and analysis and comparison of predictions with experimental data.
Miao, Yinbin; Ma, Jianfeng; Liu, Ximeng; Wei, Fushan; Liu, Zhiquan; Wang, Xu An
2016-11-01
Online personal health record (PHR) is more inclined to shift data storage and search operations to cloud server so as to enjoy the elastic resources and lessen computational burden in cloud storage. As multiple patients' data is always stored in the cloud server simultaneously, it is a challenge to guarantee the confidentiality of PHR data and allow data users to search encrypted data in an efficient and privacy-preserving way. To this end, we design a secure cryptographic primitive called as attribute-based multi-keyword search over encrypted personal health records in multi-owner setting to support both fine-grained access control and multi-keyword search via Ciphertext-Policy Attribute-Based Encryption. Formal security analysis proves our scheme is selectively secure against chosen-keyword attack. As a further contribution, we conduct empirical experiments over real-world dataset to show its feasibility and practicality in a broad range of actual scenarios without incurring additional computational burden.
Orrock, John L; Dutra, Humberto P; Marquis, Robert J; Barber, Nicholas
2015-04-01
Direct and indirect effects can play a key role in invasions, but experiments evaluating both are rare. We examined the roles of direct competition and apparent competition by exotic Amur honeysuckle (Lonicera maackii) by manipulating (1) L. maackii vegetation, (2) presence of L. maackii fruits, and (3) access to plants by small mammals and deer. Direct competition with L. maackii reduced the abundance and richness of native and exotic species, and native consumers significantly reduced the abundance and richness of native species. Although effects of direct competition and consumption were more pervasive, richness of native plants was also reduced through apparent competition, as small-mammal consumers reduced richness only when L. maackii fruits were present. Our experiment reveals the multiple, interactive pathways that affect the success and impact of an invasive exotic plant: exotic plants may directly benefit from reduced attack by native consumers, may directly exert strong competitive effects on native plants, and may also benefit from apparent competition.
A U.S. Biodefense Strategy Primer
DOE Office of Scientific and Technical Information (OSTI.GOV)
Poulin, D
2009-05-11
The anthrax mailings that followed the attacks of September 11, 2001 highlighted the need for a comprehensive national strategy to prevent, prepare for, respond to, and mitigate the effects of biological attacks. The goal of U.S. biodefense strategy is to reduce the likelihood of a future biological event, improve overall U.S. public health security, and minimize the economic and social disruption of a biological incident. Presidential communications, federal legislation, and executive agency planning documents provide the foundation for this strategy. Central to current U.S. biodefense strategy is the 2004 Homeland Security Presidential Directive (HSPD) 10, Biodefense for the 21st Century,more » which states that ''the United States will use all means necessary to prevent, protect against, and mitigate biological weapons attacks perpetrated against our homeland and our global interests.'' HSPD-10 also sets forth four pillars of U.S. biodefense: {sm_bullet} Threat awareness includes timely, accurate, and relevant intelligence, threat assessment, and the anticipation of future threats. {sm_bullet} Prevention and protection involve continuing and expanding efforts to limit access to agents, technologies, and knowledge to certain groups and countries as well as protecting critical infrastructure from the effects of biological attacks. {sm_bullet} Surveillance and detection provide early warning or recognition of biological attacks to permit a timely response and mitigation of consequences as well as attribution. {sm_bullet} Response and recovery include pre-attack planning and preparedness, capabilities to treat casualties, risk communications, physical control measures, medical countermeasures, and decontamination capabilities.« less
Automatic analysis of attack data from distributed honeypot network
NASA Astrophysics Data System (ADS)
Safarik, Jakub; Voznak, MIroslav; Rezac, Filip; Partila, Pavol; Tomala, Karel
2013-05-01
There are many ways of getting real data about malicious activity in a network. One of them relies on masquerading monitoring servers as a production one. These servers are called honeypots and data about attacks on them brings us valuable information about actual attacks and techniques used by hackers. The article describes distributed topology of honeypots, which was developed with a strong orientation on monitoring of IP telephony traffic. IP telephony servers can be easily exposed to various types of attacks, and without protection, this situation can lead to loss of money and other unpleasant consequences. Using a distributed topology with honeypots placed in different geological locations and networks provides more valuable and independent results. With automatic system of gathering information from all honeypots, it is possible to work with all information on one centralized point. Communication between honeypots and centralized data store use secure SSH tunnels and server communicates only with authorized honeypots. The centralized server also automatically analyses data from each honeypot. Results of this analysis and also other statistical data about malicious activity are simply accessible through a built-in web server. All statistical and analysis reports serve as information basis for an algorithm which classifies different types of used VoIP attacks. The web interface then brings a tool for quick comparison and evaluation of actual attacks in all monitored networks. The article describes both, the honeypots nodes in distributed architecture, which monitor suspicious activity, and also methods and algorithms used on the server side for analysis of gathered data.
Overview of Sparse Graph for Multiple Access in Future Mobile Networks
NASA Astrophysics Data System (ADS)
Lei, Jing; Li, Baoguo; Li, Erbao; Gong, Zhenghui
2017-10-01
Multiple access via sparse graph, such as low density signature (LDS) and sparse code multiple access (SCMA), is a promising technique for future wireless communications. This survey presents an overview of the developments in this burgeoning field, including transmitter structures, extrinsic information transform (EXIT) chart analysis and comparisons with existing multiple access techniques. Such technique enables multiple access under overloaded conditions to achieve a satisfactory performance. Message passing algorithm is utilized for multi-user detection in the receiver, and structures of the sparse graph are illustrated in detail. Outlooks and challenges of this technique are also presented.
Gaul, C; Christmann, N; Schröder, D; Weber, R; Shanib, H; Diener, H C; Holle, D
2012-05-01
Data on clinical differences between episodic (eCH) and chronic cluster headache (cCH) and accompanying migraine features are limited. History and clinical features of 209 consecutive cluster headache patients (144 eCH, 65 cCH; male:female ratio 3.4 : 1) were obtained in a tertiary headache centre by face-to-face interviews. Relationship between occurrence of accompanying symptoms, pain intensity, comorbid migraine, and circannual and circadian rhythmicity was analysed. 99.5% of patients reported a minimum of one ipsilateral cranial autonomic symptom (CAS); 80% showed at least three CAS. A seasonal rhythmicity was observed in both eCH and cCH. A comorbid headache disorder occurred in 25%. No significant difference was detected between patients with comorbid migraine and without regarding occurrence of phonophobia, photophobia or nausea during cluster attacks. Patients with comorbid migraine reported allodynia significantly (p = 0.022) more often during cluster attacks than patients without comorbid migraine. Occurrence of CAS and attack frequency, as well as periodic patterns of attacks, are relatively uniform in eCH and cCH. Multiple CAS are not related to pain intensity. Allodynia during cluster attacks is a frequent symptom. The unexpectedly high rate of accompanying migrainous features during cluster attacks cannot be explained by comorbid migraine.
2007 Precision Strike Annual Programs Review
2007-04-25
Adapting our methods • Remaining a flexible combined-arms force • Enabling a generation of combat- experienced decision-makers by distributing...Sustain Propulsion Network RadioMEMS IMU Flexible Engagement Options Requirements Capabilities Precision Attack Missile (PAM) 67” (with Canister...Aimpoint 6 PAM Seeker Modes PAM’s Multiple Targeting Modes Increase Flexibility , Improve Lethality PAM’s Multiple Targeting Modes Increase Flexibility
Data security issues arising from integration of wireless access into healthcare networks.
Frenzel, John C
2003-04-01
The versatility of having Ethernet speed connectivity without wires is rapidly driving adoption of wireless data networking by end users across all types of industry. Designed to be easy to configure and work among diverse platforms, wireless brings online data to mobile users. This functionality is particularly useful in modern clinical medicine. Wireless presents operators of networks containing or transmitting sensitive and confidential data with several new types of security vulnerabilities, and potentially opens previously protected core network resources to outside attack. Herein, we review the types of vulnerabilities, the tools necessary to exploit them, and strategies to thwart a successful attack.
A hash based mutual RFID tag authentication protocol in telecare medicine information system.
Srivastava, Keerti; Awasthi, Amit K; Kaul, Sonam D; Mittal, R C
2015-01-01
Radio Frequency Identification (RFID) is a technology which has multidimensional applications to reduce the complexity of today life. Everywhere, like access control, transportation, real-time inventory, asset management and automated payment systems etc., RFID has its enormous use. Recently, this technology is opening its wings in healthcare environments, where potential applications include patient monitoring, object traceability and drug administration systems etc. In this paper, we propose a secure RFID-based protocol for the medical sector. This protocol is based on hash operation with synchronized secret. The protocol is safe against active and passive attacks such as forgery, traceability, replay and de-synchronization attack.
Zakerolhosseini, Ali; Sokouti, Massoud; Pezeshkian, Massoud
2013-01-01
Quick responds to heart attack patients before arriving to hospital is a very important factor. In this paper, a combined model of Body Sensor Network and Personal Digital Access using QTRU cipher algorithm in Wifi networks is presented to efficiently overcome these life threatening attacks. The algorithm for optimizing the routing paths between sensor nodes and an algorithm for reducing the power consumption are also applied for achieving the best performance by this model. This system is consumes low power and has encrypting and decrypting processes. It also has an efficient routing path in a fast manner.
Zakerolhosseini, Ali; Sokouti, Massoud; Pezeshkian, Massoud
2013-01-01
Quick responds to heart attack patients before arriving to hospital is a very important factor. In this paper, a combined model of Body Sensor Network and Personal Digital Access using QTRU cipher algorithm in Wifi networks is presented to efficiently overcome these life threatening attacks. The algorithm for optimizing the routing paths between sensor nodes and an algorithm for reducing the power consumption are also applied for achieving the best performance by this model. This system is consumes low power and has encrypting and decrypting processes. It also has an efficient routing path in a fast manner. PMID:24252988
33 CFR 106.305 - Facility Security Assessment (FSA) requirements.
Code of Federal Regulations, 2010 CFR
2010-07-01
... available to maintain essential services; (vi) The essential maintenance equipment and storage areas; (vii... procedures relating to essential services; (v) Measures to protect radio and telecommunication equipment... property, or economic disruption, of an attack on or at the OCS facility; and (7) Locations where access...
Seaport Protection Against chemical and Biological Attacks
2009-06-01
Breaux, MAJ, USA B.A., Bowling Green State University, Bowling Green, Ohio, 1991 M.A., Texas A& M , Commerce, Texas, 2001 Fort... Crichton . ―The Ships that Died of Shame.‖ Fairfax Digital (2003). http://www.smh.com.au/articles/2003/01/13/1041990234498.html (accessed June 21
Canada in Afghanistan: 2001-2010. A Military Chronology
2010-12-01
allies provided air support around Panjwai – fighters, bombers, attack helicopters, unmanned drones and even spy planes.240 • Objective Rugbythe White...accessed at http://www.nationalpost.com/news/story.html?id=1138920 on 22 February 2010; Armstrong, Jane; Bill Curry ; Graeme Smith, “Soldier’s
Access Scheme for Controlling Mobile Agents and its Application to Share Medical Information.
Liao, Yu-Ting; Chen, Tzer-Shyong; Chen, Tzer-Long; Chung, Yu-Fang; Chen, Yu- Xin; Hwang, Jen-Hung; Wang, Huihui; Wei, Wei
2016-05-01
This study is showing the advantage of mobile agents to conquer heterogeneous system environments and contribute to a virtual integrated sharing system. Mobile agents will collect medical information from each medical institution as a method to achieve the medical purpose of data sharing. Besides, this research also provides an access control and key management mechanism by adopting Public key cryptography and Lagrange interpolation. The safety analysis of the system is based on a network attacker's perspective. The achievement of this study tries to improve the medical quality, prevent wasting medical resources and make medical resources access to appropriate configuration.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Al-Odwani, A.; Carew, J.; Al-Hashem, A.
1999-11-01
The crevice corrosion tests were performed on UNS S31603, UNS S31703, UNS S31726, UNS S31254, UNS N08904, UNS N625, UNS N825 and UNS N276 was investigated in seawater and neutral brine solution using a multiple crevice washer assembly. PTFE multiple-crevice washers were bolted to both sides of the test specimens with PTFE bolts and nuts. The specimens were exposed to seawater flowing at a rate of 100 L/h for periods of 3,000 h and 6,000 h. Duplicate specimens were immersed in a plexiglass cell containing the flowing seawater at a temperature of 30 C. The results showed that all themore » tested coupons were susceptible to some degree of crevice corrosion attack. However, the stainless steels were the most severely affected. The degree of crevice corrosion attack for the nickel base alloys decreased as the percentage of molybdenum content in the alloys increased. Destruction of the passive layer by the concentration of chloride or acidity and reduction of hydrogen ions at the crevices is believed to be the cause of the crevice attack.« less
A Mutual Authentication Framework for Wireless Medical Sensor Networks.
Srinivas, Jangirala; Mishra, Dheerendra; Mukhopadhyay, Sourav
2017-05-01
Wireless medical sensor networks (WMSN) comprise of distributed sensors, which can sense human physiological signs and monitor the health condition of the patient. It is observed that providing privacy to the patient's data is an important issue and can be challenging. The information passing is done via the public channel in WMSN. Thus, the patient, sensitive information can be obtained by eavesdropping or by unauthorized use of handheld devices which the health professionals use in monitoring the patient. Therefore, there is an essential need of restricting the unauthorized access to the patient's medical information. Hence, the efficient authentication scheme for the healthcare applications is needed to preserve the privacy of the patients' vital signs. To ensure secure and authorized communication in WMSN, we design a symmetric key based authentication protocol for WMSN environment. The proposed protocol uses only computationally efficient operations to achieve lightweight attribute. We analyze the security of the proposed protocol. We use a formal security proof algorithm to show the scheme security against known attacks. We also use the Automated Validation of Internet Security Protocols and Applications (AVISPA) simulator to show protocol secure against man-in-the-middle attack and replay attack. Additionally, we adopt an informal analysis to discuss the key attributes of the proposed scheme. From the formal proof of security, we can see that an attacker has a negligible probability of breaking the protocol security. AVISPA simulator also demonstrates the proposed scheme security against active attacks, namely, man-in-the-middle attack and replay attack. Additionally, through the comparison of computational efficiency and security attributes with several recent results, proposed scheme seems to be battered.
Hung, Le Xuan; Canh, Ngo Trong; Lee, Sungyoung; Lee, Young-Koo; Lee, Heejo
2008-01-01
For many sensor network applications such as military or homeland security, it is essential for users (sinks) to access the sensor network while they are moving. Sink mobility brings new challenges to secure routing in large-scale sensor networks. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. Also, studies and experiences have shown that considering security during design time is the best way to provide security for sensor network routing. This paper presents an energy-efficient secure routing and key management for mobile sinks in sensor networks, called SCODEplus. It is a significant extension of our previous study in five aspects: (1) Key management scheme and routing protocol are considered during design time to increase security and efficiency; (2) The network topology is organized in a hexagonal plane which supports more efficiency than previous square-grid topology; (3) The key management scheme can eliminate the impacts of node compromise attacks on links between non-compromised nodes; (4) Sensor node deployment is based on Gaussian distribution which is more realistic than uniform distribution; (5) No GPS or like is required to provide sensor node location information. Our security analysis demonstrates that the proposed scheme can defend against common attacks in sensor networks including node compromise attacks, replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Both mathematical and simulation-based performance evaluation show that the SCODEplus significantly reduces the communication overhead, energy consumption, packet delivery latency while it always delivers more than 97 percent of packets successfully. PMID:27873956
Hung, Le Xuan; Canh, Ngo Trong; Lee, Sungyoung; Lee, Young-Koo; Lee, Heejo
2008-12-03
For many sensor network applications such as military or homeland security, it is essential for users (sinks) to access the sensor network while they are moving. Sink mobility brings new challenges to secure routing in large-scale sensor networks. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. Also, studies and experiences have shown that considering security during design time is the best way to provide security for sensor network routing. This paper presents an energy-efficient secure routing and key management for mobile sinks in sensor networks, called SCODE plus . It is a significant extension of our previous study in five aspects: (1) Key management scheme and routing protocol are considered during design time to increase security and efficiency; (2) The network topology is organized in a hexagonal plane which supports more efficiency than previous square-grid topology; (3) The key management scheme can eliminate the impacts of node compromise attacks on links between non-compromised nodes; (4) Sensor node deployment is based on Gaussian distribution which is more realistic than uniform distribution; (5) No GPS or like is required to provide sensor node location information. Our security analysis demonstrates that the proposed scheme can defend against common attacks in sensor networks including node compromise attacks, replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Both mathematical and simulation-based performance evaluation show that the SCODE plus significantly reduces the communication overhead, energy consumption, packet delivery latency while it always delivers more than 97 percent of packets successfully.
ERIC Educational Resources Information Center
Chronicle of Higher Education, 2006
2006-01-01
An excerpt from the opening piece in "Everything That Rises: A Book of Convergences" by Lawrence Weschler is presented where the author is talking with Joel Meyerowitz, the only photographer granted unimpeded access to the clean-up operations at ground zero after the terrorist attacks of September 11, 2001. The two discuss the parallels…
Verification and Trust: Background Investigations Preceding Faculty Appointment
ERIC Educational Resources Information Center
Finkin, Matthew W.; Post, Robert C.; Thomson, Judith J.
2004-01-01
Many employers in the United States have responded to the terrorist attacks of September 11, 2001, by initiating or expanding policies requiring background checks of prospective employees. Their ability to perform such checks has been abetted by the growth of computerized databases and of commercial enterprises that facilitate access to personal…
Toward Improved Predictions of Slender Airframe Aerodynamics Using the F-16XL Aircraft
NASA Technical Reports Server (NTRS)
Luckring, James M.; Rizzi, Arthur; Davis, M. Bruce
2016-01-01
A coordinated project has been underway to improve computational fluid dynamics predictions of slender airframe aerodynamics. The work is focused on two flow conditions and leverages a unique flight data set obtained with an F-16XL aircraft. These conditions, a low-speed high angle-of-attack case and a transonic low angle-of-attack case, were selected from a prior prediction campaign wherein the computational fluid dynamics failed to provide acceptable results. In this paper, the background, objectives, and approach to the current project are presented. The work embodies predictions from multiple numerical formulations that are contributed from multiple organizations, and the context of this campaign to other multicode, multi-organizational efforts is included. The relevance of this body of work toward future supersonic commercial transport concepts is also briefly addressed.
Review of attacks on health care facilities in six conflicts of the past three decades.
Briody, Carolyn; Rubenstein, Leonard; Roberts, Les; Penney, Eamon; Keenan, William; Horbar, Jeffrey
2018-01-01
In the ongoing conflicts of Syria and Yemen, there have been widespread reports of attacks on health care facilities and personnel. Tabulated evidence does suggest hospital bombings in Syria and Yemen are far higher than reported in other conflicts but it is unclear if this is a reporting artefact. This article examines attacks on health care facilities in conflicts in six middle- to high- income countries that have occurred over the past three decades to try and determine if attacks have become more common, and to assess the different methods used to collect data on attacks. The six conflicts reviewed are Yemen (2015-Present), Syria (2011- Present), Iraq (2003-2011), Chechnya (1999-2000), Kosovo (1998-1999), and Bosnia and Herzegovina (1992-1995). We attempted to get the highest quality source(s) with summary data of the number of facilities attacked for each of the conflicts. The only conflict that did not have summary data was the conflict in Iraq. In this case, we tallied individual reported events of attacks on health care. Physicians for Human Rights (PHR) reported attacks on 315 facilities (4.38 per month) in Syria over a 7-year period, while the Monitoring Violence against Health Care (MVH) tool launched later by the World Health Organization (WHO) Turkey Health Cluster reported attacks on 135 facilities (9.64 per month) over a 14-month period. Yemen had a reported 93 attacks (4.65 per month), Iraq 12 (0.12 per month), Chechnya > 24 (2.4 per month), Kosovo > 100 (6.67 per month), and Bosnia 21 (0.41 per month). Methodologies to collect data, and definitions of both facilities and attacks varied widely across sources. The number of reported facilities attacked is by far the greatest in Syria, suggesting that this phenomenon has increased compared to earlier conflicts. However, data on attacks of facilities was incomplete for all of the conflicts examined, methodologies varied widely, and in some cases, attacks were not defined at all. A global, standardized system that allows multiple reporting routes with different levels of confirmation, as seen in Syria, would likely allow for a more reliable and reproducible documentation system, and potentially, an increase in accountability.
Hypergame theory applied to cyber attack and defense
NASA Astrophysics Data System (ADS)
House, James Thomas; Cybenko, George
2010-04-01
This work concerns cyber attack and defense in the context of game theory--specifically hypergame theory. Hypergame theory extends classical game theory with the ability to deal with differences in players' expertise, differences in their understanding of game rules, misperceptions, and so forth. Each of these different sub-scenarios, or subgames, is associated with a probability--representing the likelihood that the given subgame is truly "in play" at a given moment. In order to form an optimal attack or defense policy, these probabilities must be learned if they're not known a-priori. We present hidden Markov model and maximum entropy approaches for accurately learning these probabilities through multiple iterations of both normal and modified game play. We also give a widely-applicable approach for the analysis of cases where an opponent is aware that he is being studied, and intentionally plays to spoil the process of learning and thereby obfuscate his attributes. These are considered in the context of a generic, abstract cyber attack example. We demonstrate that machine learning efficacy can be heavily dependent on the goals and styles of participant behavior. To this end detailed simulation results under various combinations of attacker and defender behaviors are presented and analyzed.
Unique fatality due to claw injuries in a tiger attack: a case report.
Pathak, Hrishikesh; Dixit, Pradeep; Dhawane, Shailendra; Meshram, Satin; Shrigiriwar, Manish; Dingre, Niraj
2014-11-01
This paper describes a unique case of a fatal tiger attack in the wild. In the present case, a tiger fatally mauled a 34-year-old female with its claws, instead of the usual mechanism of killing by the bite injury to the neck. The autopsy revealed multiple fatal and non-fatal injuries caused by the tiger claws. The characteristic injuries due to the tooth impacts were absent as the teeth of the offending tiger were either fallen or non-functional. To the best of our knowledge, probably this rare case would be the first reported human fatality due to the tiger claw injuries in the world. The purpose of the present article is to highlight the fatal injuries due to the tiger claws, as the claw-induced fatal injuries in a tiger attack are not reported in the medico-legal literature. Moreover, this report would be an illustrative one for differentiation between the fatal injuries due to the claws and tooth impacts in a tiger attack. Furthermore, the present report establishes the importance of the tiger claws as a source of fatal injuries in a tiger attack. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.
Solving Multiple Isolated, Interleaved, and Blended Tasks through Modular Neuroevolution.
Schrum, Jacob; Miikkulainen, Risto
2016-01-01
Many challenging sequential decision-making problems require agents to master multiple tasks. For instance, game agents may need to gather resources, attack opponents, and defend against attacks. Learning algorithms can thus benefit from having separate policies for these tasks, and from knowing when each one is appropriate. How well this approach works depends on how tightly coupled the tasks are. Three cases are identified: Isolated tasks have distinct semantics and do not interact, interleaved tasks have distinct semantics but do interact, and blended tasks have regions where semantics from multiple tasks overlap. Learning across multiple tasks is studied in this article with Modular Multiobjective NEAT, a neuroevolution framework applied to three variants of the challenging Ms. Pac-Man video game. In the standard blended version of the game, a surprising, highly effective machine-discovered task division surpasses human-specified divisions, achieving the best scores to date in this game. In isolated and interleaved versions of the game, human-specified task divisions are also successful, though the best scores are surprisingly still achieved by machine discovery. Modular neuroevolution is thus shown to be capable of finding useful, unexpected task divisions better than those apparent to a human designer.
Toward Exposing Timing-Based Probing Attacks in Web Applications †
Mao, Jian; Chen, Yue; Shi, Futian; Jia, Yaoqi; Liang, Zhenkai
2017-01-01
Web applications have become the foundation of many types of systems, ranging from cloud services to Internet of Things (IoT) systems. Due to the large amount of sensitive data processed by web applications, user privacy emerges as a major concern in web security. Existing protection mechanisms in modern browsers, e.g., the same origin policy, prevent the users’ browsing information on one website from being directly accessed by another website. However, web applications executed in the same browser share the same runtime environment. Such shared states provide side channels for malicious websites to indirectly figure out the information of other origins. Timing is a classic side channel and the root cause of many recent attacks, which rely on the variations in the time taken by the systems to process different inputs. In this paper, we propose an approach to expose the timing-based probing attacks in web applications. It monitors the browser behaviors and identifies anomalous timing behaviors to detect browser probing attacks. We have prototyped our system in the Google Chrome browser and evaluated the effectiveness of our approach by using known probing techniques. We have applied our approach on a large number of top Alexa sites and reported the suspicious behavior patterns with corresponding analysis results. Our theoretical analysis illustrates that the effectiveness of the timing-based probing attacks is dramatically limited by our approach. PMID:28245610
Toward Exposing Timing-Based Probing Attacks in Web Applications.
Mao, Jian; Chen, Yue; Shi, Futian; Jia, Yaoqi; Liang, Zhenkai
2017-02-25
Web applications have become the foundation of many types of systems, ranging from cloud services to Internet of Things (IoT) systems. Due to the large amount of sensitive data processed by web applications, user privacy emerges as a major concern in web security. Existing protection mechanisms in modern browsers, e.g., the same origin policy, prevent the users' browsing information on one website from being directly accessed by another website. However, web applications executed in the same browser share the same runtime environment. Such shared states provide side channels for malicious websites to indirectly figure out the information of other origins. Timing is a classic side channel and the root cause of many recent attacks, which rely on the variations in the time taken by the systems to process different inputs. In this paper, we propose an approach to expose the timing-based probing attacks in web applications. It monitors the browser behaviors and identifies anomalous timing behaviors to detect browser probing attacks. We have prototyped our system in the Google Chrome browser and evaluated the effectiveness of our approach by using known probing techniques. We have applied our approach on a large number of top Alexa sites and reported the suspicious behavior patterns with corresponding analysis results. Our theoretical analysis illustrates that the effectiveness of the timing-based probing attacks is dramatically limited by our approach.
General immunity and superadditivity of two-way Gaussian quantum cryptography.
Ottaviani, Carlo; Pirandola, Stefano
2016-03-01
We consider two-way continuous-variable quantum key distribution, studying its security against general eavesdropping strategies. Assuming the asymptotic limit of many signals exchanged, we prove that two-way Gaussian protocols are immune to coherent attacks. More precisely we show the general superadditivity of the two-way security thresholds, which are proven to be higher than the corresponding one-way counterparts in all cases. We perform the security analysis first reducing the general eavesdropping to a two-mode coherent Gaussian attack, and then showing that the superadditivity is achieved by exploiting the random on/off switching of the two-way quantum communication. This allows the parties to choose the appropriate communication instances to prepare the key, accordingly to the tomography of the quantum channel. The random opening and closing of the circuit represents, in fact, an additional degree of freedom allowing the parties to convert, a posteriori, the two-mode correlations of the eavesdropping into noise. The eavesdropper is assumed to have no access to the on/off switching and, indeed, cannot adapt her attack. We explicitly prove that this mechanism enhances the security performance, no matter if the eavesdropper performs collective or coherent attacks.
General immunity and superadditivity of two-way Gaussian quantum cryptography
Ottaviani, Carlo; Pirandola, Stefano
2016-01-01
We consider two-way continuous-variable quantum key distribution, studying its security against general eavesdropping strategies. Assuming the asymptotic limit of many signals exchanged, we prove that two-way Gaussian protocols are immune to coherent attacks. More precisely we show the general superadditivity of the two-way security thresholds, which are proven to be higher than the corresponding one-way counterparts in all cases. We perform the security analysis first reducing the general eavesdropping to a two-mode coherent Gaussian attack, and then showing that the superadditivity is achieved by exploiting the random on/off switching of the two-way quantum communication. This allows the parties to choose the appropriate communication instances to prepare the key, accordingly to the tomography of the quantum channel. The random opening and closing of the circuit represents, in fact, an additional degree of freedom allowing the parties to convert, a posteriori, the two-mode correlations of the eavesdropping into noise. The eavesdropper is assumed to have no access to the on/off switching and, indeed, cannot adapt her attack. We explicitly prove that this mechanism enhances the security performance, no matter if the eavesdropper performs collective or coherent attacks. PMID:26928053
Secure method for biometric-based recognition with integrated cryptographic functions.
Chiou, Shin-Yan
2013-01-01
Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied.
Mapping and detecting bark beetle-caused tree mortality in the western United States
NASA Astrophysics Data System (ADS)
Meddens, Arjan J. H.
Recently, insect outbreaks across North America have dramatically increased and the forest area affected by bark beetles is similar to that affected by fire. Remote sensing offers the potential to detect insect outbreaks with high accuracy. Chapter one involved detection of insect-caused tree mortality on the tree level for a 90km2 area in northcentral Colorado. Classes of interest included green trees, multiple stages of post-insect attack tree mortality including dead trees with red needles ("red-attack") and dead trees without needles ("gray-attack"), and non-forest. The results illustrated that classification of an image with a spatial resolution similar to the area of a tree crown outperformed that from finer and coarser resolution imagery for mapping tree mortality and non-forest classes. I also demonstrated that multispectral imagery could be used to separate multiple postoutbreak attack stages (i.e., red-attack and gray-attack) from other classes in the image. In Chapter 2, I compared and improved methods for detecting bark beetle-caused tree mortality using medium-resolution satellite data. I found that overall classification accuracy was similar between single-date and multi-date classification methods. I developed regression models to predict percent red attack within a 30-m grid cell and these models explained >75% of the variance using three Landsat spectral explanatory variables. Results of the final product showed that approximately 24% of the forest within the Landsat scene was comprised of tree mortality caused by bark beetles. In Chapter 3, I developed a gridded data set with 1-km2 resolution using aerial survey data and improved estimates of tree mortality across the western US and British Columbia. In the US, I also produced an upper estimate by forcing the mortality area to match that from high-resolution imagery in Idaho, Colorado, and New Mexico. Cumulative mortality area from all bark beetles was 5.46 Mha in British Columbia in 2001-2010 and 0.47-5.37 Mha (lower and upper estimate) in the western conterminous US during 1997-2010. Improved methods for detection and mapping of insect outbreak areas will lead to improved assessments of the effects of these forest disturbances on the economy, carbon cycle (and feedback to climate change), fuel loads, hydrology and forest ecology.
Effect of noninvasive vagus nerve stimulation on acute migraine: an open-label pilot study.
Goadsby, P J; Grosberg, B M; Mauskop, A; Cady, R; Simmons, K A
2014-10-01
We sought to assess a novel, noninvasive, portable vagal nerve stimulator (nVNS) for acute treatment of migraine. Participants with migraine with or without aura were eligible for an open-label, single-arm, multiple-attack study. Up to four migraine attacks were treated with two 90-second doses, at 15-minute intervals delivered to the right cervical branch of the vagus nerve within a six-week time period. Subjects were asked to self-treat at moderate or severe pain, or after 20 minutes of mild pain. Of 30 enrolled patients (25 females, five males, median age 39), two treated no attacks, and one treated aura only, leaving a Full Analysis Set of 27 treating 80 attacks with pain. An adverse event was reported in 13 patients, notably: neck twitching (n = 1), raspy voice (n = 1) and redness at the device site (n = 1). No unanticipated, serious or severe adverse events were reported. The pain-free rate at two hours was four of 19 (21%) for the first treated attack with a moderate or severe headache at baseline. For all moderate or severe attacks at baseline, the pain-free rate was 12/54 (22%). nVNS may be an effective and well-tolerated acute treatment for migraine in certain patients. © International Headache Society 2014 Reprints and permissions: sagepub.co.uk/journalsPermissions.nav.
Hofman, Zonne L M; Relan, Anurag; Zeerleder, Sacha; Drouet, Christian; Zuraw, Bruce; Hack, C Erik
2016-08-01
Hereditary angioedema (HAE) caused by a deficiency of functional C1-inhibitor (C1INH) becomes clinically manifest as attacks of angioedema. C1INH is the main inhibitor of the contact system. Poor control of a local activation process of this system at the site of the attack is believed to lead to the formation of bradykinin (BK), which increases local vasopermeability and mediates angioedema on interaction with BK receptor 2 on the endothelium. However, several observations in patients with HAE are difficult to explain from a pathogenic model claiming a local activation process at the site of the angioedema attack. Therefore we postulate an alternative model for angioedema attacks in patients with HAE, which assumes a systemic, fluid-phase activation of the contact system to generate BK and its breakdown products. Interaction of these peptides with endothelial receptors that are locally expressed in the affected tissues rather than with receptors constitutively expressed by the endothelium throughout the whole body explains that such a systemic activation process results in local manifestations of an attack. In particular, BK receptor 1, which is induced on the endothelium by inflammatory stimuli, such as kinins and cytokines, meets the specifications of the involved receptor. The pathogenic model discussed here also provides an explanation for why angioedema can occur at multiple sites during an attack and why HAE attacks respond well to modest increases of circulating C1INH activity levels because inhibition of fluid-phase Factor XIIa and kallikrein requires lower C1INH levels than inhibition of activator-bound factors. Copyright © 2016 American Academy of Allergy, Asthma & Immunology. Published by Elsevier Inc. All rights reserved.
A Mathematical Framework for the Analysis of Cyber-Resilient Control Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Melin, Alexander M; Ferragut, Erik M; Laska, Jason A
2013-01-01
The increasingly recognized vulnerability of industrial control systems to cyber-attacks has inspired a considerable amount of research into techniques for cyber-resilient control systems. The majority of this effort involves the application of well known information security (IT) techniques to control system networks. While these efforts are important to protect the control systems that operate critical infrastructure, they are never perfectly effective. Little research has focused on the design of closed-loop dynamics that are resilient to cyber-attack. The majority of control system protection measures are concerned with how to prevent unauthorized access and protect data integrity. We believe that the abilitymore » to analyze how an attacker can effect the closed loop dynamics of a control system configuration once they have access is just as important to the overall security of a control system. To begin to analyze this problem, consistent mathematical definitions of concepts within resilient control need to be established so that a mathematical analysis of the vulnerabilities and resiliencies of a particular control system design methodology and configuration can be made. In this paper, we propose rigorous definitions for state awareness, operational normalcy, and resiliency as they relate to control systems. We will also discuss some mathematical consequences that arise from the proposed definitions. The goal is to begin to develop a mathematical framework and testable conditions for resiliency that can be used to build a sound theoretical foundation for resilient control research.« less
A secure biometrics-based authentication scheme for telecare medicine information systems.
Yan, Xiaopeng; Li, Weiheng; Li, Ping; Wang, Jiantao; Hao, Xinhong; Gong, Peng
2013-10-01
The telecare medicine information system (TMIS) allows patients and doctors to access medical services or medical information at remote sites. Therefore, it could bring us very big convenient. To safeguard patients' privacy, authentication schemes for the TMIS attracted wide attention. Recently, Tan proposed an efficient biometrics-based authentication scheme for the TMIS and claimed their scheme could withstand various attacks. However, in this paper, we point out that Tan's scheme is vulnerable to the Denial-of-Service attack. To enhance security, we also propose an improved scheme based on Tan's work. Security and performance analysis shows our scheme not only could overcome weakness in Tan's scheme but also has better performance.
Risko, Casey B.; Rayes, Diana; Albaik, Ahmad; Alnajar, Mohammed; Kewara, Mazen; Baker, Elise; Rubenstein, Leonard S.
2018-01-01
Background Violent attacks on and interferences with hospitals, ambulances, health workers, and patients during conflict destroy vital health services during a time when they are most needed and undermine the long-term capacity of the health system. In Syria, such attacks have been frequent and intense and represent grave violations of the Geneva Conventions, but the number reported has varied considerably. A systematic mechanism to document these attacks could assist in designing more protection strategies and play a critical role in influencing policy, promoting justice, and addressing the health needs of the population. Methods and findings We developed a mobile data collection questionnaire to collect data on incidents of attacks on healthcare directly from the field. Data collectors from the Syrian American Medical Society (SAMS), using the tool or a text messaging system, recorded information on incidents across four of Syria’s northern governorates (Aleppo, Idleb, Hama, and Homs) from January 1, 2016, to December 31, 2016. SAMS recorded a total of 200 attacks on healthcare in 2016, 102 of them using the mobile data collection tool. Direct attacks on health facilities comprised the majority of attacks recorded (88.0%; n = 176). One hundred and twelve healthcare staff and 185 patients were killed in these incidents. Thirty-five percent of the facilities were attacked more than once over the data collection period; hospitals were significantly more likely to be attacked more than once compared to clinics and other types of healthcare facilities. Aerial bombs were used in the overwhelming majority of cases (91.5%). We also compared the SAMS data to a separate database developed by Physicians for Human Rights (PHR) based on media reports and matched the incidents to compare the results from the two methods (this analysis was limited to incidents at health facilities). Among 90 relevant incidents verified by PHR and 177 by SAMS, there were 60 that could be matched to each other, highlighting the differences in results from the two methods. This study is limited by the complexities of data collection in a conflict setting, only partial use of the standardized reporting tool, and the fact that limited accessibility of some health facilities and workers and may be biased towards the reporting of attacks on larger or more visible health facilities. Conclusions The use of field data collectors and use of consistent definitions can play an important role in the tracking incidents of attacks on health services. A mobile systematic data collection tool can complement other methods for tracking incidents of attacks on healthcare and ensure the collection of detailed information about each attack that may assist in better advocacy, programs, and accountability but can be practically challenging. Comparing attacks between SAMS and PHR suggests that there may have been significantly more attacks than previously captured by any one methodology. This scale of attacks suggests that targeting of healthcare in Syria is systematic and highlights the failure of condemnation by the international community and medical groups working in Syria of such attacks to stop them. PMID:29689085
Cone, James E; Li, Jiehui; Kornblith, Erica; Gocheva, Vihra; Stellman, Steven D; Shaikh, Annum; Schwarzer, Ralf; Bowler, Rosemarie M
2015-05-01
Police enrolled in the World Trade Center Health Registry (WTCHR) demonstrated increased probable posttraumatic stress disorder (PTSD) after the terrorist attack of 9/11/2001. Police enrollees without pre-9/11 PTSD were studied. Probable PTSD was assessed by Posttraumatic Stress Check List (PCL). Risk factors for chronic, new onset or resolved PTSD were assessed using multinomial logistic regression. Half of police with probable PTSD in 2003-2007 continued to have probable PTSD in 2011-2012. Women had higher prevalence of PTSD than men (15.5% vs. 10.3%, P = 0.008). Risk factors for chronic PTSD included decreased social support, unemployment, 2+ life stressors in last 12 months, 2+ life-threatening events since 9/11, 2+ injuries during the 9/11 attacks, and unmet mental health needs. Police responders to the WTC attacks continue to bear a high mental health burden. Improved early access to mental health treatment for police exposed to disasters may be needed. © 2015 Wiley Periodicals, Inc.
An Efficient Mutual Authentication Framework for Healthcare System in Cloud Computing.
Kumar, Vinod; Jangirala, Srinivas; Ahmad, Musheer
2018-06-28
The increasing role of Telecare Medicine Information Systems (TMIS) makes its accessibility for patients to explore medical treatment, accumulate and approach medical data through internet connectivity. Security and privacy preservation is necessary for medical data of the patient in TMIS because of the very perceptive purpose. Recently, Mohit et al.'s proposed a mutual authentication protocol for TMIS in the cloud computing environment. In this work, we reviewed their protocol and found that it is not secure against stolen verifier attack, many logged in patient attack, patient anonymity, impersonation attack, and fails to protect session key. For enhancement of security level, we proposed a new mutual authentication protocol for the similar environment. The presented framework is also more capable in terms of computation cost. In addition, the security evaluation of the protocol protects resilience of all possible security attributes, and we also explored formal security evaluation based on random oracle model. The performance of the proposed protocol is much better in comparison to the existing protocol.
Network Randomization and Dynamic Defense for Critical Infrastructure Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chavez, Adrian R.; Martin, Mitchell Tyler; Hamlet, Jason
2015-04-01
Critical Infrastructure control systems continue to foster predictable communication paths, static configurations, and unpatched systems that allow easy access to our nation's most critical assets. This makes them attractive targets for cyber intrusion. We seek to address these attack vectors by automatically randomizing network settings, randomizing applications on the end devices themselves, and dynamically defending these systems against active attacks. Applying these protective measures will convert control systems into moving targets that proactively defend themselves against attack. Sandia National Laboratories has led this effort by gathering operational and technical requirements from Tennessee Valley Authority (TVA) and performing research and developmentmore » to create a proof-of-concept solution. Our proof-of-concept has been tested in a laboratory environment with over 300 nodes. The vision of this project is to enhance control system security by converting existing control systems into moving targets and building these security measures into future systems while meeting the unique constraints that control systems face.« less
Yang, Xiao-Fei; Li, Xiao-Hui; Ding, Chang-Hua; Xu, Chao-Fan; Dai, Li-Xin; Hou, Xue-Long
2014-01-14
A highly regioselective palladium-catalyzed allylic alkylation of dienyl esters with nitromethane has been developed, providing selective access to the C-5 attacked products. The structures of the ligands as well as the steric effect of the substrates are important factors in determining the regiochemical outcome of the reaction.
A Survey of Authentication Schemes in Telecare Medicine Information Systems.
Aslam, Muhammad Umair; Derhab, Abdelouahid; Saleem, Kashif; Abbas, Haider; Orgun, Mehmet; Iqbal, Waseem; Aslam, Baber
2017-01-01
E-Healthcare is an emerging field that provides mobility to its users. The protected health information of the users are stored at a remote server (Telecare Medical Information System) and can be accessed by the users at anytime. Many authentication protocols have been proposed to ensure the secure authenticated access to the Telecare Medical Information System. These protocols are designed to provide certain properties such as: anonymity, untraceability, unlinkability, privacy, confidentiality, availability and integrity. They also aim to build a key exchange mechanism, which provides security against some attacks such as: identity theft, password guessing, denial of service, impersonation and insider attacks. This paper reviews these proposed authentication protocols and discusses their strengths and weaknesses in terms of ensured security and privacy properties, and computation cost. The schemes are divided in three broad categories of one-factor, two-factor and three-factor authentication schemes. Inter-category and intra-category comparison has been performed for these schemes and based on the derived results we propose future directions and recommendations that can be very helpful to the researchers who work on the design and implementation of authentication protocols.
Tempo and mode of antibat ultrasound production and sonar jamming in the diverse hawkmoth radiation.
Kawahara, Akito Y; Barber, Jesse R
2015-05-19
The bat-moth arms race has existed for over 60 million y, with moths evolving ultrasonically sensitive ears and ultrasound-producing organs to combat bat predation. The evolution of these defenses has never been thoroughly examined because of limitations in simultaneously conducting behavioral and phylogenetic analyses across an entire group. Hawkmoths include >1,500 species worldwide, some of which produce ultrasound using genital stridulatory structures. However, the function and evolution of this behavior remain largely unknown. We built a comprehensive behavioral dataset of hawkmoth hearing and ultrasonic reply to sonar attack using high-throughput field assays. Nearly half of the species tested (57 of 124 species) produced ultrasound to tactile stimulation or playback of bat echolocation attack. To test the function of ultrasound, we pitted big brown bats (Eptesicus fuscus) against hawkmoths over multiple nights and show that hawkmoths jam bat sonar. Ultrasound production was immediately and consistently effective at thwarting attack and bats regularly performed catching behavior without capturing moths. We also constructed a fossil-calibrated, multigene phylogeny to study the evolutionary history and divergence times of these antibat strategies across the entire family. We show that ultrasound production arose in multiple groups, starting in the late Oligocene (∼ 26 Ma) after the emergence of insectivorous bats. Sonar jamming and bat-detecting ears arose twice, independently, in the Miocene (18-14 Ma) either from earless hawkmoths that produced ultrasound in response to physical contact only, or from species that did not respond to touch or bat echolocation attack.
Multiple access techniques and spectrum utilization of the GLOBALSTAR mobile satellite system
NASA Astrophysics Data System (ADS)
Louie, Ming; Cohen, Michel; Rouffet, Denis; Gilhousen, Klein S.
The GLOBALSTAR System is a Low Earth Orbit (LEO) satellite-based mobile communications system that is interoperable with the current and future Public Land Mobile Network (PLMN). The GLOBALSTAR System concept is based upon technological advancement in two key areas: (1) the advancement in LEO satellite technology; (2) the advancement in cellular telephone technology, including the commercial applications of Code Division Multiple Access (CDMA) technologies, and of the most recent progress in Time Division Multiple Access technologies. The GLOBALSTAR System uses elements of CDMA, Frequency Division Multiple Access (FDMA), and Time Division Multiple Access (TDMA) technology, combining with satellite Multiple Beam Antenna (MBA) technology, to arrive at one of the most efficient modulation and multiple access system ever proposed for a satellite communications system. The technology used in GLOBALSTAR exploits the following techniques in obtaining high spectral efficiency and affordable cost per channel, with minimum coordination among different systems: power control, in open and closed loops, voice activation, spot beam satellite antenna for frequency reuse, weighted satellite antenna gain, multiple satellite coverage, and handoff between satellites. The GLOBALSTAR system design will use the following frequency bands: 1610-1626.5 MHz for up-link and 2483.5-2500 MHz for down-link.
Asymmetric multiple-image encryption based on the cascaded fractional Fourier transform
NASA Astrophysics Data System (ADS)
Li, Yanbin; Zhang, Feng; Li, Yuanchao; Tao, Ran
2015-09-01
A multiple-image cryptosystem is proposed based on the cascaded fractional Fourier transform. During an encryption procedure, each of the original images is directly separated into two phase masks. A portion of the masks is subsequently modulated into an interim mask, which is encrypted into the ciphertext image; the others are used as the encryption keys. Using phase truncation in the fractional Fourier domain, one can use an asymmetric cryptosystem to produce a real-valued noise-like ciphertext, while a legal user can reconstruct all of the original images using a different group of phase masks. The encryption key is an indivisible part of the corresponding original image and is still useful during decryption. The proposed system has high resistance to various potential attacks, including the chosen-plaintext attack. Numerical simulations also demonstrate the security and feasibility of the proposed scheme.
Testbed-based Performance Evaluation of Attack Resilient Control for AGC
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ashok, Aditya; Sridhar, Siddharth; McKinnon, Archibald D.
The modern electric power grid is a complex cyber-physical system whose reliable operation is enabled by a wide-area monitoring and control infrastructure. This infrastructure, supported by an extensive communication backbone, enables several control applications functioning at multiple time scales to ensure the grid is maintained within stable operating limits. Recent events have shown that vulnerabilities in this infrastructure may be exploited to manipulate the data being exchanged. Such a scenario could cause the associated control application to mis-operate, potentially causing system-wide instabilities. There is a growing emphasis on looking beyond traditional cybersecurity solutions to mitigate such threats. In this papermore » we perform a testbed-based validation of one such solution - Attack Resilient Control (ARC) - on Iowa State University's \\textit{PowerCyber} testbed. ARC is a cyber-physical security solution that combines domain-specific anomaly detection and model-based mitigation to detect stealthy attacks on Automatic Generation Control (AGC). In this paper, we first describe the implementation architecture of the experiment on the testbed. Next, we demonstrate the capability of stealthy attack templates to cause forced under-frequency load shedding in a 3-area test system. We then validate the performance of ARC by measuring its ability to detect and mitigate these attacks. Our results reveal that ARC is efficient in detecting stealthy attacks and enables AGC to maintain system operating frequency close to its nominal value during an attack. Our studies also highlight the importance of testbed-based experimentation for evaluating the performance of cyber-physical security and control applications.« less
Farris, Samantha G.; Zvolensky, Michael J.; Blalock, Janice A.; Schmidt, Norman B.
2018-01-01
Introduction Empirical work has documented a robust and consistent relation between panic attacks and smoking behavior. Theoretical models posit smokers with panic attacks may rely on smoking to help them manage chronically elevated negative affect due to uncomfortable bodily states, which may explain higher levels of nicotine dependence and quit problems. Methods The current study examined the effects of panic attack history on nicotine dependence, perceived barriers for quitting, smoking inflexibility when emotionally distressed, and expired carbon monoxide among 461 treatment-seeking smokers. A multiple mediator path model was evaluated to examine the indirect effects of negative affect and negative affect reduction motives as mediators of the panic attack-smoking relations. Results Panic attack history was indirectly related to greater levels of nicotine dependence (b=0.039, CI95%=0.008, 0.097), perceived barriers to smoking cessation (b=0.195, CI95%=0.043, 0.479), smoking inflexibility/avoidance when emotionally distressed (b=0.188, CI95%=0.041, 0.445), and higher levels of expired carbon monoxide (b=0.071, CI95%=0.010, 0.230) through the sequential effects of negative affect and negative affect smoking motives. Conclusions The present results provide empirical support for the sequential mediating role of negative affect and smoking motives for negative affect reduction in the relation between panic attacks and a variety of smoking variables in treatment-seeking smokers. These mediating variables are likely important processes to address in smoking cessation treatment, especially in panic-vulnerable smokers. PMID:24720260
Farris, Samantha G; Zvolensky, Michael J; Blalock, Janice A; Schmidt, Norman B
2014-05-01
Empirical work has documented a robust and consistent relation between panic attacks and smoking behavior. Theoretical models posit smokers with panic attacks may rely on smoking to help them manage chronically elevated negative affect due to uncomfortable bodily states, which may explain higher levels of nicotine dependence and quit problems. The current study examined the effects of panic attack history on nicotine dependence, perceived barriers for quitting, smoking inflexibility when emotionally distressed, and expired carbon monoxide among 461 treatment-seeking smokers. A multiple mediator path model was evaluated to examine the indirect effects of negative affect and negative affect reduction motives as mediators of the panic attack-smoking relations. Panic attack history was indirectly related to greater levels of nicotine dependence (b = 0.039, CI95% = 0.008, 0.097), perceived barriers to smoking cessation (b = 0.195, CI95% = 0.043, 0.479), smoking inflexibility/avoidance when emotionally distressed (b = 0.188, CI95% = 0.041, 0.445), and higher levels of expired carbon monoxide (b = 0.071, CI95% = 0.010, 0.230) through the sequential effects of negative affect and negative affect smoking motives. The present results provide empirical support for the sequential mediating role of negative affect and smoking motives for negative affect reduction in the relation between panic attacks and a variety of smoking variables in treatment-seeking smokers. These mediating variables are likely important processes to address in smoking cessation treatment, especially in panic-vulnerable smokers.
Predictors of influenza vaccination uptake among adults with a history of heart attack.
Jiménez-García, Rodrigo; Hernández-Barrera, Valentín; de Andres, Ana Lopez; Jimenez-Trujillo, Isabel; Esteban, Jesus; Gil, Angel; Carrasco-Garrido, Pilar
2010-07-01
Influenza vaccination can reduce morbidity and mortality caused by cardiovascular diseases. This study sought to evaluate influenza vaccination coverage among adults with a history of heart attack and to determine which variables were associated with vaccine uptake. A total of 716 adults reported having suffered a heart attack. The coverage among sufferers was 67.9% as against 35% for non sufferers. The variables that were significantly associated with a higher likelihood of receiving the vaccine among sufferers were: higher age; male gender, no smoking habit, "Physician visits in the preceding four weeks"; and, "Blood pressure control in the preceding three months". A descriptive study was conducted using individual data from adults aged ≥40 years included in the year 2006/7 Spanish Health Survey and comparing subjects with a history of heart attack with those who had not suffered this event. The number of participants surveyed was 20,060. Subjects were classified as heart attack sufferers if they answered affirmatively to the question: "Has your doctor told you that you have suffered a heart attack?" To assess influenza vaccination status we considered the response to the question, "Did you have a 'flu shot in the latest campaign?". Independent variables included sociodemographic, health-related, lifestyles and periodic control of cardiovascular risk factors. Influenza vaccination coverage among subjects who have suffered a heart attack is below desirable levels. Multiple strategies focused on providers and patients are needed to improve influenza vaccination coverage among these high risk subjects, particularly now with the emerging H1N1 pandemic.
Ferguson, Neil; Kamble, Shanmukh V
2012-01-01
Just world beliefs for students (N = 413) from India and the United Kingdom were measured. The participants then read a scenario about the 2008 terrorist attacks on Mumbai. The participants were then assessed for terrorism distress and offered multiple strategies (revenge and denial) to restore their just world beliefs. The findings indicate that students resident in India along with those who hold strong just world beliefs felt more distress, held a greater desire for revenge, and demonstrated more denial than the British students and those who had weak beliefs in a just world. These results indicate the important role just world beliefs play in responding to the threat created by mass casualty terrorist attacks. The implications for just world theory are also discussed.
Trellis Tone Modulation Multiple-Access for Peer Discovery in D2D Networks
Lim, Chiwoo; Kim, Sang-Hyo
2018-01-01
In this paper, a new non-orthogonal multiple-access scheme, trellis tone modulation multiple-access (TTMMA), is proposed for peer discovery of distributed device-to-device (D2D) communication. The range and capacity of discovery are important performance metrics in peer discovery. The proposed trellis tone modulation uses single-tone transmission and achieves a long discovery range due to its low Peak-to-Average Power Ratio (PAPR). The TTMMA also exploits non-orthogonal resource assignment to increase the discovery capacity. For the multi-user detection of superposed multiple-access signals, a message-passing algorithm with supplementary schemes are proposed. With TTMMA and its message-passing demodulation, approximately 1.5 times the number of devices are discovered compared to the conventional frequency division multiple-access (FDMA)-based discovery. PMID:29673167
Trellis Tone Modulation Multiple-Access for Peer Discovery in D2D Networks.
Lim, Chiwoo; Jang, Min; Kim, Sang-Hyo
2018-04-17
In this paper, a new non-orthogonal multiple-access scheme, trellis tone modulation multiple-access (TTMMA), is proposed for peer discovery of distributed device-to-device (D2D) communication. The range and capacity of discovery are important performance metrics in peer discovery. The proposed trellis tone modulation uses single-tone transmission and achieves a long discovery range due to its low Peak-to-Average Power Ratio (PAPR). The TTMMA also exploits non-orthogonal resource assignment to increase the discovery capacity. For the multi-user detection of superposed multiple-access signals, a message-passing algorithm with supplementary schemes are proposed. With TTMMA and its message-passing demodulation, approximately 1.5 times the number of devices are discovered compared to the conventional frequency division multiple-access (FDMA)-based discovery.
Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks.
Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly
2014-02-01
Hybrid mobile applications (apps) combine the features of Web applications and "native" mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources-file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies "bridges" that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources-the ability to read and write contacts list, local files, etc.-to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign-origin Web content and explain why they are ineffectual. We then present NoFrak, a capability-based defense against fracking attacks. NoFrak is platform-independent, compatible with any framework and embedded browser, requires no changes to the code of the existing hybrid apps, and does not break their advertising-supported business model.
Simple mathematical law benchmarks human confrontations.
Johnson, Neil F; Medina, Pablo; Zhao, Guannan; Messinger, Daniel S; Horgan, John; Gill, Paul; Bohorquez, Juan Camilo; Mattson, Whitney; Gangi, Devon; Qi, Hong; Manrique, Pedro; Velasquez, Nicolas; Morgenstern, Ana; Restrepo, Elvira; Johnson, Nicholas; Spagat, Michael; Zarama, Roberto
2013-12-10
Many high-profile societal problems involve an individual or group repeatedly attacking another - from child-parent disputes, sexual violence against women, civil unrest, violent conflicts and acts of terror, to current cyber-attacks on national infrastructure and ultrafast cyber-trades attacking stockholders. There is an urgent need to quantify the likely severity and timing of such future acts, shed light on likely perpetrators, and identify intervention strategies. Here we present a combined analysis of multiple datasets across all these domains which account for >100,000 events, and show that a simple mathematical law can benchmark them all. We derive this benchmark and interpret it, using a minimal mechanistic model grounded by state-of-the-art fieldwork. Our findings provide quantitative predictions concerning future attacks; a tool to help detect common perpetrators and abnormal behaviors; insight into the trajectory of a 'lone wolf'; identification of a critical threshold for spreading a message or idea among perpetrators; an intervention strategy to erode the most lethal clusters; and more broadly, a quantitative starting point for cross-disciplinary theorizing about human aggression at the individual and group level, in both real and online worlds.
Correlations and forecast of death tolls in the Syrian conflict.
Fujita, Kazuki; Shinomoto, Shigeru; Rocha, Luis E C
2017-11-16
The Syrian armed conflict has been ongoing since 2011 and has already caused thousands of deaths. The analysis of death tolls helps to understand the dynamics of the conflict and to better allocate resources and aid to the affected areas. In this article, we use information on the daily number of deaths to study temporal and spatial correlations in the data, and exploit this information to forecast events of deaths. We found that the number of violent deaths per day in Syria varies more widely than that in England in which non-violent deaths dominate. We have identified strong positive auto-correlations in Syrian cities and non-trivial cross-correlations across some of them. The results indicate synchronization in the number of deaths at different times and locations, suggesting respectively that local attacks are followed by more attacks at subsequent days and that coordinated attacks may also take place across different locations. Thus the analysis of high temporal resolution data across multiple cities makes it possible to infer attack strategies, warn potential occurrence of future events, and hopefully avoid further deaths.
Cyber Security Threats to Safety-Critical, Space-Based Infrastructures
NASA Astrophysics Data System (ADS)
Johnson, C. W.; Atencia Yepez, A.
2012-01-01
Space-based systems play an important role within national critical infrastructures. They are being integrated into advanced air-traffic management applications, rail signalling systems, energy distribution software etc. Unfortunately, the end users of communications, location sensing and timing applications often fail to understand that these infrastructures are vulnerable to a wide range of security threats. The following pages focus on concerns associated with potential cyber-attacks. These are important because future attacks may invalidate many of the safety assumptions that support the provision of critical space-based services. These safety assumptions are based on standard forms of hazard analysis that ignore cyber-security considerations This is a significant limitation when, for instance, security attacks can simultaneously exploit multiple vulnerabilities in a manner that would never occur without a deliberate enemy seeking to damage space based systems and ground infrastructures. We address this concern through the development of a combined safety and security risk assessment methodology. The aim is to identify attack scenarios that justify the allocation of additional design resources so that safety barriers can be strengthened to increase our resilience against security threats.
Simple mathematical law benchmarks human confrontations
NASA Astrophysics Data System (ADS)
Johnson, Neil F.; Medina, Pablo; Zhao, Guannan; Messinger, Daniel S.; Horgan, John; Gill, Paul; Bohorquez, Juan Camilo; Mattson, Whitney; Gangi, Devon; Qi, Hong; Manrique, Pedro; Velasquez, Nicolas; Morgenstern, Ana; Restrepo, Elvira; Johnson, Nicholas; Spagat, Michael; Zarama, Roberto
2013-12-01
Many high-profile societal problems involve an individual or group repeatedly attacking another - from child-parent disputes, sexual violence against women, civil unrest, violent conflicts and acts of terror, to current cyber-attacks on national infrastructure and ultrafast cyber-trades attacking stockholders. There is an urgent need to quantify the likely severity and timing of such future acts, shed light on likely perpetrators, and identify intervention strategies. Here we present a combined analysis of multiple datasets across all these domains which account for >100,000 events, and show that a simple mathematical law can benchmark them all. We derive this benchmark and interpret it, using a minimal mechanistic model grounded by state-of-the-art fieldwork. Our findings provide quantitative predictions concerning future attacks; a tool to help detect common perpetrators and abnormal behaviors; insight into the trajectory of a `lone wolf' identification of a critical threshold for spreading a message or idea among perpetrators; an intervention strategy to erode the most lethal clusters; and more broadly, a quantitative starting point for cross-disciplinary theorizing about human aggression at the individual and group level, in both real and online worlds.
Late onset of atypical paroxysmal non-kinesigenic dyskinesia with remote history of Graves' disease.
Rana, Abdul Qayyum; Nadeem, Ambreen; Yousuf, Muhammad Saad; Kachhvi, Zakerabibi M
2013-10-01
Paroxysmal non-kinesigenic dyskinesia (PNKD) is a rare hyperkinetic movement disorder and falls under the category of paroxysmal movement disorders. In this condition, episodes are spontaneous, involuntary, and involve dystonic posturing with choreic and ballistic movements. Attacks last for minutes to hours and rarely occur more than once per day. Attacks are not typically triggered by sudden movement, but may be brought on by alcohol, caffeine, stress, fatigue, or chocolate. We report a patient with multiple atypical features of PNKD. She had a 7-year history of this condition with onset at the age of 59, and a remote history of Graves' disease requiring total thyroidectomy. The frequency of attacks in our case ranged from five to six times a day to a minimum of twice per week, and the duration of episode was short, lasting not more than 2 min. Typically, PNKDs occur at a much younger age and have longer attack durations with low frequency. Administering clonazepam worked to reduce her symptoms, although majority of previous research suggests that pharmacological interventions have poor outcomes.
Distributed reinforcement learning for adaptive and robust network intrusion response
NASA Astrophysics Data System (ADS)
Malialis, Kleanthis; Devlin, Sam; Kudenko, Daniel
2015-07-01
Distributed denial of service (DDoS) attacks constitute a rapidly evolving threat in the current Internet. Multiagent Router Throttling is a novel approach to defend against DDoS attacks where multiple reinforcement learning agents are installed on a set of routers and learn to rate-limit or throttle traffic towards a victim server. The focus of this paper is on online learning and scalability. We propose an approach that incorporates task decomposition, team rewards and a form of reward shaping called difference rewards. One of the novel characteristics of the proposed system is that it provides a decentralised coordinated response to the DDoS problem, thus being resilient to DDoS attacks themselves. The proposed system learns remarkably fast, thus being suitable for online learning. Furthermore, its scalability is successfully demonstrated in experiments involving 1000 learning agents. We compare our approach against a baseline and a popular state-of-the-art throttling technique from the network security literature and show that the proposed approach is more effective, adaptive to sophisticated attack rate dynamics and robust to agent failures.
SDN-based path hopping communication against eavesdropping attack
NASA Astrophysics Data System (ADS)
Zhang, Chuanhao; Bu, Youjun; Zhao, Zheng
2016-10-01
Network eavesdropping is one of the most popular means used by cyber attackers, which has been a severe threat to network communication security. Adversaries could capture and analyze network communication data from network nodes or links, monitor network status and steal sensitive data such as username and password etc. Traditional network usually uses static network configuration, and existing defense methods, including firewall, IDS, IPS etc., cannot prevent eavesdropping, which has no distinguishing characteristic. Network eavesdropping become silent during most of the time of the attacking process, which is why it is difficult to discover and to defend. But A successful eavesdropping attack also has its' precondition, which is the target path should be relatively stable and has enough time of duration. So, In order to resolve this problem, it has to work on the network architecture. In this paper, a path hopping communication(PHC) mechanism based on Software Define Network (SDN) was proposed to solve this problem. In PHC, Ends in communication packets as well as the routing paths were changed dynamically. Therefore, the traffic would be distributed to multiple flows and transmitted along different paths. so that Network eavesdropping attack could be prevented effectively. It was concluded that PHC was able to increase the overhead of Network eavesdropping, as well as the difficulty of communication data recovery.
Adaptive Suspicious Prevention for Defending DoS Attacks in SDN-Based Convergent Networks
Dao, Nhu-Ngoc; Kim, Joongheon; Park, Minho; Cho, Sungrae
2016-01-01
The convergent communication network will play an important role as a single platform to unify heterogeneous networks and integrate emerging technologies and existing legacy networks. Although there have been proposed many feasible solutions, they could not become convergent frameworks since they mainly focused on converting functions between various protocols and interfaces in edge networks, and handling functions for multiple services in core networks, e.g., the Multi-protocol Label Switching (MPLS) technique. Software-defined networking (SDN), on the other hand, is expected to be the ideal future for the convergent network since it can provide a controllable, dynamic, and cost-effective network. However, SDN has an original structural vulnerability behind a lot of advantages, which is the centralized control plane. As the brains of the network, a controller manages the whole network, which is attractive to attackers. In this context, we proposes a novel solution called adaptive suspicious prevention (ASP) mechanism to protect the controller from the Denial of Service (DoS) attacks that could incapacitate an SDN. The ASP is integrated with OpenFlow protocol to detect and prevent DoS attacks effectively. Our comprehensive experimental results show that the ASP enhances the resilience of an SDN network against DoS attacks by up to 38%. PMID:27494411
Yousufuddin, Mohammed; Young, Nathan; Keenan, Lawrence; Olson, Tammy; Shultz, Jessica; Doyle, Taylor; Ahmmad, Eimad M; Arumaithurai, Kogulavadanan; Takahashi, Paul; Murad, Mohammad Hassan
2018-03-01
We aimed at providing estimates of mortality associated with cardiometabolic comorbidity and incident readmission from cardiometabolic as compared with noncardiometabolic conditions after a first transient ischemic attack. Between 2000 and 2015, patients hospitalized for a first transient ischemic attack were examined for cardiometabolic comorbidities (diabetes mellitus, coronary artery disease, heart failure, and atrial fibrillation), 5-year incident hospitalization, and time to death. Of 251 patients with transient ischemic attack, 134 (53%) had at least 1 and 55 (22%) had at least 2 cardiometabolic conditions. By 5 years, 491 readmissions (134 [27%] cardiometabolic and 357 [73%] noncardiometabolic) and 75 deaths (27 [36%] cardiometabolic and 47 [64%] noncardiometabolic) were observed. Mortality was increased with any concurrent cardiometabolic comorbidity (hazard ratio, 1.89; 95% confidence interval, 1.17-3.03; P =0.0089) with multiplicative mortality risk from a combination of coronary artery disease and heart failure. Each hospitalization was associated with a 1.5-fold risk of death (95% confidence interval, 1.37-1.64; P <0.0001). Risk of cardiometabolic and noncardiometabolic mortality was correlated with the corresponding category-specific readmission. Among patients hospitalized for first transient ischemic attack, 5-year mortality is associated with concurrent cardiometabolic comorbidity and rates of subsequent hospitalization. © 2018 American Heart Association, Inc.
Adaptive Suspicious Prevention for Defending DoS Attacks in SDN-Based Convergent Networks.
Dao, Nhu-Ngoc; Kim, Joongheon; Park, Minho; Cho, Sungrae
2016-01-01
The convergent communication network will play an important role as a single platform to unify heterogeneous networks and integrate emerging technologies and existing legacy networks. Although there have been proposed many feasible solutions, they could not become convergent frameworks since they mainly focused on converting functions between various protocols and interfaces in edge networks, and handling functions for multiple services in core networks, e.g., the Multi-protocol Label Switching (MPLS) technique. Software-defined networking (SDN), on the other hand, is expected to be the ideal future for the convergent network since it can provide a controllable, dynamic, and cost-effective network. However, SDN has an original structural vulnerability behind a lot of advantages, which is the centralized control plane. As the brains of the network, a controller manages the whole network, which is attractive to attackers. In this context, we proposes a novel solution called adaptive suspicious prevention (ASP) mechanism to protect the controller from the Denial of Service (DoS) attacks that could incapacitate an SDN. The ASP is integrated with OpenFlow protocol to detect and prevent DoS attacks effectively. Our comprehensive experimental results show that the ASP enhances the resilience of an SDN network against DoS attacks by up to 38%.
Protecting water and wastewater infrastructure from cyber attacks
NASA Astrophysics Data System (ADS)
Panguluri, Srinivas; Phillips, William; Cusimano, John
2011-12-01
Multiple organizations over the years have collected and analyzed data on cyber attacks and they all agree on one conclusion: cyber attacks are real and can cause significant damages. This paper presents some recent statistics on cyber attacks and resulting damages. Water and wastewater utilities must adopt countermeasures to prevent or minimize the damage in case of such attacks. Many unique challenges are faced by the water and wastewater industry while selecting and implementing security countermeasures; the key challenges are: 1) the increasing interconnection of their business and control system networks, 2) large variation of proprietary industrial control equipment utilized, 3) multitude of cross-sector cyber-security standards, and 4) the differences in the equipment vendor's approaches to meet these security standards. The utilities can meet these challenges by voluntarily selecting and adopting security standards, conducting a gap analysis, performing vulnerability/risk analysis, and undertaking countermeasures that best meets their security and organizational requirements. Utilities should optimally utilize their limited resources to prepare and implement necessary programs that are designed to increase cyber-security over the years. Implementing cyber security does not necessarily have to be expensive, substantial improvements can be accomplished through policy, procedure, training and awareness. Utilities can also get creative and allocate more funding through annual budgets and reduce dependence upon capital improvement programs to achieve improvements in cyber-security.
Develop a solution for protecting and securing enterprise networks from malicious attacks
NASA Astrophysics Data System (ADS)
Kamuru, Harshitha; Nijim, Mais
2014-05-01
In the world of computer and network security, there are myriad ways to launch an attack, which, from the perspective of a network, can usually be defined as "traffic that has huge malicious intent." Firewall acts as one of the measure in order to secure the device from incoming unauthorized data. There are infinite number of computer attacks that no firewall can prevent, such as those executed locally on the machine by a malicious user. From the network's perspective, there are numerous types of attack. All the attacks that degrade the effectiveness of data can be grouped into two types: brute force and precision. The Firewall that belongs to Juniper has the capability to protect against both types of attack. Denial of Service (DoS) attacks are one of the most well-known network security threats under brute force attacks, which is largely due to the high-profile way in which they can affect networks. Over the years, some of the largest, most respected Internet sites have been effectively taken offline by Denial of Service (DOS) attacks. A DoS attack typically has a singular focus, namely, to cause the services running on a particular host or network to become unavailable. Some DoS attacks exploit vulnerabilities in an operating system and cause it to crash, such as the infamous Win nuke attack. Others submerge a network or device with traffic so that there are no more resources to handle legitimate traffic. Precision attacks typically involve multiple phases and often involves a bit more thought than brute force attacks, all the way from reconnaissance to machine ownership. Before a precision attack is launched, information about the victim needs to be gathered. This information gathering typically takes the form of various types of scans to determine available hosts, networks, and ports. The hosts available on a network can be determined by ping sweeps. The available ports on a machine can be located by port scans. Screens cover a wide variety of attack traffic as they are configured on a per-zone basis. Depending on the type of screen being configured, there may be additional settings beyond simply blocking the traffic. Attack prevention is also a native function of any firewall. Juniper Firewall handles traffic on a per-flow basis. We can use flows or sessions as a way to determine whether traffic attempting to traverse the firewall is legitimate. We control the state-checking components resident in Juniper Firewall by configuring "flow" settings. These settings allow you to configure state checking for various conditions on the device. You can use flow settings to protect against TCP hijacking, and to generally ensure that the fire-wall is performing full state processing when desired. We take a case study of attack on a network and perform study of the detection of the malicious packets on a Net screen Firewall. A new solution for securing enterprise networks will be developed here.
Multi-species mating disruption in cranberries
USDA-ARS?s Scientific Manuscript database
Cranberries in Wisconsin are often attacked by three moth species, known commonly as Sparganothis fruitworm, cranberry fruitworm, and black-headed fireworm. These moth species require multiple insecticide applications each season in Wisconsin. With the loss of certain broad-spectrum insecticides and...
Imperfect chemical female mimicry in males of the ant Cardiocondyla obscurior
NASA Astrophysics Data System (ADS)
Cremer, Sylvia; D'Ettorre, Patrizia; Drijfhout, Falko P.; Sledge, Matthew F.; Turillazzi, Stefano; Heinze, Jürgen
2008-11-01
Winged and wingless males coexist in the ant Cardiocondyla obscurior. Wingless (“ergatoid”) males never leave their maternal colony and fight remorselessly among each other for the access to emerging females. The peaceful winged males disperse after about 10 days, but beforehand also mate in the nest. In the first 5 days of their life, winged males perform a chemical female mimicry that protects them against attack and even makes them sexually attractive to ergatoid males. When older, the chemical profile of winged males no longer matches that of virgin females; nevertheless, they are still tolerated, which so far has been puzzling. Contrasting this general pattern, we have identified a single aberrant colony in which all winged males were attacked and killed by the ergatoid males. A comparative analysis of the morphology and chemical profile of these untypical attacked winged males and the tolerated males from several normal colonies revealed that normal old males are still performing some chemical mimicry to the virgin queens, though less perfect than in their young ages. The anomalous attacked winged males, on the other hand, had a very different odour to the females. Our study thus exemplifies that the analysis of rare malfunctioning can add valuable insight on functioning under normal conditions and allows the conclusion that older winged males from normal colonies of the ant C. obscurior are guarded through an imperfect chemical female mimicry, still close enough to protect against attacks by the wingless fighters yet dissimilar enough not to elicit their sexual interest.
SCODE: A Secure Coordination-Based Data Dissemination to Mobile Sinks in Sensor Networks
NASA Astrophysics Data System (ADS)
Hung, Lexuan; Lee, Sungyoung; Lee, Young-Koo; Lee, Heejo
For many sensor network applications such as military, homeland security, it is necessary for users (sinks) to access sensor networks while they are moving. However, sink mobility brings new challenges to secure routing in large-scale sensor networks. Mobile sinks have to constantly propagate their current location to all nodes, and these nodes need to exchange messages with each other so that the sensor network can establish and maintain a secure multi-hop path between a source node and a mobile sink. This causes significant computation and communication overhead for sensor nodes. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. In this paper, we propose a secure and energy-efficient data dissemination protocol — Secure COodination-based Data dissEmination (SCODE) — for mobile sinks in sensor networks. We take advantages of coordination networks (grid structure) based on Geographical Adaptive Fidelity (GAF) protocol to construct a secure and efficient routing path between sources and sinks. Our security analysis demonstrates that the proposed protocol can defend against common attacks in sensor network routing such as replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Our performance evaluation both in mathematical analysis and simulation shows that the SCODE significantly reduces communication overhead and energy consumption while the latency is similar compared with the existing routing protocols, and it always delivers more than 90 percentage of packets successfully.
Strategy, Theory, Tactical Possibilities and the Design of Amphibious Concepts
2012-05-17
the process of learning and pierce the veil of uncertainty that lies between the protagonists, a gambit must be made—sufficient energy must be...non-military means was again challenging amphibious operations advocates.34 From 1990 – 2010, the Marine Corps conducted approximately 104...power for political ends by using multiple means and approaches to attack multiple centers of gravity and thus collapse an adversary’s system. The
Camacho, Anton; Ballesteros, Sébastien; Graham, Andrea L.; Carrat, Fabrice; Ratmann, Oliver; Cazelles, Bernard
2011-01-01
Influenza usually spreads through the human population in multiple-wave outbreaks. Successive reinfection of individuals over a short time interval has been explicitly reported during past pandemics. However, the causes of rapid reinfection and the role of reinfection in driving multiple-wave outbreaks remain poorly understood. To investigate these issues, we focus on a two-wave influenza A/H3N2 epidemic that occurred on the remote island of Tristan da Cunha in 1971. Over 59 days, 273 (96%) of 284 islanders experienced at least one attack and 92 (32%) experienced two attacks. We formulate six mathematical models invoking a variety of antigenic and immunological reinfection mechanisms. Using a maximum-likelihood analysis to confront model predictions with the reported incidence time series, we demonstrate that only two mechanisms can be retained: some hosts with either a delayed or deficient humoral immune response to the primary influenza infection were reinfected by the same strain, thus initiating the second epidemic wave. Both mechanisms are supported by previous empirical studies and may arise from a combination of genetic and ecological causes. We advocate that a better understanding and account of heterogeneity in the human immune response are essential to analysis of multiple-wave influenza outbreaks and pandemic planning. PMID:21525058
Hubless satellite communications networks
NASA Technical Reports Server (NTRS)
Robinson, Peter Alan
1994-01-01
Frequency Comb Multiple Access (FCMA) is a new combined modulation and multiple access method which will allow cheap hubless Very Small Aperture Terminal (VSAT) networks to be constructed. Theoretical results show bandwidth efficiency and power efficiency improvements over other modulation and multiple access methods. Costs of the VSAT network are reduced dramatically since a hub station is not required.
A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity.
Amin, Ruhul; Biswas, G P
2015-08-01
Telecare medical information system (TMIS) makes an efficient and convenient connection between patient(s)/user(s) and doctor(s) over the insecure internet. Therefore, data security, privacy and user authentication are enormously important for accessing important medical data over insecure communication. Recently, many user authentication protocols for TMIS have been proposed in the literature and it has been observed that most of the protocols cannot achieve complete security requirements. In this paper, we have scrutinized two (Mishra et al., Xu et al.) remote user authentication protocols using smart card and explained that both the protocols are suffering against several security weaknesses. We have then presented three-factor user authentication and key agreement protocol usable for TMIS, which fix the security pitfalls of the above mentioned schemes. The informal cryptanalysis makes certain that the proposed protocol provides well security protection on the relevant security attacks. Furthermore, the simulator AVISPA tool confirms that the protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The security functionalities and performance comparison analysis confirm that our protocol not only provide strong protection on security attacks, but it also achieves better complexities along with efficient login and password change phase as well as session key verification property.
Xia, Futing; Zhu, Hua
2012-02-01
Density functional theory calculations have been used to investigate the intra-molecular attack of 2'-hydroxypropyl-p-nitrophenyl phosphate (HPpNP) and its analogous compound 2-thiouridyl-p-nitrophenyl phosphate (s-2'pNP). Bulk solvent effect has been tested at the geometry optimization level with the polarized continuum model. It is found that the P-path involving the intra-molecular attack at the phosphorus atom and C-path involving the attack at the beta carbon atom proceed through the S(N)2-type mechanism for HPpNP and s-2'pNP. The calculated results indicate that the P-path with the free energy barrier of about 11 kcal/mol is more accessible than the C-path for the intra-molecular attack of HPpNP, which favors the formation of the five-membered phosphate diester. While for s-2'pNP, the C-path with the free energy barrier of about 21 kcal/mol proceeds more favorably than the P-path. The calculated energy barriers of the favorable pathways for HPpNP and s-2'pNP are both in agreement with the experimental results. Crown Copyright © 2011. Published by Elsevier Inc. All rights reserved.
Secure Method for Biometric-Based Recognition with Integrated Cryptographic Functions
Chiou, Shin-Yan
2013-01-01
Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied. PMID:23762851
Multiple access capacity trade-offs for a Ka-band personal access satellite system
NASA Technical Reports Server (NTRS)
Dessouky, Khaled; Motamedi, Masoud
1990-01-01
System capability is critical to the economic viability of a personal satellite communication system. Ka band has significant potential to support a high capacity multiple access system because of the availability of bandwidth. System design tradeoffs are performed and multiple access schemes are compared with the design goal of achieving the highest capacity and efficiency. Conclusions regarding the efficiency of the different schemes and the achievable capacities are given.
Fang, Jing; Gillespie, Cathleen; Keenan, Nora L; Greenlund, Kurt J
2011-05-01
Timely access to emergency care, prompt receipt of advanced treatment and survival from heart attack is dependent on both the early recognition of heart attack symptoms, by both victims and bystanders, and by immediately calling the emergency services. The objective of this study is to measure the awareness of heart attack symptoms and the emergency response among US adults. We analyzed data from the Behavioral Risk Factor Surveillance System's module on heart attack and stroke, which was conducted in 17 states/territories in 2001 and 12 states/territories in 2007. The module included five questions related to heart attack symptoms, one decoy question and one question regarding the first action to take if someone is having a heart attack. Age-adjusted prevalence of awareness was estimated, and odds ratios were calculated. Differences between 2001 and 2007 were assessed for five states that used the module in both years. In 2007, among 76,864 adults, awareness of individual heart attack symptoms ranged from 49% (pain in jaw, neck or back) to 92% (chest pain). Although 97% of adults recognized at least one symptom, only 10.7% recognized all five symptoms, knew that 'sudden trouble seeing in one or both eyes' was not a symptom of heart attack and recognized the need to call the emergency services. This estimate varied significantly by age, sex, race/ethnicity and level of education. The estimate was significantly higher for women (12.2%) than men (7.7%), White (11.6%) than Black (5.7%) or Hispanic people (4.5%), those with a higher level of education (13.5%) than lower educational level (4.5%) and for those with coronary heart disease (16.2%) than without the disease (9.5%). Comparison of awareness between 2001 (the referent) and 2007, in five states, revealed that awareness of all symptoms and calling the emergency services, were 9.7 and 10.3% for 2001 and 2007, respectively (p < 0.01). Compared to 2001, the odds ratio of awareness in 2007 was 1.08 (95% CI: 0.99-1.19) after controlling for socioeconomic and clinical characteristics. Awareness of all heart attack symptoms among adults in 12 states was low and little improvement was observed between 2001 and 2007. Accordingly, both clinicians and public health officials should seek ways in order to increase public awareness of the symptoms of heart attack. Special efforts should be focused on men, Black and Hispanic people and those with only modest levels of education.
USDA-ARS?s Scientific Manuscript database
Psacothea hilaris (Pascoe) (Coleoptera: Cerambycidae) known as the yellow-spotted longhorned beetle is native from eastern Asia (China, Japan including Ryukyu, Shikoku and Honshu archipelago and Taïwan) where it attacks plants belonging to Moraceae family, in particular to Morus and Ficus genera. In...
Policy-Aware Sender Anonymity in Location-Based Services
ERIC Educational Resources Information Center
Vyas, Avinash
2011-01-01
Sender anonymity in Location-based services (LBS) refers to hiding the identity of a mobile device user who sends requests to the LBS provider for services in her proximity (e.g. "find the nearest gas station etc."). The goal is to keep the requester's interest private even from attackers who (via hacking or subpoenas) gain access to the LBS…
Navy Virginia (SSN-774) Class Attack Submarine Procurement: Background and Issues for Congress
2012-03-01
Source: U.S. Navy file photo accessed by CRS on January 11, 2011, at http://www.navy.mil/search/display.asp? story_id=55715. Past and Projected...September 2001, p. 23. 52 Bryan Bender, “Navy Eyes Cutting Submarine Force,” Boston Globe, May 12, 2004, p. 1; Lolita C. Baldor, “Study Recommends
Quantum secret sharing using orthogonal multiqudit entangled states
NASA Astrophysics Data System (ADS)
Bai, Chen-Ming; Li, Zhi-Hui; Liu, Cheng-Ji; Li, Yong-Ming
2017-12-01
In this work, we investigate the distinguishability of orthogonal multiqudit entangled states under restricted local operations and classical communication. According to these properties, we propose a quantum secret sharing scheme to realize three types of access structures, i.e., the ( n, n)-threshold, the restricted (3, n)-threshold and restricted (4, n)-threshold schemes (called LOCC-QSS scheme). All cooperating players in the restricted threshold schemes are from two disjoint groups. In the proposed protocol, the participants use the computational basis measurement and classical communication to distinguish between those orthogonal states and reconstruct the original secret. Furthermore, we also analyze the security of our scheme in four primary quantum attacks and give a simple encoding method in order to better prevent the participant conspiracy attack.
A security mechanism based on evolutionary game in fog computing.
Sun, Yan; Lin, Fuhong; Zhang, Nan
2018-02-01
Fog computing is a distributed computing paradigm at the edge of the network and requires cooperation of users and sharing of resources. When users in fog computing open their resources, their devices are easily intercepted and attacked because they are accessed through wireless network and present an extensive geographical distribution. In this study, a credible third party was introduced to supervise the behavior of users and protect the security of user cooperation. A fog computing security mechanism based on human nervous system is proposed, and the strategy for a stable system evolution is calculated. The MATLAB simulation results show that the proposed mechanism can reduce the number of attack behaviors effectively and stimulate users to cooperate in application tasks positively.
Overview of Recent Alcator C-Mod Highlights
NASA Astrophysics Data System (ADS)
Marmar, Earl; C-Mod Team
2013-10-01
Analysis and modeling of recent C-Mod experiments has yielded significant results across multiple research topics. I-mode provides routine access to high confinement plasma (H98 up to 1.2) in quasi-steady state, without large ELMs; pedestal pressure and impurity transport are regulated by short-wavelength EM waves, and core turbulence is reduced. Multi-channel transport is being investigated in Ohmic and RF-heated plasmas, using advanced diagnostics to validate non-linear gyrokinetic simulations. Results from the new field-aligned ICRF antenna, including significantly reduced high-Z metal impurity contamination, and greatly improved load-tolerance, are being understood through antenna-plasma modeling. Reduced LHCD efficiency at high density correlates with parametric decay and enhanced edge absorption. Strong flow drive and edge turbulence suppression are seen from LHRF, providing new approaches for plasma control. Plasma density profiles directly in front of the LH coupler show non-linear modifications, with important consequences for wave coupling. Disruption-mitigation experiments using massive gas injection at multiple toroidal locations show unexpected results, with potentially significant implications for ITER. First results from a novel accelerator-based PMI diagnostic are presented. What would be the world's first actively-heated high-temperature advanced tungsten divertor is designed and ready for construction. Conceptual designs are being developed for an ultra-advanced divertor facility, Alcator DX, to attack key FNSF and DEMO heat-flux challenges integrated with a high-performance core. Supported by USDOE.
Turuk, Mousami; Dhande, Ashwin
2018-04-01
The recent innovations in information and communication technologies have appreciably changed the panorama of health information system (HIS). These advances provide new means to process, handle, and share medical images and also augment the medical image security issues in terms of confidentiality, reliability, and integrity. Digital watermarking has emerged as new era that offers acceptable solutions to the security issues in HIS. Texture is a significant feature to detect the embedding sites in an image, which further leads to substantial improvement in the robustness. However, considering the perspective of digital watermarking, this feature has received meager attention in the reported literature. This paper exploits the texture property of an image and presents a novel hybrid texture-quantization-based approach for reversible multiple watermarking. The watermarked image quality has been accessed by peak signal to noise ratio (PSNR), structural similarity measure (SSIM), and universal image quality index (UIQI), and the obtained results are superior to the state-of-the-art methods. The algorithm has been evaluated on a variety of medical imaging modalities (CT, MRA, MRI, US) and robustness has been verified, considering various image processing attacks including JPEG compression. The proposed scheme offers additional security using repetitive embedding of BCH encoded watermarks and ADM encrypted ECG signal. Experimental results achieved a maximum of 22,616 bits hiding capacity with PSNR of 53.64 dB.
Raffa, Kenneth F; Mason, Charles J; Bonello, Pierluigi; Cook, Stephen; Erbilgin, Nadir; Keefover-Ring, Ken; Klutsch, Jennifer G; Villari, Caterina; Townsend, Philip A
2017-09-01
Warming climate is allowing tree-killing bark beetles to expand their ranges and access naïve and semi-naïve conifers. Conifers respond to attack using complex mixtures of chemical defences that can impede beetle success, but beetles exploit some compounds for host location and communication. Outcomes of changing relationships will depend on concentrations and compositions of multiple host compounds, which are largely unknown. We analysed constitutive and induced chemistries of Dendroctonus ponderosae's primary historical host, Pinus contorta, and Pinus albicaulis, a high-elevation species whose encounters with this beetle are transitioning from intermittent to continuous. We quantified multiple classes of terpenes, phenolics, carbohydrates and minerals. Pinus contorta had higher constitutive allocation to, and generally stronger inducibility of, compounds that resist these beetle-fungal complexes. Pinus albicaulis contained higher proportions of specific monoterpenes that enhance pheromone communication, and lower induction of pheromone inhibitors. Induced P. contorta increased insecticidal and fungicidal compounds simultaneously, whereas P. albicaulis responses against these agents were inverse. Induced terpene accumulation was accompanied by decreased non-structural carbohydrates, primarily sugars, in P. contorta, but not P. albicaulis, which contained primarily starches. These results show some host species with continuous exposure to bark beetles have more thoroughly integrated defence syndromes than less-continuously exposed host species. © 2017 John Wiley & Sons Ltd.
Advanced multiple access concepts in mobile satellite systems
NASA Technical Reports Server (NTRS)
Ananasso, Fulvio
1990-01-01
Some multiple access strategies for Mobile Satellite Systems (MSS) are discussed. These strategies were investigated in the context of three separate studies conducted for the International Maritime Satellite Organization (INMARSAT) and the European Space Agency (ESA). Satellite-Switched Frequency Division Multiple Access (SS-FDMA), Code Division Multiple Access (CDMA), and Frequency-Addressable Beam architectures are addressed, discussing both system and technology aspects and outlining advantages and drawbacks of either solution with associated relevant hardware issues. An attempt is made to compare the considered option from the standpoint of user terminal/space segment complexity, synchronization requirements, spectral efficiency, and interference rejection.
No discrimination against previous mates in a sexually cannibalistic spider
NASA Astrophysics Data System (ADS)
Fromhage, Lutz; Schneider, Jutta M.
2005-09-01
In several animal species, females discriminate against previous mates in subsequent mating decisions, increasing the potential for multiple paternity. In spiders, female choice may take the form of selective sexual cannibalism, which has been shown to bias paternity in favor of particular males. If cannibalistic attacks function to restrict a male's paternity, females may have little interest to remate with males having survived such an attack. We therefore studied the possibility of female discrimination against previous mates in sexually cannibalistic Argiope bruennichi, where females almost always attack their mate at the onset of copulation. We compared mating latency and copulation duration of males having experienced a previous copulation either with the same or with a different female, but found no evidence for discrimination against previous mates. However, males copulated significantly shorter when inserting into a used, compared to a previously unused, genital pore of the female.
Deformation and erosion of f.c.c. metals and alloys under cavitation attack
NASA Technical Reports Server (NTRS)
Rao, B. C. S.; Buckley, D. H.
1984-01-01
Experimental investigations have been conducted to determine the early stages of cavitation attack on 6061-T6 aluminum alloy, electrolytic tough pitch copper, brass, and bronze, all having polycrystalline fcc matrices. The surface profiles and scanning electron micrographs show that the pits are initially formed at the grain boundaries, while the grain surfaces are progressively roughened by multiple slip and twinning. The initial erosion is noted to have occurred from the material in the grain boundaries, as well as by fragmentation of part of the grains. Further erosion occurred by shearing and necking of the surface undulations caused by plastic deformation. The mean penetration depth, computed on the basis of mass loss, was lowest on the bronze and greatest on the copper. Attention is given to the relation of cavitation attack to grain size, glide stress and stacking fault energy.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chatterjee, Samrat; Tipireddy, Ramakrishna; Oster, Matthew R.
Securing cyber-systems on a continual basis against a multitude of adverse events is a challenging undertaking. Game-theoretic approaches, that model actions of strategic decision-makers, are increasingly being applied to address cybersecurity resource allocation challenges. Such game-based models account for multiple player actions and represent cyber attacker payoffs mostly as point utility estimates. Since a cyber-attacker’s payoff generation mechanism is largely unknown, appropriate representation and propagation of uncertainty is a critical task. In this paper we expand on prior work and focus on operationalizing the probabilistic uncertainty quantification framework, for a notional cyber system, through: 1) representation of uncertain attacker andmore » system-related modeling variables as probability distributions and mathematical intervals, and 2) exploration of uncertainty propagation techniques including two-phase Monte Carlo sampling and probability bounds analysis.« less
Aerodynamic features of a two-airfoil arrangement
NASA Astrophysics Data System (ADS)
Faure, Thierry M.; Hétru, Laurent; Montagnier, Olivier
2017-10-01
The interaction between two foils occurs in many aerodynamic or hydrodynamic applications. Although the characteristics of many airfoils are well documented, there is a limited amount of data for multiple airfoils in interaction and for large values of the angle of attack. This paper presents measurements of the turbulent flow around a two-airfoil T-tail type arrangement and the aerodynamic coefficients, for an incompressible flow at moderate Reynolds number. The study focuses mainly on large angles of attack, corresponding to detached flows on the airfoils, large wakes and involving vortex shedding. Phase averages of velocity fields are made building the flow time development relative to the vortex shedding. The understanding of the change in the tail lift coefficient versus angle of attack, between a two-airfoil arrangement and a single airfoil, is discussed in relation with the position and width of the wing wake and the pathlines of the shedding vortices.
Cdc13 N-Terminal Dimerization DNA Binding and Telomere Length Regulation
DOE Office of Scientific and Technical Information (OSTI.GOV)
M Mitchell; J Smith; M Mason
The essential yeast protein Cdc13 facilitates chromosome end replication by recruiting telomerase to telomeres, and together with its interacting partners Stn1 and Ten1, it protects chromosome ends from nucleolytic attack, thus contributing to genome integrity. Although Cdc13 has been studied extensively, the precise role of its N-terminal domain (Cdc13N) in telomere length regulation remains unclear. Here we present a structural, biochemical, and functional characterization of Cdc13N. The structure reveals that this domain comprises an oligonucleotide/oligosaccharide binding (OB) fold and is involved in Cdc13 dimerization. Biochemical data show that Cdc13N weakly binds long, single-stranded, telomeric DNA in a fashion that ismore » directly dependent on domain oligomerization. When introduced into full-length Cdc13 in vivo, point mutations that prevented Cdc13N dimerization or DNA binding caused telomere shortening or lengthening, respectively. The multiple DNA binding domains and dimeric nature of Cdc13 offer unique insights into how it coordinates the recruitment and regulation of telomerase access to the telomeres.« less
Asthma Management in New York City Schools: a Classroom Teacher Perspective
Cain, Agnieszka; Reznik, Marina
2016-01-01
Objective Classroom teachers play an important role in facilitating asthma management in school but little is known about their perspectives around asthma management. We examined the perspectives of classroom teachers around barriers to school asthma management. Methods We conducted key informant interviews with 21 inner-city classroom teachers from 3rd to 5th grades in 10 Bronx, New York elementary schools. Sampling continued until thematic saturation was reached. Interviews were recorded, transcribed, and independently coded for common themes. We used thematic and content review to analyze interview data. Results Seven themes representing teachers’ perspectives on in-school asthma management emerged: (1) the problematic process of identifying students with asthma; (2) poor familiarity with the city health department’s asthma initiative and poor general knowledge of school policies on asthma management (3) lack of competency in managing an acute asthma attack in the classroom and poor recognition of symptoms of an asthma attack; (4) lack of confidence in dealing with a hypothetical asthma attack in the classroom; (5) lack of quick access to asthma medication in school; (6) limited communication between school staff; and (7) enthusiasm about learning more about asthma management. Conclusions Our results revealed several barriers contributing to suboptimal in-school asthma management: ineffective ways of identifying students with asthma, lack of teacher knowledge of guidelines on asthma management, lack of comfort in managing students’ asthma, inadequate access to asthma medication in school, and limited communication between school staff. These issues should be considered in the design of interventions to improve in-school asthma management. PMID:27031532
The evil circle of poverty: a qualitative study of malaria and disability
2012-01-01
Background This article discusses the link between disability and malaria in a poor rural setting. Global malaria programmes and rehabilitation programmes are organized as vertical and separate programmes, and as such they focus on prevention, cure and control, and disability respectively. When looking at specific conditions and illnesses, the impairing long-term consequences of illness incidents during childhood are not questioned. Methods The study design was ethnographic with an open, exploratory approach. Data were collected in Mangochi District in Malawi through qualitative in-depth interviews and participant observation. Results Despite a local-based health service system, people living in poor rural areas are confronted with a multitude of barriers when accessing malaria prevention and treatment. Lack of skilled health personnel and equipment add to the general burden of poverty: insufficient knowledge about health care, problems connected to accessing the health facility in time, insufficient initiatives to prevent malaria attacks, and a general lack of attention to the long term disabling effects of a malaria attack. Conclusions This study points to the importance of building malaria programmes, research and statistics that take into consideration the consequences of permanent impairment after a malaria attack, as well as the context of poverty in which they often occur. In order to do so, one needs to develop methods for detecting people whose disabilities are a direct result of not having received health services after a malaria episode. This may be done through qualitative approaches in local communities and should also be supplemented by suitable surveys in order to estimate the problem on a larger scale. PMID:22236358
The evil circle of poverty: a qualitative study of malaria and disability.
Ingstad, Benedicte; Munthali, Alister C; Braathen, Stine H; Grut, Lisbet
2012-01-11
This article discusses the link between disability and malaria in a poor rural setting. Global malaria programmes and rehabilitation programmes are organized as vertical and separate programmes, and as such they focus on prevention, cure and control, and disability respectively. When looking at specific conditions and illnesses, the impairing long-term consequences of illness incidents during childhood are not questioned. The study design was ethnographic with an open, exploratory approach. Data were collected in Mangochi District in Malawi through qualitative in-depth interviews and participant observation. Despite a local-based health service system, people living in poor rural areas are confronted with a multitude of barriers when accessing malaria prevention and treatment. Lack of skilled health personnel and equipment add to the general burden of poverty: insufficient knowledge about health care, problems connected to accessing the health facility in time, insufficient initiatives to prevent malaria attacks, and a general lack of attention to the long term disabling effects of a malaria attack. This study points to the importance of building malaria programmes, research and statistics that take into consideration the consequences of permanent impairment after a malaria attack, as well as the context of poverty in which they often occur. In order to do so, one needs to develop methods for detecting people whose disabilities are a direct result of not having received health services after a malaria episode. This may be done through qualitative approaches in local communities and should also be supplemented by suitable surveys in order to estimate the problem on a larger scale. © 2012 Ingstad et al; licensee BioMed Central Ltd.
Dutta, Dipankar; Bowen, Emily; Foy, Chris
2015-05-01
There is limited information on outcomes from rapid access transient ischemic attack (TIA) clinics. We present 4-year outcomes of TIAs, strokes, and mimics from a UK TIA clinic database. All patients referred between April 2010 and May 2012 were retrospectively identified and outcomes determined. End points were stroke, myocardial infarction, any vascular event (TIA, stroke, or myocardial infarction), and all-cause death. Data were analyzed by survival analysis. Of 1067 patients, 31.6% were TIAs, 18% strokes, and 50.4% mimics. Median assessment time was 4.5 days from onset and follow-up was for 34.9 months. Subsequent strokes occurred in 7.1% of patients with TIA, 10.9% of patients with stroke, and 2.0% of mimics at the end of follow-up. Stroke risk at 90 days was 1.3% for patients diagnosed as TIA or stroke. Compared with mimics, hazard ratios for subsequent stroke were 3.88 (1.90-7.91) for TIA and 5.84 (2.81-12.11) for stroke. Hazard ratio for any subsequent vascular event was 2.91 (1.97-4.30) for TIA and 2.83 (1.81-4.41) for stroke. Hazard ratio for death was 1.68 (1.10-2.56) for TIA and 2.19 (1.38-3.46) for stroke. Our results show a lower 90-day stroke incidence after TIA or minor stroke than in earlier studies, suggesting that rapid access daily TIA clinics may be having a significant effect on reducing strokes. © 2015 American Heart Association, Inc.
Defending networks against denial-of-service attacks
NASA Astrophysics Data System (ADS)
Gelenbe, Erol; Gellman, Michael; Loukas, George
2004-11-01
Denial of service attacks, viruses and worms are common tools for malicious adversarial behavior in networks. Experience shows that over the last few years several of these techniques have probably been used by governments to impair the Internet communications of various entities, and we can expect that these and other information warfare tools will be used increasingly as part of hostile behavior either independently, or in conjunction with other forms of attack in conventional or asymmetric warfare, as well as in other forms of malicious behavior. In this paper we concentrate on Distributed Denial of Service Attacks (DDoS) where one or more attackers generate flooding traffic and direct it from multiple sources towards a set of selected nodes or IP addresses in the Internet. We first briefly survey the literature on the subject, and discuss some examples of DDoS incidents. We then present a technique that can be used for DDoS protection based on creating islands of protection around a critical information infrastructure. This technique, that we call the CPN-DoS-DT (Cognitive Packet Networks DoS Defence Technique), creates a self-monitoring sub-network surrounding each critical infrastructure node. CPN-DoS-DT is triggered by a DDoS detection scheme, and generates control traffic from the objects of the DDoS attack to the islands of protection where DDOS packet flows are destroyed before they reach the critical infrastructure. We use mathematical modelling, simulation and experiments on our test-bed to show the positive and negative outcomes that may result from both the attack, and the CPN-DoS-DT protection mechanism, due to imperfect detection and false alarms.
Securing Ground Data System Applications for Space Operations
NASA Technical Reports Server (NTRS)
Pajevski, Michael J.; Tso, Kam S.; Johnson, Bryan
2014-01-01
The increasing prevalence and sophistication of cyber attacks has prompted the Multimission Ground Systems and Services (MGSS) Program Office at Jet Propulsion Laboratory (JPL) to initiate the Common Access Manager (CAM) effort to protect software applications used in Ground Data Systems (GDSs) at JPL and other NASA Centers. The CAM software provides centralized services and software components used by GDS subsystems to meet access control requirements and ensure data integrity, confidentiality, and availability. In this paper we describe the CAM software; examples of its integration with spacecraft commanding software applications and an information management service; and measurements of its performance and reliability.
NASA Astrophysics Data System (ADS)
Javidi, Bahram; Carnicer, Artur; Yamaguchi, Masahiro; Nomura, Takanori; Pérez-Cabré, Elisabet; Millán, María S.; Nishchal, Naveen K.; Torroba, Roberto; Fredy Barrera, John; He, Wenqi; Peng, Xiang; Stern, Adrian; Rivenson, Yair; Alfalou, A.; Brosseau, C.; Guo, Changliang; Sheridan, John T.; Situ, Guohai; Naruse, Makoto; Matsumoto, Tsutomu; Juvells, Ignasi; Tajahuerce, Enrique; Lancis, Jesús; Chen, Wen; Chen, Xudong; Pinkse, Pepijn W. H.; Mosk, Allard P.; Markman, Adam
2016-08-01
Information security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information security, encryption, and authentication. The main motivation for using optics and photonics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make information encryption more secure and more difficult to attack. This roadmap article presents an overview of the potential, recent advances, and challenges of optical security and encryption using free space optics. The roadmap on optical security is comprised of six categories that together include 16 short sections written by authors who have made relevant contributions in this field. The first category of this roadmap describes novel encryption approaches, including secure optical sensing which summarizes double random phase encryption applications and flaws [Yamaguchi], the digital holographic encryption in free space optical technique which describes encryption using multidimensional digital holography [Nomura], simultaneous encryption of multiple signals [Pérez-Cabré], asymmetric methods based on information truncation [Nishchal], and dynamic encryption of video sequences [Torroba]. Asymmetric and one-way cryptosystems are analyzed by Peng. The second category is on compression for encryption. In their respective contributions, Alfalou and Stern propose similar goals involving compressed data and compressive sensing encryption. The very important area of cryptanalysis is the topic of the third category with two sections: Sheridan reviews phase retrieval algorithms to perform different attacks, whereas Situ discusses nonlinear optical encryption techniques and the development of a rigorous optical information security theory. The fourth category with two contributions reports how encryption could be implemented at the nano- or micro-scale. Naruse discusses the use of nanostructures in security applications and Carnicer proposes encoding information in a tightly focused beam. In the fifth category, encryption based on ghost imaging using single-pixel detectors is also considered. In particular, the authors [Chen, Tajahuerce] emphasize the need for more specialized hardware and image processing algorithms. Finally, in the sixth category, Mosk and Javidi analyze in their corresponding papers how quantum imaging can benefit optical encryption systems. Sources that use few photons make encryption systems much more difficult to attack, providing a secure method for authentication.
Anomaly Detection at Multiple Scales (ADAMS)
2011-11-09
must resort to generating their own data that simulates insider attacks. The Schonlau dataset is the most widely used for academic study. It...measurements are estimated by well-known software plagiarism tools . 39 As explained above, there are many different techniques for code trans- formation
Ratcliffe, John M; Fullard, James H
2005-12-01
We studied the efficiency and effects of the multiple sensory cues of tiger moths on echolocating bats. We used the northern long-eared bat, Myotis septentrionalis, a purported moth specialist that takes surface-bound prey (gleaning) and airborne prey (aerial hawking), and the dogbane tiger moth, Cycnia tenera, an eared species unpalatable to bats that possesses conspicuous colouration and sound-producing organs (tymbals). This is the first study to investigate the interaction of tiger moths and wild-caught bats under conditions mimicking those found in nature and to demand the use of both aerial hawking and gleaning strategies by bats. Further, it is the first to report spectrograms of the sounds produced by tiger moths while under aerial attack by echolocating bats. During both aerial hawking and gleaning trials, all muted C. tenera and perched intact C. tenera were attacked by M. septentrionalis, indicating that M. septentrionalis did not discriminate C. tenera from palatable moths based on potential echoic and/or non-auditory cues. Intact C. tenera were attacked significantly less often than muted C. tenera during aerial hawking attacks: tymbal clicks were therefore an effective deterrent in an aerial hawking context. During gleaning attacks, intact and muted C. tenera were always attacked and suffered similar mortality rates, suggesting that while handling prey this bat uses primarily chemical signals. Our results also show that C. tenera temporally matches the onset of click production to the ;approach phase' echolocation calls produced by aerial hawking attacking bats and that clicks themselves influence the echolocation behaviour of attacking bats. In the context of past research, these findings support the hypotheses that the clicks of arctiid moths are both an active defence (through echolocation disruption) and a reliable indicator of chemical defence against aerial-hawking bats. We suggest these signals are specialized for an aerial context.
Cyber secure systems approach for NPP digital control systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
McCreary, T. J.; Hsu, A.
2006-07-01
Whether fossil or nuclear power, the chief operations goal is to generate electricity. The heart of most plant operations is the I and C system. With the march towards open architecture, the I and C system is more vulnerable than ever to system security attacks (denial of service, virus attacks and others), thus jeopardizing plant operations. Plant staff must spend large amounts of time and money setting up and monitoring a variety of security strategies to counter the threats and actual attacks to the system. This time and money is a drain on the financial performance of a plant andmore » distracts valuable operations resources from their real goals: product. The pendulum towards complete open architecture may have swung too far. Not all aspects of proprietary hardware and software are necessarily 'bad'. As the aging U.S. fleet of nuclear power plants starts to engage in replacing legacy control systems, and given the on-going (and legitimate) concern about the security of present digital control systems, decisions about how best to approach cyber security are vital to the specification and selection of control system vendors for these upgrades. The authors maintain that utilizing certain resources available in today's digital technology, plant control systems can be configured from the onset to be inherently safe, so that plant staff can concentrate on the operational issues of the plant. The authors postulate the concept of the plant I and C being bounded in a 'Cyber Security Zone' and present a design approach that can alleviate the concern and cost at the plant level of dealing with system security strategies. Present approaches through various IT cyber strategies, commercial software, and even postulated standards from various industry/trade organizations are almost entirely reactive and simply add to cost and complexity. This Cyber Security Zone design demonstrates protection from the four classes of cyber security attacks: 1)Threat from an intruder attempting to disrupt network communications by entering the system from an attached utility network or utilizing a modem connected to a control system PC that is in turn connected to a publicly accessible phone; 2)Threat from a user connecting an unauthorized computer to the control network; 3)Threat from a security attack when an unauthorized user gains access to a PC connected to the plant network;. 4)Threat from internal disruption (by plant staff, whether, malicious or otherwise) by unauthorized usage of files or file handling media that opens the system to security threat (as typified in current situation in most control rooms). The plant I and C system cyber security design and the plant specific procedures should adequately demonstrate protection from the four pertinent classes of cyber security attacks. The combination of these features should demonstrate that the system is not vulnerable to any analyzed cyber security attacks either from internal sources or through network connections. The authors will provide configurations that will demonstrate the Cyber Security Zone. (authors)« less
Spread-spectrum multiple access using wideband noncoherent MFSK
NASA Technical Reports Server (NTRS)
Ha, Tri T.; Pratt, Timothy; Maggenti, Mark A.
1987-01-01
Two spread-spectrum multiple access systems which use wideband M-ary frequency shift keying (FSK) (MFSK) as the primary modulation are presented. A bit error rate performance analysis is presented and system throughput is calculated for sample C band and Ku band satellite systems. Sample link analyses are included to illustrate power and adjacent satellite interference considerations in practical multiple access systems.
Therapeutic decision making in a new drug era in multiple sclerosis.
Keegan, B Mark
2013-02-01
Multiple sclerosis is a presumed autoimmune, inflammatory disease of the central nervous system. Since the early 1990s, medications have been devised, tested, and approved for relapsing forms of multiple sclerosis (MS). MS treatments work by altering the immune system to reduce inflammatory MS activity, thus curtailing clinical relapses (attacks), thereby reducing short-term disability related to the MS attacks. The promise of long-term improvement in MS-related disability remains the most desirable therapeutic goal; to what degree current MS therapies are effective in reducing this is controversial. Recent years have seen a surge in novel MS therapies delivered both parenterally and orally that offer new therapeutic alternatives to MS patients and their treating providers. It remains essential to make an unequivocal diagnosis of MS and identify its clinical course prior to initiating therapies. Switching and altering MS therapies can now be done by rational approaches based on therapeutic efficacy and tolerability; however, these remain nonevidence-based for the most part. The high cost of MS therapies remains a significant concern. A new therapeutic era is at hand offering new hope for patients affected by this chronic, frequently disabling disease. Thieme Medical Publishers 333 Seventh Avenue, New York, NY 10001, USA.
Casanova, Bonaventura; Lacruz, Laura; Villar, María Luisa; Domínguez, José Andrés; Gadea, María Carcelén; Gascón, Francisco; Mallada, Javier; Hervás, David; Simó-Castelló, María; Álvarez-Cermeño, José Carlos; Calles, Carmen; Olascoaga, Javier; Ramió-Torrentà, Lluís; Alcalá, Carmen; Cervelló, Angeles; Boscá, Isabel; Pérez-Mirallles, Francisco Carlos; Coret, Francisco
2018-06-07
To study the efficacy of interferon beta (IFNβ) and glatiramer acetate (GA) related to the presence of oligoclonal M bands (OCMB) in the cerebrospinal fluid in relapsing-remitting multiple sclerosis (RRMS). This is an observational, multicenter and retrospective study with prospectively collected data of patients that started treatment with IFNβ or GA. Treatment decision was made blinded to the OCMB status. Time to first attack after starting therapy was compared by using Kaplan-Meier curves, and adjustment by Cox regression analysis was performed. Two hundred and fifty-six patients entered in the study (141-55% received IFNβ; 115-45% received GA). After a mean follow-up of 41 and 65 months, 54.7% of patients remained free from further attacks (RF). The proportion of RF patients was higher in the GA group than in the IFNβ group (72.2 vs. 40.4%, p < 0.001). The IFNβ patients with OCMB+ presented the poorest response, 31.3% RF vs. 48.1% in IFNβ without OCMB, p = 0.03. OCMB in CSF could be a biomarker of treatment response in multiple sclerosis.
[Multiple risk factors models of patients with acute coronary syndromes of different genders].
Sun, Wanglexian; Hu, Tiemin; Huang, Xiansheng; Zhang, Ying; Guo, Jinrui; Wang, Wenfeng; Shi, Fei; Wang, Pengfei; Wang, Huarong; Sun, Jing; Li, Chunhua
2014-12-23
To establish the multiple risk factors models for patients with acute coronary syndromes (ACS) of different genders and quantitatively assess the pathopoiesis of all factors. A total of 2 308 consecutive ACS inpatients and a control group of 256 cases with normal coronary artery from January 2010 to December 2012 were enrolled and divided into 4 groups of female ACS (n = 970), male ACS (n = 1 338), female control (n = 136) and male control (n = 120). All demographic and clinical data were collected by the physicians and master degree candidates in the division of cardiology. The Logistic regression models of multiple risk factors were established for ACS by different genders. More than 45 years of age, dyslipidemia, type 2 diabetes mellitus, obesity and hypertension were all independent risk factors of ACS for different genders (P < 0.05). However, the same risk factors had different pathogenic effects on ACS between genders. The odds ratio (OR) was markedly different for females and males: per 5-year increase aged over 45 years (1.45 vs 1.13), dyslipidemia (3.45 vs 1.68), type 2 diabetes mellitus (4.06 vs 2.33), obesity (2.93 vs 1.91) and hypertension (1.78 vs 3.80) respectively (all P < 0.05). In addition, current smoking increased the risk of ACS attack in males by 5.49 (P < 0.05) while not statistically significant in females. Particularly cerebral ischemic stroke increased the risk of ACS attack by 5.49 folds in males other than females (P < 0.05). Type 2 diabetes mellitus, dyslipidemia and obesity may present higher risks of ACS attack for females than males. And smoking and hypertension are much more dangerous for males. Males with cerebral infarction are more susceptible for ACS than females.
Characteristics of pediatric multiple sclerosis: The Turkish pediatric multiple sclerosis database.
Yılmaz, Ünsal; Anlar, Banu; Gücüyener, Kıvılcım
2017-11-01
To document the clinical and paraclinical features of pediatric multiple sclerosis (MS) in Turkey. Data of MS patients with onset before age 18 years (n = 193) were collected from 27 pediatric neurology centers throughout Turkey. Earlier-onset (<12 years) and later-onset (≥12 years) groups were compared. There were 123 (63.7%) girls and 70 (36.3%) boys aged 4-17 years, median 14 years at disease onset. Family history of MS was 6.5%. The first presentation was polysymptomatic in 55.4% of patients, with brainstem syndromes (50.3%), sensory disturbances (44%), motor symptoms (33.2%), and optic neuritis (26.4%) as common initial manifestations. Nineteen children had facial paralysis and 10 had epileptic seizures at first attack; 21 (11%) were initially diagnosed with acute disseminated encephalomyelitis (ADEM). Oligoclonal bands were identified in 68% of patients. Magnetic resonance imaging revealed periventricular (96%), cortical/juxtacortical (64.2%), brainstem (63%), cerebellum (51.4%), and spinal cord (67%) involvement. Visual evoked potentials (VEP) were abnormal in 52%; serum 25-hydroxyvitamin D levels were low in 68.5% of patients. The earlier-onset group had a higher rate of infection/vaccination preceding initial attack, initial diagnosis of ADEM, longer interval between first 2 attacks, and more disability accumulating in the first 3 years of the disease. Brainstem and cerebellum are common sites of clinical and radiological involvement in pediatric-onset MS. VEP abnormalities are frequent even in patients without history of optic neuropathy. Vitamin D status does not appear to affect the course in early disease. MS beginning before 12 years of age has certain characteristics in history and course. Copyright © 2017 European Paediatric Neurology Society. Published by Elsevier Ltd. All rights reserved.
Lethal aggression in Pan is better explained by adaptive strategies than human impacts.
Wilson, Michael L; Boesch, Christophe; Fruth, Barbara; Furuichi, Takeshi; Gilby, Ian C; Hashimoto, Chie; Hobaiter, Catherine L; Hohmann, Gottfried; Itoh, Noriko; Koops, Kathelijne; Lloyd, Julia N; Matsuzawa, Tetsuro; Mitani, John C; Mjungu, Deus C; Morgan, David; Muller, Martin N; Mundry, Roger; Nakamura, Michio; Pruetz, Jill; Pusey, Anne E; Riedel, Julia; Sanz, Crickette; Schel, Anne M; Simmons, Nicole; Waller, Michel; Watts, David P; White, Frances; Wittig, Roman M; Zuberbühler, Klaus; Wrangham, Richard W
2014-09-18
Observations of chimpanzees (Pan troglodytes) and bonobos (Pan paniscus) provide valuable comparative data for understanding the significance of conspecific killing. Two kinds of hypothesis have been proposed. Lethal violence is sometimes concluded to be the result of adaptive strategies, such that killers ultimately gain fitness benefits by increasing their access to resources such as food or mates. Alternatively, it could be a non-adaptive result of human impacts, such as habitat change or food provisioning. To discriminate between these hypotheses we compiled information from 18 chimpanzee communities and 4 bonobo communities studied over five decades. Our data include 152 killings (n = 58 observed, 41 inferred, and 53 suspected killings) by chimpanzees in 15 communities and one suspected killing by bonobos. We found that males were the most frequent attackers (92% of participants) and victims (73%); most killings (66%) involved intercommunity attacks; and attackers greatly outnumbered their victims (median 8:1 ratio). Variation in killing rates was unrelated to measures of human impacts. Our results are compatible with previously proposed adaptive explanations for killing by chimpanzees, whereas the human impact hypothesis is not supported.
A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks
Wang, Jian; Jiang, Shuai; Fapojuwo, Abraham O.
2017-01-01
This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer considering the attacks initiated at different protocol layers will inevitably have impacts on the parameters of the corresponding protocol layers. For simplicity, the paper mainly considers three aspects of trustworthiness, namely physical layer trust, media access control layer trust and network layer trust. The per-layer trust metrics are then combined to determine the overall trust metric of a sensor node. The performance of the proposed intrusion detection mechanism is then analyzed using the t-distribution to derive analytical results of false positive and false negative probabilities. Numerical analytical results, validated by simulation results, are presented in different attack scenarios. It is shown that the proposed protocol layer trust-based intrusion detection scheme outperforms a state-of-the-art scheme in terms of detection probability and false probability, demonstrating its usefulness for detecting cross-layer attacks. PMID:28555023
A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks.
Wang, Jian; Jiang, Shuai; Fapojuwo, Abraham O
2017-05-27
This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer considering the attacks initiated at different protocol layers will inevitably have impacts on the parameters of the corresponding protocol layers. For simplicity, the paper mainly considers three aspects of trustworthiness, namely physical layer trust, media access control layer trust and network layer trust. The per-layer trust metrics are then combined to determine the overall trust metric of a sensor node. The performance of the proposed intrusion detection mechanism is then analyzed using the t-distribution to derive analytical results of false positive and false negative probabilities. Numerical analytical results, validated by simulation results, are presented in different attack scenarios. It is shown that the proposed protocol layer trust-based intrusion detection scheme outperforms a state-of-the-art scheme in terms of detection probability and false probability, demonstrating its usefulness for detecting cross-layer attacks.
2015-05-01
LLC and DRAM banks. For each µB task and isolation configuration, we ran experiments with all 256 possible LLC area sizes (given by 1 to 16 ways and 1...isolation on multicoore platforms. In RTAS ’14. [29] H. Yun, G. Yao, R. Pellizzoni, M. Caccamo, and L. Sha . Memory access control in multiprocessor
Global Mapping of Cyber Attacks
2014-01-01
from any 10 particular vendor is wrong. Moreover, researchers often use anti-virus labels as ground-truth for evaluating new approaches [5, 17, 36...lnstrusions and Defenses (RAID), September 2007. [SJ U. Bayer, P. M. Comparetti, C. Hlauschek, C. Kruegel, and E. Kirda. Scalable, behavior -based...International Development and Confiict Management International crisis behavior project http: I /www. cidcm. umd.edu/icb/. Last accessed: December 2011
Defense.gov Special Report: Pearl Harbor - Anniversary of the Attack on
Pearl Harbor You have reached a collection of archived material. The content available is no administration. If you wish to see the latest content, please visit the current version of the site. For persons with disabilities experiencing difficulties accessing content on archive.defense.gov, please use the
Operational Exercise Integration Recommendations for DoD Cyber Ranges
2015-08-05
be the precision and recall of a security information and event management (SIEM) system ’s notifications of unauthorized access to that directory...network traffic, port scanning Deplete Resources TCP flooding, memory leak exploitation Injection Cross-site scripting attacks, SQL injection Deceptive...requirements for personnel development; tactics, techniques, and procedures (TTPs) devel- opment; and mission rehearsals . While unique in their own
Navy Virginia (SSN-774) Class Attack Submarine Procurement: Background and Issues for Congress
2013-09-27
Submarine Source: U.S. Navy file photo accessed by CRS on January 11, 2011, at http://www.navy.mil/search/display.asp? story_id=55715. Past and Projected...May 12, 2004, p. 1; Lolita C. Baldor, “Study Recommends Cutting Submarine Fleet,” NavyTimes.com, May 13, 2004. 51 U.S. Department of the Navy, An
USMC ISR: Preparing for the A2AD Threat
2014-06-13
millimeter waves, high - power microwaves, lasers or electromagnetic pulses (Brimley 2013, 15). Replacing modern day munitions, directed- energy ...space and cyber capabilities” (JCS, 26). The precept further states the need to protect access to the electromagnetic spectrum. Given the high cost...is the “division of electronic warfare involving the use of electromagnetic , directed energy , or antiradiation weapons to attack personnel, facilities
2016-05-13
Storm. 35 Allied planners determined that TLAMs would be ineffective because they could not provide Battle Damage Assessment ( BDA ) and confirm...that the Apache’s armament, capability of flying low enough to evade radar, and ability to confirm BDA provided the best option to destroy the radar
2016-02-11
directed.36 Protected systems operating on secure networks will weigh into the adversaries calculus of risk and cost of their actions versus this... calculus deterring them from attack. Our extended defense with forts and lookouts searching outside the perimeter providing current intelligence of any...Last accessed 30 January 2016). 51 Phil Stewart , U.S. Defense Chief says pre-emptive action possible over cyber threat, Oct 11, 2012, http
Unwilling Brides: "Phallic Attack" as a Barrier to Gender Balance in Higher Education in Nigeria
ERIC Educational Resources Information Center
Nwadigwe, Charles E.
2007-01-01
Gender balance in access to quality education is a crucial item on the agenda of the Millennium Development Goals. But this ideal appears beset by a number of barriers, especially at higher education level. This study investigated the problem of sexual harassment in the Nigerian university system as a barrier to the educational advancement of…
Mishra, Dheerendra; Mukhopadhyay, Sourav; Kumari, Saru; Khan, Muhammad Khurram; Chaturvedi, Ankita
2014-05-01
Telecare medicine information systems (TMIS) present the platform to deliver clinical service door to door. The technological advances in mobile computing are enhancing the quality of healthcare and a user can access these services using its mobile device. However, user and Telecare system communicate via public channels in these online services which increase the security risk. Therefore, it is required to ensure that only authorized user is accessing the system and user is interacting with the correct system. The mutual authentication provides the way to achieve this. Although existing schemes are either vulnerable to attacks or they have higher computational cost while an scalable authentication scheme for mobile devices should be secure and efficient. Recently, Awasthi and Srivastava presented a biometric based authentication scheme for TMIS with nonce. Their scheme only requires the computation of the hash and XOR functions.pagebreak Thus, this scheme fits for TMIS. However, we observe that Awasthi and Srivastava's scheme does not achieve efficient password change phase. Moreover, their scheme does not resist off-line password guessing attack. Further, we propose an improvement of Awasthi and Srivastava's scheme with the aim to remove the drawbacks of their scheme.
Prognostic factors for early severity in a childhood multiple sclerosis cohort.
Mikaeloff, Yann; Caridade, Guillaume; Assi, Saada; Suissa, Samy; Tardieu, Marc
2006-09-01
The goal was to identify prognostic factors for an early severe course in a cohort of patients with childhood-onset multiple sclerosis, for the construction of a predictive tool. The cohort consisted of 197 children from the French Kid Sclérose en Plaques neuropediatric cohort with relapsing/remitting multiple sclerosis beginning before the age of 16 years. Patients were included from 1990 to 2003. We used multivariate survival analysis (Cox model) to evaluate the prognostic value of clinical, MRI, and biological covariates at onset for the occurrence of a third attack or severe disability ("severity" outcome). The cohort was monitored for a mean of 5.5 +/- 3.6 years. The "severity" outcome was recorded for 144 patients (73%). The risk of severity was higher for girls, for a time between the first and second attacks of < 1 year, for childhood-onset multiple sclerosis MRI criteria at onset, for an absence of severe mental state changes at onset, and for a progressive course. A derived childhood-onset multiple sclerosis potential index for early severity was found to have a positive predictive value for severity of > 35% for the upper 2 quartiles. The clinical and MRI prognostic factors for early severity that were identified were used as the basis of a predictive tool, which will be validated in another cohort. This tool should make it possible to identify subgroups at risk of early severe disease and should facilitate therapeutic studies.
Attack Classification Schema for Smart City WSNs
Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena
2017-01-01
Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN. PMID:28379192
Attack Classification Schema for Smart City WSNs.
Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena
2017-04-05
Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.
Long-term effect of September 11 on the political behavior of victims’ families and neighbors
Hersh, Eitan D.
2013-01-01
This article investigates the long-term effect of September 11, 2001 on the political behaviors of victims’ families and neighbors. Relative to comparable individuals, family members and residential neighbors of victims have become—and have stayed—significantly more active in politics in the last 12 years, and they have become more Republican on account of the terrorist attacks. The method used to demonstrate these findings leverages the random nature of the terrorist attack to estimate a causal effect and exploits new techniques to link multiple, individual-level, governmental databases to measure behavioral change without relying on surveys or aggregate analysis. PMID:24324145
Long-term effect of September 11 on the political behavior of victims' families and neighbors.
Hersh, Eitan D
2013-12-24
This article investigates the long-term effect of September 11, 2001 on the political behaviors of victims' families and neighbors. Relative to comparable individuals, family members and residential neighbors of victims have become--and have stayed--significantly more active in politics in the last 12 years, and they have become more Republican on account of the terrorist attacks. The method used to demonstrate these findings leverages the random nature of the terrorist attack to estimate a causal effect and exploits new techniques to link multiple, individual-level, governmental databases to measure behavioral change without relying on surveys or aggregate analysis.
Collusion-resistant multimedia fingerprinting: a unified framework
NASA Astrophysics Data System (ADS)
Wu, Min; Trappe, Wade; Wang, Z. Jane; Liu, K. J. Ray
2004-06-01
Digital fingerprints are unique labels inserted in different copies of the same content before distribution. Each digital fingerprint is assigned to an inteded recipient, and can be used to trace the culprits who use their content for unintended purposes. Attacks mounted by multiple users, known as collusion attacks, provide a cost-effective method for attenuating the identifying fingerprint from each coluder, thus collusion poses a reeal challenge to protect the digital media data and enforce usage policies. This paper examines a few major design methodologies for collusion-resistant fingerprinting of multimedia, and presents a unified framework that helps highlight the common issues and the uniqueness of different fingerprinting techniques.
DoS detection in IEEE 802.11 with the presence of hidden nodes
Soryal, Joseph; Liu, Xijie; Saadawi, Tarek
2013-01-01
The paper presents a novel technique to detect Denial of Service (DoS) attacks applied by misbehaving nodes in wireless networks with the presence of hidden nodes employing the widely used IEEE 802.11 Distributed Coordination Function (DCF) protocols described in the IEEE standard [1]. Attacker nodes alter the IEEE 802.11 DCF firmware to illicitly capture the channel via elevating the probability of the average number of packets transmitted successfully using up the bandwidth share of the innocent nodes that follow the protocol standards. We obtained the theoretical network throughput by solving two-dimensional Markov Chain model as described by Bianchi [2], and Liu and Saadawi [3] to determine the channel capacity. We validated the results obtained via the theoretical computations with the results obtained by OPNET simulator [4] to define the baseline for the average attainable throughput in the channel under standard conditions where all nodes follow the standards. The main goal of the DoS attacker is to prevent the innocent nodes from accessing the channel and by capturing the channel’s bandwidth. In addition, the attacker strives to appear as an innocent node that follows the standards. The protocol resides in every node to enable each node to police other nodes in its immediate wireless coverage area. All innocent nodes are able to detect and identify the DoS attacker in its wireless coverage area. We applied the protocol to two Physical Layer technologies: Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS) and the results are presented to validate the algorithm. PMID:25685510
DoS detection in IEEE 802.11 with the presence of hidden nodes.
Soryal, Joseph; Liu, Xijie; Saadawi, Tarek
2014-07-01
The paper presents a novel technique to detect Denial of Service (DoS) attacks applied by misbehaving nodes in wireless networks with the presence of hidden nodes employing the widely used IEEE 802.11 Distributed Coordination Function (DCF) protocols described in the IEEE standard [1]. Attacker nodes alter the IEEE 802.11 DCF firmware to illicitly capture the channel via elevating the probability of the average number of packets transmitted successfully using up the bandwidth share of the innocent nodes that follow the protocol standards. We obtained the theoretical network throughput by solving two-dimensional Markov Chain model as described by Bianchi [2], and Liu and Saadawi [3] to determine the channel capacity. We validated the results obtained via the theoretical computations with the results obtained by OPNET simulator [4] to define the baseline for the average attainable throughput in the channel under standard conditions where all nodes follow the standards. The main goal of the DoS attacker is to prevent the innocent nodes from accessing the channel and by capturing the channel's bandwidth. In addition, the attacker strives to appear as an innocent node that follows the standards. The protocol resides in every node to enable each node to police other nodes in its immediate wireless coverage area. All innocent nodes are able to detect and identify the DoS attacker in its wireless coverage area. We applied the protocol to two Physical Layer technologies: Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS) and the results are presented to validate the algorithm.
[Clinical patterns and stages of multiple organ failure in the elderly].
Wang, S
1990-05-01
Multiple organ failure in the elderly (MOFE) is a new clinical syndrome different from multiple organ failure (MOF) caused by trauma occurring most often in young and mid-aged persons. The authors retrospectively analysed 158 cases of MOFE hospitalized in the past 12 years and commented on its definition, diagnostic criteria, clinical patterns and stages. The suggested definition of MOFE is the sequential 2 or more organs failure within a short period in the elderly patients (greater than or equal to 60 years old) with multiple organ chronic diseases in the presence of aging of organs and age-related malfunction. The most common precipitating factors are pulmonary infections and acute attack of chronic cardiac, cerebral and renal diseases. The interval between failures of various organs is mostly less than 10 days and seldom longer than 1 month. MOFE has 3 different patterns: rapid pattern with single phase; delayed pattern with two phases and recurrent pattern with multiple phase. In the last pattern the patients suffer from multiple attacks of multiple organ failure. It is only seen in MOFE, but not in MOF. The presentation of this particular pattern is related to the following facts: (1). A few organs or only the heart and lungs are involved. (2) Kidney, brain and hemopoietic system etc. usually with poor prognosis are not involved. (3) The age of patients are relatively younger. (4) More resuscitation experiences have been accumulated and better resuscitation measures are available. The clinical course of MOFE can be divided into 3 stages: prefailure stage (stage I), failure compensations stage (stage II) and decompensation stage (stage III).(ABSTRACT TRUNCATED AT 250 WORDS)
TSARINA: A computer model for assessing conventional and chemical attacks on air bases
DOE Office of Scientific and Technical Information (OSTI.GOV)
Emerson, D.E.; Wegner, L.H.
This Note describes the latest version of the TSARINA (TSAR INputs using AIDA) airbase damage assessment computer program that has been developed to estimate the on-base concentration of toxic agents that would be deposited by a chemical attack and to assess losses to various on-base resources from conventional attacks, as well as the physical damage to runways, taxiways, buildings, and other facilities. Although the model may be used as a general-purpose, complex-target damage assessment model, its primary role in intended to be in support of the TSAR (Theater Simulation of Airbase Resources) aircraft sortie generation simulation program. When used withmore » TSAR, multiple trials of a multibase airbase-attack campaign can be assessed with TSARINA, and the impact of those attacks on sortie generation can be derived using the TSAR simulation model. TSARINA, as currently configured, permits damage assessments of attacks on an airbase (or other) complex that is compassed of up to 1000 individual targets (buildings, taxiways, etc,), and 2500 packets of resources. TSARINA determines the actual impact points (pattern centroids for CBUs and container burst point for chemical weapons) by Monte Carlo procedures-i.e., by random selections from the appropriate error distributions. Uncertainties in wind velocity and heading are also considered for chemical weapons. Point-impact weapons that impact within a specified distance of each target type are classed as hits, and estimates of the damage to the structures and to the various classes of support resources are assessed using cookie-cutter weapon-effects approximations.« less
Security enhanced BioEncoding for protecting iris codes
NASA Astrophysics Data System (ADS)
Ouda, Osama; Tsumura, Norimichi; Nakaguchi, Toshiya
2011-06-01
Improving the security of biometric template protection techniques is a key prerequisite for the widespread deployment of biometric technologies. BioEncoding is a recently proposed template protection scheme, based on the concept of cancelable biometrics, for protecting biometric templates represented as binary strings such as iris codes. The main advantage of BioEncoding over other template protection schemes is that it does not require user-specific keys and/or tokens during verification. Besides, it satisfies all the requirements of the cancelable biometrics construct without deteriorating the matching accuracy. However, although it has been shown that BioEncoding is secure enough against simple brute-force search attacks, the security of BioEncoded templates against more smart attacks, such as record multiplicity attacks, has not been sufficiently investigated. In this paper, a rigorous security analysis of BioEncoding is presented. Firstly, resistance of BioEncoded templates against brute-force attacks is revisited thoroughly. Secondly, we show that although the cancelable transformation employed in BioEncoding might be non-invertible for a single protected template, the original iris code could be inverted by correlating several templates used in different applications but created from the same iris. Accordingly, we propose an important modification to the BioEncoding transformation process in order to hinder attackers from exploiting this type of attacks. The effectiveness of adopting the suggested modification is validated and its impact on the matching accuracy is investigated empirically using CASIA-IrisV3-Interval dataset. Experimental results confirm the efficacy of the proposed approach and show that it preserves the matching accuracy of the unprotected iris recognition system.
Information Systems at Enterprise. Design of Secure Network of Enterprise
NASA Astrophysics Data System (ADS)
Saigushev, N. Y.; Mikhailova, U. V.; Vedeneeva, O. A.; Tsaran, A. A.
2018-05-01
No enterprise and company can do without designing its own corporate network in today's information society. It accelerates and facilitates the work of employees at any level, but contains a big threat to confidential information of the company. In addition to the data theft attackers, there are plenty of information threats posed by modern malware effects. In this regard, the computational security of corporate networks is an important component of modern information technologies of computer security for any enterprise. This article says about the design of the protected corporate network of the enterprise that provides the computers on the network access to the Internet, as well interoperability with the branch. The access speed to the Internet at a high level is provided through the use of high-speed access channels and load balancing between devices. The security of the designed network is performed through the use of VLAN technology as well as access lists and AAA server.
Threats and risks to information security: a practical analysis of free access wireless networks
NASA Astrophysics Data System (ADS)
Quirumbay, Daniel I.; Coronel, Iván. A.; Bayas, Marcia M.; Rovira, Ronald H.; Gromaszek, Konrad; Tleshova, Akmaral; Kozbekova, Ainur
2017-08-01
Nowadays, there is an ever-growing need to investigate, consult and communicate through the internet. This need leads to the intensification of free access to the web in strategic and functional points for the benefit of the community. However, this open access is also related to the increase of information insecurity. The existing works on computer security primarily focus on the development of techniques to reduce cyber-attacks. However, these approaches do not address the sector of inexperienced users who have difficulty understanding browser settings. Two methods can solve this problem: first the development of friendly browsers with intuitive setups for new users and on the other hand, by implementing awareness programs on essential security without deepening on technical information. This article addresses an analysis of the vulnerabilities of wireless equipment that provides internet service in the open access zones and the potential risks that could be found when using these means.
Methods and devices for determining quality of services of storage systems
Seelam, Seetharami R [Yorktown Heights, NY; Teller, Patricia J [Las Cruces, NM
2012-01-17
Methods and systems for allowing access to computer storage systems. Multiple requests from multiple applications can be received and processed efficiently to allow traffic from multiple customers to access the storage system concurrently.
Invasive plant species and the new bioeconomy
USDA-ARS?s Scientific Manuscript database
Simulation models of management effects on weed demography and the experience of successful organic and low-external-input farmers point in the same direction: long-term weed management success depends on diversified strategies that attack multiple weed life stages. In an era of declining research b...
Video multiple watermarking technique based on image interlacing using DWT.
Ibrahim, Mohamed M; Abdel Kader, Neamat S; Zorkany, M
2014-01-01
Digital watermarking is one of the important techniques to secure digital media files in the domains of data authentication and copyright protection. In the nonblind watermarking systems, the need of the original host file in the watermark recovery operation makes an overhead over the system resources, doubles memory capacity, and doubles communications bandwidth. In this paper, a robust video multiple watermarking technique is proposed to solve this problem. This technique is based on image interlacing. In this technique, three-level discrete wavelet transform (DWT) is used as a watermark embedding/extracting domain, Arnold transform is used as a watermark encryption/decryption method, and different types of media (gray image, color image, and video) are used as watermarks. The robustness of this technique is tested by applying different types of attacks such as: geometric, noising, format-compression, and image-processing attacks. The simulation results show the effectiveness and good performance of the proposed technique in saving system resources, memory capacity, and communications bandwidth.
NASA Technical Reports Server (NTRS)
1977-01-01
Multiple access techniques (FDMA, CDMA, TDMA) for the mobile user and attempts to identify the current best technique are discussed. Traffic loading is considered as well as voice and data modulation and spacecraft and system design. Emphasis is placed on developing mobile terminal cost estimates for the selected design. In addition, design examples are presented for the alternative techniques of multiple access in order to compare with the selected technique.
Simple mathematical law benchmarks human confrontations
Johnson, Neil F.; Medina, Pablo; Zhao, Guannan; Messinger, Daniel S.; Horgan, John; Gill, Paul; Bohorquez, Juan Camilo; Mattson, Whitney; Gangi, Devon; Qi, Hong; Manrique, Pedro; Velasquez, Nicolas; Morgenstern, Ana; Restrepo, Elvira; Johnson, Nicholas; Spagat, Michael; Zarama, Roberto
2013-01-01
Many high-profile societal problems involve an individual or group repeatedly attacking another – from child-parent disputes, sexual violence against women, civil unrest, violent conflicts and acts of terror, to current cyber-attacks on national infrastructure and ultrafast cyber-trades attacking stockholders. There is an urgent need to quantify the likely severity and timing of such future acts, shed light on likely perpetrators, and identify intervention strategies. Here we present a combined analysis of multiple datasets across all these domains which account for >100,000 events, and show that a simple mathematical law can benchmark them all. We derive this benchmark and interpret it, using a minimal mechanistic model grounded by state-of-the-art fieldwork. Our findings provide quantitative predictions concerning future attacks; a tool to help detect common perpetrators and abnormal behaviors; insight into the trajectory of a ‘lone wolf'; identification of a critical threshold for spreading a message or idea among perpetrators; an intervention strategy to erode the most lethal clusters; and more broadly, a quantitative starting point for cross-disciplinary theorizing about human aggression at the individual and group level, in both real and online worlds. PMID:24322528
Plant Responses to Pathogen Attack: Small RNAs in Focus.
Islam, Waqar; Noman, Ali; Qasim, Muhammad; Wang, Liande
2018-02-08
Small RNAs (sRNA) are a significant group of gene expression regulators for multiple biological processes in eukaryotes. In plants, many sRNA silencing pathways produce extensive array of sRNAs with specialized roles. The evidence on record advocates for the functions of sRNAs during plant microbe interactions. Host sRNAs are reckoned as mandatory elements of plant defense. sRNAs involved in plant defense processes via different pathways include both short interfering RNA (siRNA) and microRNA (miRNA) that actively regulate immunity in response to pathogenic attack via tackling pathogen-associated molecular patterns (PAMPs) and other effectors. In response to pathogen attack, plants protect themselves with the help of sRNA-dependent immune systems. That sRNA-mediated plant defense responses play a role during infections is an established fact. However, the regulations of several sRNAs still need extensive research. In this review, we discussed the topical advancements and findings relevant to pathogen attack and plant defense mediated by sRNAs. We attempted to point out diverse sRNAs as key defenders in plant systems. It is hoped that sRNAs would be exploited as a mainstream player to achieve food security by tackling different plant diseases.
Plant Responses to Pathogen Attack: Small RNAs in Focus
2018-01-01
Small RNAs (sRNA) are a significant group of gene expression regulators for multiple biological processes in eukaryotes. In plants, many sRNA silencing pathways produce extensive array of sRNAs with specialized roles. The evidence on record advocates for the functions of sRNAs during plant microbe interactions. Host sRNAs are reckoned as mandatory elements of plant defense. sRNAs involved in plant defense processes via different pathways include both short interfering RNA (siRNA) and microRNA (miRNA) that actively regulate immunity in response to pathogenic attack via tackling pathogen-associated molecular patterns (PAMPs) and other effectors. In response to pathogen attack, plants protect themselves with the help of sRNA-dependent immune systems. That sRNA-mediated plant defense responses play a role during infections is an established fact. However, the regulations of several sRNAs still need extensive research. In this review, we discussed the topical advancements and findings relevant to pathogen attack and plant defense mediated by sRNAs. We attempted to point out diverse sRNAs as key defenders in plant systems. It is hoped that sRNAs would be exploited as a mainstream player to achieve food security by tackling different plant diseases. PMID:29419801
Learning consensus in adversarial environments
NASA Astrophysics Data System (ADS)
Vamvoudakis, Kyriakos G.; García Carrillo, Luis R.; Hespanha, João. P.
2013-05-01
This work presents a game theory-based consensus problem for leaderless multi-agent systems in the presence of adversarial inputs that are introducing disturbance to the dynamics. Given the presence of enemy components and the possibility of malicious cyber attacks compromising the security of networked teams, a position agreement must be reached by the networked mobile team based on environmental changes. The problem is addressed under a distributed decision making framework that is robust to possible cyber attacks, which has an advantage over centralized decision making in the sense that a decision maker is not required to access information from all the other decision makers. The proposed framework derives three tuning laws for every agent; one associated with the cost, one associated with the controller, and one with the adversarial input.
Maddula, Mohana; Adams, Laura; Donnelly, Jonathan
2018-06-01
Background : Transient Ischaemic Attacks (TIA) should be treated as a medical emergency. While high-risk TIAs have higher stroke risks than low-risk patients, there is an inherent limitation to this risk stratification, as some low-risk patients may have undiagnosed high-risk conditions. Inequity of care for TIA patients was observed, such that high-risk patients received urgent assessment through acute admission, while low-risk patients faced long waits for clinical consultation. A redesign of the TIA service was planned to offer timely assessment for all patients and avoid acute admission for high-risk patients. Methods : Service reconfiguration was undertaken to set up a daily weekday rapid access TIA clinic where patients would be assessed, investigated, and treated. Results : A re-audit of clinic performance showed a significant increase in the number of patients seen in the ages of 18 to 52. The median time from referral to clinical consultation improved from 10 days to 1. There were similar significant improvements seen in median time to brain imaging (from 10.5 days to 1), and carotid ultrasound (from 10 days to all scans being performed on the same day). Conclusions : The redesigned service achieved the objective of offering urgent assessment and investigations for all TIA patients, including low-risk patients, while avoiding the acute admission for high-risk patients. We share our experience of establishing a successful rapid access ambulatory service without any additional resources.
Kumar, Supriya; Piper, Kaitlin; Galloway, David D; Hadler, James L; Grefenstette, John J
2015-09-23
In New Haven County, CT (NHC), influenza hospitalization rates have been shown to increase with census tract poverty in multiple influenza seasons. Though multiple factors have been hypothesized to cause these inequalities, including population structure, differential vaccine uptake, and differential access to healthcare, the impact of each in generating observed inequalities remains unknown. We can design interventions targeting factors with the greatest explanatory power if we quantify the proportion of observed inequalities that hypothesized factors are able to generate. Here, we ask if population structure is sufficient to generate the observed area-level inequalities in NHC. To our knowledge, this is the first use of simulation models to examine the causes of differential poverty-related influenza rates. Using agent-based models with a census-informed, realistic representation of household size, age-structure, population density in NHC census tracts, and contact rates in workplaces, schools, households, and neighborhoods, we measured poverty-related differential influenza attack rates over the course of an epidemic with a 23 % overall clinical attack rate. We examined the role of asthma prevalence rates as well as individual contact rates and infection susceptibility in generating observed area-level influenza inequalities. Simulated attack rates (AR) among adults increased with census tract poverty level (F = 30.5; P < 0.001) in an epidemic caused by a virus similar to A (H1N1) pdm09. We detected a steeper, earlier influenza rate increase in high-poverty census tracts-a finding that we corroborate with a temporal analysis of NHC surveillance data during the 2009 H1N1 pandemic. The ratio of the simulated adult AR in the highest- to lowest-poverty tracts was 33 % of the ratio observed in surveillance data. Increasing individual contact rates in the neighborhood did not increase simulated area-level inequalities. When we modified individual susceptibility such that it was inversely proportional to household income, inequalities in AR between high- and low-poverty census tracts were comparable to those observed in reality. To our knowledge, this is the first study to use simulations to probe the causes of observed inequalities in influenza disease patterns. Knowledge of the causes and their relative explanatory power will allow us to design interventions that have the greatest impact on reducing inequalities. Differential exposure due to population structure in our realistic simulation model explains a third of the observed inequality. Differential susceptibility to disease due to prevailing chronic conditions, vaccine uptake, and smoking should be considered in future models in order to quantify the role of additional factors in generating influenza inequalities.
'Heart attack' symptoms and decision-making: the case of older rural women.
Jackson, M N G; McCulloch, B J
2014-01-01
Women are just as vulnerable to 'heart attacks' (used throughout this study to mean 'myocardial infarction') as men and are often unaware of many associated symptoms. Researchers have illustrated that women have difficulty identifying the symptoms of cardiovascular disease, with patients often delaying treatment after the onset of symptoms. Some individuals wait hours or even days before seeking medical care. This is particularly concerning for older rural women because the rates of death from cardiovascular disease and cancer are higher in some rural areas. Despite idealistic views of country life as being active, less stressful, and possessing strong social and community support, rural Americans are more likely than their urban counterparts to face challenges to maintaining health.
The purpose of this paper is to utilize information gathered from a qualitative study exploring older rural women's identification of symptoms and health decision-making specific to heart attack vignettes. Snowball sampling was the main approach utilized to access participants; after an initial contact was successful, participants contacted additional older rural women to see if they might be willing to participate in an interview. This resulted in a final sample of 33 women who resided in rural Midwestern areas of the USA, were 65 years or older, lived in a county defined as rural by the US Census, and were willing to participate in a face-to-face interview. Each interview included a demographic questionnaire, a health questionnaire, and three health vignettes with follow-up questions. Vignettes provided a way of initiating discussions about health decisions without invading the privacy known to be important to rural residents. The term 'heart attack' was used in the interviews because it was thought to be better recognised than the medical term 'myocardial infarction'. All data were audio taped, transcribed, and coded using line-by-line coding. Data were analyzed using content analysis. The study showed that women had difficulty identifying heart attack symptoms when they did not have previous exposure to the symptoms either through personal experience or educational programs. Individuals incorrectly identified symptoms of a heart attack by associating symptoms with sleep problems, stroke, arthritis, stiffness in the neck, influenza, nerve damage, osteoporosis, bone cancer, tooth infection, and a pulled muscle. Misdiagnosis of symptoms most often led to a delay in seeking treatment in these women. Additionally, the women in this study discussed a reluctance to access care because of concerns related to maintaining their privacy, belief that the ambulance would take too long to reach them, and they did not want to bother their relatives for help. The findings of this study suggest implications for educational programs and interventions in rural environments and provide information that can facilitate better-informed communication between healthcare professionals and rural women.
Distributed reservation-based code division multiple access
NASA Astrophysics Data System (ADS)
Wieselthier, J. E.; Ephremides, A.
1984-11-01
The use of spread spectrum signaling, motivated primarily by its antijamming capabilities in military applications, leads naturally to the use of Code Division Multiple Access (CDMA) techniques that permit the successful simultaneous transmission by a number of users over a wideband channel. In this paper we address some of the major issues that are associated with the design of multiple access protocols for spread spectrum networks. We then propose, analyze, and evaluate a distributed reservation-based multiple access protocol that does in fact exploit CDMA properties. Especially significant is the fact that no acknowledgment or feedback information from the destination is required (thus facilitating communication with a radio-silent mode), nor is any form of coordination among the users necessary.
Hazin, Fábio H V; Afonso, André S; De Castilho, Pedro C; Ferreira, Luciana C; Rocha, Bruno C L M
2013-09-01
An abnormally high shark attack rate verified off Recife could be related to migratory behavior of tiger sharks. This situation started after the construction of the Suape port to the south of Recife. A previous study suggested that attacking sharks could be following northward currents and that they were being attracted shoreward by approaching vessels. In this scenario, such northward movement pattern could imply a higher probability of sharks accessing the littoral area of Recife after leaving Suape. Pop-up satellite archival tags were deployed on five tiger sharks caught off Recife to assess their movement patterns off northeastern Brazil. All tags transmitted from northward latitudes after 7-74 days of freedom. The shorter, soak distance between deployment and pop-up locations ranged between 33-209 km and implied minimum average speeds of 0.02-0.98 km.h-1. Both pop-up locations and depth data suggest that tiger shark movements were conducted mostly over the continental shelf. The smaller sharks moved to deeper waters within 24 hours after releasing, but they assumed a shallower (< 50 m) vertical distribution for most of the monitoring period. While presenting the first data on tiger shark movements in the South Atlantic, this study also adds new information for the reasoning of the high shark attack rate verified in this region.
Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho
2016-08-16
In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.'s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.'s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.
Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks
Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly
2014-01-01
Hybrid mobile applications (apps) combine the features of Web applications and “native” mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources—file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies “bridges” that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources—the ability to read and write contacts list, local files, etc.—to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign-origin Web content and explain why they are ineffectual. We then present NoFrak, a capability-based defense against fracking attacks. NoFrak is platform-independent, compatible with any framework and embedded browser, requires no changes to the code of the existing hybrid apps, and does not break their advertising-supported business model. PMID:25485311
Zarqawi’s Sfumato: Operational Art in Irregular Warfare
2013-05-23
in Baghdad and Karbala during the Shia festival of Ashura in March of 2004.80 These attacks were preceded by the bombing of the Jordanian embassy...American contractors Nick Berg and Eugene Armstrong. Zarqawi released edited videos with music and logos detailing multiple suicide bombings against
Surveillance versus Privacy: Considerations for the San Bernardino Community
ERIC Educational Resources Information Center
Price, Robert
2017-01-01
This privacy versus security doctoral research examines existing literature, policies, and perceptions to identify the effects of the 2015 San Bernardino terrorist attack on the San Bernardino community. This study contributes to identifying factors that influence perceptions of governmental surveillance. Multiple articles contribute to the…
Mirabella, S; Fibbi, G; Matassini, C; Faggi, C; Goti, A; Cardona, F
2017-11-07
A dual synthetic strategy to afford 2-substituted trihydroxypiperidines is disclosed. The procedure involved Grignard addition either to a carbohydrate-derived aldehyde or to a nitrone derived thereof, and took advantage of an efficient ring-closure reductive amination strategy in the final cyclization step. An opposite diastereofacial preference was demonstrated in the nucleophilic attack to the two electrophiles, which would finally produce the same piperidine diastereoisomer as the major product. However, use of a suitable Lewis acid in the Grignard addition to the nitrone allowed reversing the selectivity, giving access to 2-substituted piperidines with the opposite configuration at C-2.
Traffic handling capability of a broadband indoor wireless network using CDMA multiple access
NASA Astrophysics Data System (ADS)
Zhang, Chang G.; Hafez, H. M.; Falconer, David D.
1994-05-01
CDMA (code division multiple access) may be an attractive technique for wireless access to broadband services because of its multiple access simplicity and other appealing features. In order to investigate traffic handling capabilities of a future network providing a variety of integrated services, this paper presents a study of a broadband indoor wireless network supporting high-speed traffic using CDMA multiple access. The results are obtained through the simulation of an indoor environment and the traffic capabilities of the wireless access to broadband 155.5 MHz ATM-SONET networks using the mm-wave band. A distributed system architecture is employed and the system performance is measured in terms of call blocking probability and dropping probability. The impacts of the base station density, traffic load, average holding time, and variable traffic sources on the system performance are examined. The improvement of system performance by implementing various techniques such as handoff, admission control, power control and sectorization are also investigated.
M. Lake Maner; James Hanula; S. Kristine Braman
2013-01-01
Fine mesh screen was used to create a physical barrier to prevent redbay ambrosia beetles, Xyleborus glabratus Eichhoff (Coleoptera: Curculionidae: Scolytinae), from accessing various parts of the boles of redbay trees, Persea borbonia (L.) Sprengel, and infecting them with the laurel wilt fungus, Raffaelea lauricola...
Recruiting 21st Century Army Warriors: A Task Requiring National Attention
2007-02-04
Millennials , Advertising, GED, Obesity CLASSIFICATION: Unclassified Following the terrorist attacks on September 11, 2001, the United States...are barring recruiters from gaining access to some campuses. The Millennial Generation Generational attitudes also negatively impact the Army’s...recruiting efforts. The majority of the young men and women the Army seeks to recruit today are often referred to as the “ Millennial Generation
Deploying Crowd-Sourced Formal Verification Systems in a DoD Network
2013-09-01
INTENTIONALLY LEFT BLANK 1 I. INTRODUCTION A. INTRODUCTION In 2014 cyber attacks on critical infrastructure are expected to increase...CSFV systems on the Internet‒‒possibly using cloud infrastructure (Dean, 2013). By using Amazon Compute Cloud (EC2) systems, DARPA will use ordinary...through standard access methods. Those clients could be mobile phones, laptops, netbooks, tablet computers or personal digital assistants (PDAs) (Smoot
Military Veterans Face Challenges in Accessing Educational Benefits at Florida Community Colleges
ERIC Educational Resources Information Center
Spiro, Rivka; Hill, Robert
2010-01-01
Florida's community colleges are seeing an influx of students who face unique challenges. They are the men and women who served in the military after the attacks of September 11, 2001, and who are now attending college on the new Post-9/11 GI Bill, with its greatly enhanced educational benefits, and on the expanded, old Montgomery GI Bill, which…
1990-07-01
i k RAYMOND P. URTZ, JR. Technical Director Directorate of Command & Control FOR TH!E C0OKANDER: IGOR G. PLONISCH Directorate of Plans & Programs If...access controls and for thwarting inference and aggregation attacks ae generally considered inadequate for high usurance systems. Consequently, thee is...requirements was to have been based on a state-of-the-art survey involving interviews with TDBMS researchers and developers and security officers and auditors
Soldier Data Tag Study Effort.
1985-06-10
interested in protecting it. The tag itself is difficult--though not impossible--to counterfeit . Also, it (’• iii 71 -, potentially improves the data...attacks during the design, manufacture, and distribution processes, counterfeiting , unauthorized access/alteration of tag data, and use of the tag to...45 3.3.2 Hijacking of SOT System Shipments, or Large- Scale Counterfeit of SOT Systems ....................... 46 3.3.3 Unauthorized Alteration
ERIC Educational Resources Information Center
Attewell, Paul; Lavin, David; Domina, Thurston; Levey, Tania
2009-01-01
The steady expansion of college enrollment rates over the last generation has been heralded as a major step toward reducing chronic economic disparities. But many of the policies that broadened access to higher education--including affirmative action, open admissions, and need-based financial aid--have come under attack in recent years by critics…
1989-05-01
ADORESS (City, .,n Zip Co4k) 10. SOURCE OF FUNDING NUMBERS PROGRAM ELEMENT PROJECT NO.1 TASK NO. ACCESSION NO. WORK UNIT 11. TITLE (Includ. Securily ...gaining military advantage, had insisted on reciprocal (albeit asymmetrical if necessary) force reductions. But Gorbachev, perceiving the growing need...fortifications backed up by mobile counter-attack forces--appears identical in the forward region. The existence of rapidly mobilizable second-echelon forces in
Redwood-Campbell, Lynda J; Sekhar, Sharonya N; Persaud, Christine R
2014-10-01
Violence against humanitarian health care workers and facilities in situations of armed conflict is a serious humanitarian problem. Targeting health care workers and destroying or looting medical facilities directly or indirectly impacts the delivery of emergency and life-saving medical assistance, often at a time when it is most needed. Attacks may be intentional or unintentional and can take a range of forms from road blockades and check points which delay or block transport, to the direct targeting of hospitals, attacks against medical personnel, suppliers, patients, and armed entry into health facilities. Lack of access to vital health care services weakens the entire health system and exacerbates existing vulnerabilities, particularly among communities of women, children, the elderly, and the disabled, or anyone else in need of urgent or chronic care. Health care workers, especially local workers, are often the target. This report reviews the work being spearheaded by the Red Cross and Red Crescent Movement on the Health Care in Danger initiative, which aims to strengthen the protections for health care workers and facilities in armed conflicts and ensure safe access for patients. This includes a review of internal reports generated from the expert workshops on a number of topics as well as a number of public sources documenting innovative coping mechanisms adopted by National Red Cross and Red Crescent Societies. The work of other organizations is also briefly examined. This is followed by a review of security mechanisms within the humanitarian sector to ensure the safety and security of health care personnel operating in armed conflicts. From the existing literature, a number of gaps have been identified with current security frameworks that need to be addressed to improve the safety of health care workers and ensure the protection and access of vulnerable populations requiring assistance. A way forward for policy, research, and practice is proposed for consideration. While there is work being done to improve conditions for health care personnel and patients, there need to be concerted actions to stigmatize attacks against workers, facilities, and patients to protect the neutrality of the medical mission.
2015-01-01
This research has the purpose to establish a foundation for new classification and estimation of CDMA signals. Keywords: DS / CDMA signals, BPSK, QPSK...DEVELOPMENT OF THE AVERAGE LIKELIHOOD FUNCTION FOR CODE DIVISION MULTIPLE ACCESS ( CDMA ) USING BPSK AND QPSK SYMBOLS JANUARY 2015...To) OCT 2013 – OCT 2014 4. TITLE AND SUBTITLE DEVELOPMENT OF THE AVERAGE LIKELIHOOD FUNCTION FOR CODE DIVISION MULTIPLE ACCESS ( CDMA ) USING BPSK
Sutrala, Anil Kumar; Das, Ashok Kumar; Odelu, Vanga; Wazid, Mohammad; Kumari, Saru
2016-10-01
Information and communication and technology (ICT) has changed the entire paradigm of society. ICT facilitates people to use medical services over the Internet, thereby reducing the travel cost, hospitalization cost and time to a greater extent. Recent advancements in Telecare Medicine Information System (TMIS) facilitate users/patients to access medical services over the Internet by gaining health monitoring facilities at home. Amin and Biswas recently proposed a RSA-based user authentication and session key agreement protocol usable for TMIS, which is an improvement over Giri et al.'s RSA-based user authentication scheme for TMIS. In this paper, we show that though Amin-Biswas's scheme considerably improves the security drawbacks of Giri et al.'s scheme, their scheme has security weaknesses as it suffers from attacks such as privileged insider attack, user impersonation attack, replay attack and also offline password guessing attack. A new RSA-based user authentication scheme for TMIS is proposed, which overcomes the security pitfalls of Amin-Biswas's scheme and also preserves user anonymity property. The careful formal security analysis using the two widely accepted Burrows-Abadi-Needham (BAN) logic and the random oracle models is done. Moreover, the informal security analysis of the scheme is also done. These security analyses show the robustness of our new scheme against the various known attacks as well as attacks found in Amin-Biswas's scheme. The simulation of the proposed scheme using the widely accepted Automated Validation of Internet Security Protocols and Applications (AVISPA) tool is also done. We present a new user authentication and session key agreement scheme for TMIS, which fixes the mentioned security pitfalls found in Amin-Biswas's scheme, and we also show that the proposed scheme provides better security than other existing schemes through the rigorous security analysis and verification tool. Furthermore, we present the formal security verification of our scheme using the widely accepted AVISPA tool. High security and extra functionality features allow our proposed scheme to be applicable for telecare medicine information systems which is used for e-health care medical applications. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Ding, Zheyuan; Zhai, Yujia; Wu, Chen; Wu, Haocheng; Lu, Qinbao; Lin, Junfen; He, Fan
2017-06-01
In China, waterborne outbreaks of infectious diarrheal disease mainly occur in schools, and contaminated well water is a common source of pathogens. The objective of this review was to present the attack rates, durations of outbreak, pathogens of infectious diarrheal disease, and sanitary conditions of wells in primary and secondary schools in China, and to analyze risk factors and susceptibility of school children. Relevant articles and reports were identified by searching PubMed, Web of Science, China National Knowledge Infrastructure, China Information System for Disease Control and Prevention, and the Chinese Field Epidemiology Training Program. Essential information, including urban/rural areas, school types, attack rates, pathogens, durations of outbreak, report intervals, and interventions were extracted from the eligible articles. Wilcoxon signed-rank test, Kruskal-Wallis H test, and Spearman correlation test were conducted in statistical analyses. Sex- and age-specific attack rate ratios were calculated as pooled effect sizes. We screened 2188 articles and retrieved data of 85 outbreaks from 1987 to 2014. Attack rates of outbreaks in rural areas (median, 12.63 cases/100 persons) and in primary schools (median, 14.54 cases/100 persons) were higher than those in urban areas (median, 5.62 cases/100 persons) and in secondary schools (median, 8.74 cases/100 persons) (P = 0.004 and P = 0.013, respectively). Shigella, pathogenic Escherichia coli, and norovirus were the most common pathogens. Boys tended toward higher attack rates than girls (sex-specific attack rate ratio, 1.13; 95% CI, 1.00-1.29, P = 0.05). Unsanitary conditions of water wells were reported frequently, and unhealthy behavior habits were common in students. School children were susceptible to waterborne disease in China. Chinese government should make efforts to improve access to safe water in schools. Health education promotion and conscientiousness of school leaders and teachers should be enhanced. Copyright © 2017. Production and hosting by Elsevier B.V.
Das, Ashok Kumar
2015-03-01
Recent advanced technology enables the telecare medicine information system (TMIS) for the patients to gain the health monitoring facility at home and also to access medical services over the Internet of mobile networks. Several remote user authentication schemes have been proposed in the literature for TMIS. However, most of them are either insecure against various known attacks or they are inefficient. Recently, Tan proposed an efficient user anonymity preserving three-factor authentication scheme for TMIS. In this paper, we show that though Tan's scheme is efficient, it has several security drawbacks such as (1) it fails to provide proper authentication during the login phase, (2) it fails to provide correct updation of password and biometric of a user during the password and biometric update phase, and (3) it fails to protect against replay attack. In addition, Tan's scheme lacks the formal security analysis and verification. Later, Arshad and Nikooghadam also pointed out some security flaws in Tan's scheme and then presented an improvement on Tan's s scheme. However, we show that Arshad and Nikooghadam's scheme is still insecure against the privileged-insider attack through the stolen smart-card attack, and it also lacks the formal security analysis and verification. In order to withstand those security loopholes found in both Tan's scheme, and Arshad and Nikooghadam's scheme, we aim to propose an effective and more secure three-factor remote user authentication scheme for TMIS. Our scheme provides the user anonymity property. Through the rigorous informal and formal security analysis using random oracle models and the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool, we show that our scheme is secure against various known attacks, including the replay and man-in-the-middle attacks. Furthermore, our scheme is also efficient as compared to other related schemes.
NASA Astrophysics Data System (ADS)
Jung, Sun-Young; Kim, Chang-Hun; Han, Sang-Kook
2018-05-01
A demand for high spectral efficiency requires multiple access within a single wavelength, but the uplink signals are significantly degraded because of optical beat interference (OBI) in intensity modulation/direct detection system. An optical pulse division multiplexing (OPDM) technique was proposed that could effectively reduce the OBI via a simple method as long as near-orthogonality is satisfied, but the condition was strict, and thus, the number of multiplexing units was very limited. We propose pulse pattern enhanced OPDM (e-OPDM) to reduce the OBI and improve the flexibility in multiple access within a single wavelength. The performance of the e-OPDM and patterning effect are experimentally verified after 23-km single mode fiber transmission. By employing pulse patterning in OPDM, the tight requirement was relaxed by extending the optical delay dynamic range. This could support more number of access with reduced OBI, which could eventually enhance a multiple access function.
Tulogdi, Aron; Tóth, Máté; Barsvári, Beáta; Biró, László; Mikics, Eva; Haller, József
2014-01-01
As previously shown, rats isolated from weaning develop abnormal social and aggressive behavior characterized by biting attacks targeting vulnerable body parts of opponents, reduced attack signaling, and increased defensive behavior despite increased attack counts. Here we studied whether this form of violent aggression could be reversed by resocialization in adulthood. During the first weak of resocialization, isolation-reared rats showed multiple social deficits including increased defensiveness and decreased huddling during sleep. Deficits were markedly attenuated in the second and third weeks. Despite improved social functioning in groups, isolated rats readily showed abnormal features of aggression in a resident-intruder test performed after the 3-week-long resocialization. Thus, post-weaning social isolation-induced deficits in prosocial behavior were eliminated by resocialization during adulthood, but abnormal aggression was resilient to this treatment. Findings are compared to those obtained in humans who suffered early social maltreatment, and who also show social deficits and dysfunctional aggression in adulthood. © 2013 Wiley Periodicals, Inc.
Extracting Association Patterns in Network Communications
Portela, Javier; Villalba, Luis Javier García; Trujillo, Alejandra Guadalupe Silva; Orozco, Ana Lucila Sandoval; Kim, Tai-hoon
2015-01-01
In network communications, mixes provide protection against observers hiding the appearance of messages, patterns, length and links between senders and receivers. Statistical disclosure attacks aim to reveal the identity of senders and receivers in a communication network setting when it is protected by standard techniques based on mixes. This work aims to develop a global statistical disclosure attack to detect relationships between users. The only information used by the attacker is the number of messages sent and received by each user for each round, the batch of messages grouped by the anonymity system. A new modeling framework based on contingency tables is used. The assumptions are more flexible than those used in the literature, allowing to apply the method to multiple situations automatically, such as email data or social networks data. A classification scheme based on combinatoric solutions of the space of rounds retrieved is developed. Solutions about relationships between users are provided for all pairs of users simultaneously, since the dependence of the data retrieved needs to be addressed in a global sense. PMID:25679311
Extracting association patterns in network communications.
Portela, Javier; Villalba, Luis Javier García; Trujillo, Alejandra Guadalupe Silva; Orozco, Ana Lucila Sandoval; Kim, Tai-hoon
2015-02-11
In network communications, mixes provide protection against observers hiding the appearance of messages, patterns, length and links between senders and receivers. Statistical disclosure attacks aim to reveal the identity of senders and receivers in a communication network setting when it is protected by standard techniques based on mixes. This work aims to develop a global statistical disclosure attack to detect relationships between users. The only information used by the attacker is the number of messages sent and received by each user for each round, the batch of messages grouped by the anonymity system. A new modeling framework based on contingency tables is used. The assumptions are more flexible than those used in the literature, allowing to apply the method to multiple situations automatically, such as email data or social networks data. A classification scheme based on combinatoric solutions of the space of rounds retrieved is developed. Solutions about relationships between users are provided for all pairs of users simultaneously, since the dependence of the data retrieved needs to be addressed in a global sense.
Gerc, Amy J.; Diepold, Andreas; Trunk, Katharina; Porter, Michael; Rickman, Colin; Armitage, Judith P.; Stanley-Wall, Nicola R.; Coulthurst, Sarah J.
2015-01-01
Summary The Type VI secretion system (T6SS) is a bacterial nanomachine that fires toxic proteins into target cells. Deployment of the T6SS represents an efficient and widespread means by which bacteria attack competitors or interact with host organisms and may be triggered by contact from an attacking neighbor cell as a defensive strategy. Here, we use the opportunist pathogen Serratia marcescens and functional fluorescent fusions of key components of the T6SS to observe different subassemblies of the machinery simultaneously and on multiple timescales in vivo. We report that the localization and dynamic behavior of each of the components examined is distinct, revealing a multi-stage and dynamic assembly process for the T6SS machinery. We also show that the T6SS can assemble and fire without needing a cell contact trigger, defining an aggressive strategy that broadens target range and suggesting that activation of the T6SS is tailored to survival in specific niches. PMID:26387948
Armstrong, Amy E; Gillan, Eileen; DiMario, Francis Joseph
2014-03-01
SMART syndrome (stroke-like migraine attacks after radiation therapy) is a rare condition that involves complex migraines with focal neurologic findings in patients following cranial irradiation for central nervous system malignancies. Little is known about the mechanisms behind the disorder, making successful treatment challenging. We report 2 new cases of SMART syndrome in pediatric patients as well as review all documented cases of the syndrome. Each of our 2 pediatric patients suffered multiple episodes. Attacks were characterized by severe headache, visual disturbance, aphasia, and weakness. Recovery occurred over several days to weeks. The data from all documented reports of SMART syndrome indicate a greater prevalence for male gender. An age-dependent pattern of onset was also observed, with a greater variability of syndrome onset in patients who received cranial irradiation at a younger age. SMART appears to be a reversible, recurrent long-term complication of radiation therapy with possible age- and gender-related influences.
USDA-ARS?s Scientific Manuscript database
Several biomarkers have been individually associated with vascular brain injury, but no prior study has explored the simultaneous association of a biologically plausible panel of biomarkers with the incidence of stroke/transient ischemic attack and the prevalence of subclinical brain injury. In 3127...
THE INFORMATION BATTLESPACE: A LEVEL PLAYING FIELD FOR THE ASYMMETRIC FOE
2016-02-01
America” to carry out attacks on those listed.7 Despite ISIS claims that the list had been obtained via hacking by an advanced, tech-savvy division... Facebook , YouTube and Twitter. Many general officers maintain personal social media accounts that they personally use to communicate with multiple
USDA-ARS?s Scientific Manuscript database
R. solani is an economically important soilborne basidiomycetous pathogen of worldwide distribution and it is known to attack at least 188 species of higher plants, including crops, vegetables, ornamentals, forest trees and turfgrasses. The pathogenic isolates may belong to multiple genera and speci...
Computing The No-Escape Envelope Of A Short-Range Missile
NASA Technical Reports Server (NTRS)
Neuman, Frank
1991-01-01
Method for computing no-escape envelope of short-range air-to-air missile devised. Useful for analysis of both strategies for avoidance and strategies for attack. With modifications, also useful in analysis of control strategies for one-on-one air-to-air combat, or wherever multiple control strategies considered.
ASSESSMENT OF LAKE ECOSYSTEM RESPONSE TO TOXIC EVENTS WITH THE AQUATOX MODEL
An attack involving a toxic chemical added to a water resource could have multiple effects on the aquatic ecosystem of that resource. This is particularly significant for systems such as lakes and reservoirs, where the residence time of water is long and there is more opportunit...
Lashkar-e-Taiba: A Global Threat Today, a Threat to Pakistan Tomorrow
2012-03-20
Ahl-i-Hadith followers are essentially the South Asia version of the Salafist movement originating out of Egypt or the Wahhabis of Saudi Arabia.29...training apparatus produces what might be likened to a pyramid scheme with the system constantly rejuvenating itself.68 Multiple foiled attacks against
Identifying the Key Weaknesses in Network Security at Colleges.
ERIC Educational Resources Information Center
Olsen, Florence
2000-01-01
A new study identifies and ranks the 10 security gaps responsible for most outsider attacks on college computer networks. The list is intended to help campus system administrators establish priorities as they work to increase security. One network security expert urges that institutions utilize multiple security layers. (DB)
Recurrent transient ischaemic attack and early risk of stroke: data from the PROMAPA study.
Purroy, Francisco; Jiménez Caballero, Pedro Enrique; Gorospe, Arantza; Torres, María José; Alvarez-Sabin, José; Santamarina, Estevo; Martínez-Sánchez, Patricia; Cánovas, David; Freijo, María José; Egido, Jose Antonio; Ramírez-Moreno, Jose M; Alonso-Arias, Arantza; Rodríguez-Campello, Ana; Casado, Ignacio; Delgado-Mederos, Raquel; Martí-Fàbregas, Joan; Fuentes, Blanca; Silva, Yolanda; Quesada, Helena; Cardona, Pere; Morales, Ana; de la Ossa, Natalia Pérez; García-Pastor, Antonio; Arenillas, Juan F; Segura, Tomas; Jiménez, Carmen; Masjuán, Jaime
2013-06-01
Many guidelines recommend urgent intervention for patients with two or more transient ischaemic attacks (TIAs) within 7 days (multiple TIAs) to reduce the early risk of stroke. To determine whether all patients with multiple TIAs have the same high early risk of stroke. Between April 2008 and December 2009, we included 1255 consecutive patients with a TIA from 30 Spanish stroke centres (PROMAPA study). We prospectively recorded clinical characteristics. We also determined the short-term risk of stroke (at 7 and 90 days). Aetiology was categorised using the TOAST (Trial of Org 10172 in Acute Stroke Treatment) classification. Clinical variables and extracranial vascular imaging were available and assessed in 1137/1255 (90.6%) patients. 7-Day and 90-day stroke risk were 2.6% and 3.8%, respectively. Large-artery atherosclerosis (LAA) was confirmed in 190 (16.7%) patients. Multiple TIAs were seen in 274 (24.1%) patients. Duration <1 h (OR=2.97, 95% CI 2.20 to 4.01, p<0.001), LAA (OR=1.92, 95% CI 1.35 to 2.72, p<0.001) and motor weakness (OR=1.37, 95% CI 1.03 to 1.81, p=0.031) were independent predictors of multiple TIAs. The subsequent risk of stroke in these patients at 7 and 90 days was significantly higher than the risk after a single TIA (5.9% vs 1.5%, p<0.001 and 6.8% vs 3.0%, respectively). In the logistic regression model, among patients with multiple TIAs, no variables remained as independent predictors of stroke recurrence. According to our results, multiple TIAs within 7 days are associated with a greater subsequent risk of stroke than after a single TIA. Nevertheless, we found no independent predictor of stroke recurrence among these patients.
Retrospective evaluation of coyote attacks in dogs: 154 cases (1997-2012).
Frauenthal, Virginia M; Bergman, Philip; Murtaugh, Robert J
2017-05-01
To describe the clinical presentation and outcome of known attacks in client-owned dogs caused by the common coyote, Canis latrans. Retrospective observational study. Private referral hospital. One hundred fifty-four client-owned dogs known to be attacked by coyotes. None. Records from a private referral hospital from May 1997 through December 2012 were reviewed. Time of day and month/season of year, signalment, body temperature, heart rate, respiratory rate, body weight, location and severity of wounds inflicted, common injuries, length of hospitalization, necessity of surgical wound repair under anesthesia, antimicrobial use and mortality were recorded. Eighty-six percent of dogs presenting following coyote attack weighed <10 kg. Overall mortality rate was 15.6%. Dogs with bite wounds to the thorax had the highest mortality at 21.3%. Criteria for systemic inflammatory response syndrome (SIRS) based on admission vital signs were met in 58.8% of dogs and the presence of SIRS was significantly associated with mortality (P < 0.001). Common coyote-induced injuries included rib fracture (38/154; 24.6%), pulmonary contusion (30/154; 19.4%), tracheal tear (18/154; 11.6%), pneumothorax (16/154; 10.3%), abdominal wall hernia (9/154; 5.8%), and abdominal penetrating wounds (8/146; 5.5%). Dogs <10 kg were significantly more likely to incur wounds to multiple body parts or sustain abdominal penetrating wounds. The presence of rib fracture was significantly associated with mortality. Frequency of coyote attacks over the time of this study increased by 330%. Coyote attacks on dogs are a problem in Southern California and are associated with substantial morbidity and mortality, especially in dogs with wounds to the thorax. Aggressive management involving surgical wound repair was associated with survival to discharge. © Veterinary Emergency and Critical Care Society 2017.
Personality factors and posttraumatic stress: associations in civilians one year after air attacks.
Lecic-Tosevski, Dusica; Gavrilovic, Jelena; Knezevic, Goran; Priebe, Stefan
2003-12-01
There is an ongoing debate on which risk factors for developing posttraumatic stress symptoms are more important--personality traits reflecting vulnerability, previous stressful experiences or characteristics of the traumatic event. In this study, posttraumatic stress symptoms and their relationship with personality traits, previous stressful experiences and exposure to stressful events during air attacks in Yugoslavia were investigated. The Millon Clinical Multiaxial Inventory (MCMI; Millon, 1983), Impact of Events Scale (IES; Horowitz, Wilner, & Alvarez, 1979), Life Stressor Checklist Revised (LSCL-R; Wolfe & Kimerling, 1997), and List of Stressors were administered to a homogeneous group of medical students 1 year after the attacks. In multiple regression analyses, compulsive and passive-aggressive personality traits and a higher level of exposure to stressors during air attacks independently predicted the degree of intrusion symptoms. Avoidance symptoms were predicted by avoidant personality traits and a higher exposure to stressors both previously in life and during the attacks. In the next step, we tested in analyses of variance whether personality traits, previous stressful experiences, and stressful events during attacks as independent variables interact in predicting intrusion and avoidance symptoms. For this, students were clustered into three groups depending on their predominant personality traits. In addition to direct predictive effects, there were significant interaction effects in predicting both intrusion and avoidance. The findings suggest that each of the tested factors, i.e., personality traits, previous stressful experiences, and exposure to traumatic events may have an independent and direct influence on developing posttraumatic stress. However, the effect of these factors cannot just be added up. Rather, the factors interact in their impact on posttraumatic stress symptoms. Bigger samples and longitudinal designs will be required to understand precisely how different personality traits influence response to stressful events.
Resistance of nickel-chromium-aluminum alloys to cyclic oxidation at 1100 C and 1200 C
NASA Technical Reports Server (NTRS)
Barrett, C. A.; Lowell, C. E.
1976-01-01
Nickel-rich alloys in the Ni-Cr-Al system were evaluated for cyclic oxidation resistance in still air at 1,100 and 1,200 C. A first approximation oxidation attack parameter Ka was derived from specific weight change data involving both a scaling growth constant and a spalling constant. An estimating equation was derived with Ka as a function of the Cr and Al content by multiple linear regression and translated into countour ternary diagrams showing regions of minimum attack. An additional factor inferred from the regression analysis was that alloys melted in zirconia crucibles had significantly greater oxidation resistance than comparable alloys melted otherwise.
Conestat alfa for the treatment of angioedema attacks
Davis, Benjamin; Bernstein, Jonathan A
2011-01-01
Recently, multiple C1 inhibitor (C1-INH) replacement products have been approved for the treatment of hereditary angioedema (HAE). This review summarizes HAE and its current treatment modalities and focuses on findings from bench to bedside trials of a new C1-INH replacement, conestat alfa. Conestat alfa is unique among the other C1-INH replacement products because it is produced from transgenic rabbits rather than derived from human plasma donors, which can potentially allow an unlimited source of drug without any concern of infectious transmission. The clinical trial data generated to date indicate that conestat alfa is safe and effective for the treatment of acute HAE attacks. PMID:21753889
A Specialist Herbivore Uses Chemical Camouflage to Overcome the Defenses of an Ant-Plant Mutualism
Whitehead, Susan R.; Reid, Ellen; Sapp, Joseph; Poveda, Katja; Royer, Anne M.; Posto, Amanda L.; Kessler, André
2014-01-01
Many plants and ants engage in mutualisms where plants provide food and shelter to the ants in exchange for protection against herbivores and competitors. Although several species of herbivores thwart ant defenses and extract resources from the plants, the mechanisms that allow these herbivores to avoid attack are poorly understood. The specialist insect herbivore, Piezogaster reclusus (Hemiptera: Coreidae), feeds on Neotropical bull-horn acacias (Vachellia collinsii) despite the presence of Pseudomyrmex spinicola ants that nest in and aggressively defend the trees. We tested three hypotheses for how P. reclusus feeds on V. collinsii while avoiding ant attack: (1) chemical camouflage via cuticular surface compounds, (2) chemical deterrence via metathoracic defense glands, and (3) behavioral traits that reduce ant detection or attack. Our results showed that compounds from both P. reclusus cuticles and metathoracic glands reduce the number of ant attacks, but only cuticular compounds appear to be essential in allowing P. reclusus to feed on bull-horn acacia trees undisturbed. In addition, we found that ant attack rates to P. reclusus increased significantly when individuals were transferred between P. spinicola ant colonies. These results are consistent with the hypothesis that chemical mimicry of colony-specific ant or host plant odors plays a key role in allowing P. reclusus to circumvent ant defenses and gain access to important resources, including food and possibly enemy-free space. This interaction between ants, acacias, and their herbivores provides an excellent example of the ability of herbivores to adapt to ant defenses of plants and suggests that herbivores may play an important role in the evolution and maintenance of mutualisms. PMID:25047551
A specialist herbivore uses chemical camouflage to overcome the defenses of an ant-plant mutualism.
Whitehead, Susan R; Reid, Ellen; Sapp, Joseph; Poveda, Katja; Royer, Anne M; Posto, Amanda L; Kessler, André
2014-01-01
Many plants and ants engage in mutualisms where plants provide food and shelter to the ants in exchange for protection against herbivores and competitors. Although several species of herbivores thwart ant defenses and extract resources from the plants, the mechanisms that allow these herbivores to avoid attack are poorly understood. The specialist insect herbivore, Piezogaster reclusus (Hemiptera: Coreidae), feeds on Neotropical bull-horn acacias (Vachellia collinsii) despite the presence of Pseudomyrmex spinicola ants that nest in and aggressively defend the trees. We tested three hypotheses for how P. reclusus feeds on V. collinsii while avoiding ant attack: (1) chemical camouflage via cuticular surface compounds, (2) chemical deterrence via metathoracic defense glands, and (3) behavioral traits that reduce ant detection or attack. Our results showed that compounds from both P. reclusus cuticles and metathoracic glands reduce the number of ant attacks, but only cuticular compounds appear to be essential in allowing P. reclusus to feed on bull-horn acacia trees undisturbed. In addition, we found that ant attack rates to P. reclusus increased significantly when individuals were transferred between P. spinicola ant colonies. These results are consistent with the hypothesis that chemical mimicry of colony-specific ant or host plant odors plays a key role in allowing P. reclusus to circumvent ant defenses and gain access to important resources, including food and possibly enemy-free space. This interaction between ants, acacias, and their herbivores provides an excellent example of the ability of herbivores to adapt to ant defenses of plants and suggests that herbivores may play an important role in the evolution and maintenance of mutualisms.
Fukuoka, Yoshimi; Choi, JiWon; S Bender, Melinda; Gonzalez, Prisila; Arai, Shoshana
2015-07-01
The purpose of the study was to explore the perceived risk for diabetes and heart attack and associated health status of Caucasian, Filipino, Korean, and Latino Americans without diabetes. A cross-sectional survey was conducted with 904 urban adults (mean age 44.3±16.1 years; 64.3% female) in English, Spanish or Korean between August and December 2013. Perceived risk for developing diabetes was indicated by 46.5% (n=421), and 14.3% (n=129) perceived themselves to be at risk for having a heart attack in their lifetime. Significant predictors of pessimistic diabetes risk perceptions: Filipino (adjusted odds ratio [AOR]=1.7; 95% CI: 1.04-2.86) and Korean (AOR=2.4; 1.33-4.48) ethnicity, family history of diabetes (AOR=1.4; 1.00-1.84), female gender (AOR=1.4; 1.04-1.96), high cholesterol (AOR= 1.6; 1.09-2.37) and higher body mass index (BMI) (AOR=1.1; 1.08-1.15). Predictors of pessimistic heart attack risk perceptions were family history of an early heart attack (AOR=2.9; 1.69-5.02), high blood pressure (AOR=2.4; 1.45-3.84), and higher BMI (AOR=1.1; 1.04-1.12) after controlling for socio-demographic factors. Older age, physical inactivity, smoking, and low HDL levels were not associated with risk perceptions. Multiple risk factors were predictive of greater perceived diabetes risk, whereas, only family history of heart attack, high blood pressure and increases in BMI significantly contributed to perceived risk of heart attack among ethnically diverse at risk middle-aged adults. It is important that healthcare providers address the discordance between an individual's risk perceptions and the presence of actual risk factors. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.
Fukuoka, Yoshimi; Choi, JiWon; Bender, Melinda S.; Gonzalez, Prisila; Arai, Shoshana
2015-01-01
Aim The purpose of the study was to explore the perceived risk for diabetes and heart attack and associated health status of Caucasian, Filipino, Korean, and Latino Americans without diabetes. Methods A cross-sectional survey was conducted with 904 urban adults (mean age 44.3 ± 16.1 years; 64.3% female) in English, Spanish or Korean between August and December 2013. Results Perceived risk for developing diabetes was indicated by 46.5% (n = 421), and 14.3% (n = 129) perceived themselves to be at risk for having a heart attack in their lifetime. Significant predictors of pessimistic diabetes risk perceptions: Filipino (adjusted odds ratio [AOR] = 1.7; 95% CI: 1.04–2.86) and Korean (AOR = 2.4; 1.33–4.48) ethnicity, family history of diabetes (AOR = 1.4; 1.00–1.84), female gender (AOR = 1.4; 1.04–1.96), high cholesterol (AOR= 1.6; 1.09–2.37) and higher body mass index (BMI) (AOR = 1.1; 1.08–1.15). Predictors of pessimistic heart attack risk perceptions were family history of an early heart attack (AOR = 2.9; 1.69–5.02), high blood pressure (AOR = 2.4; 1.45–3.84), and higher BMI (AOR = 1.1; 1.04–1.12) after controlling for socio-demographic factors. Older age, physical inactivity, smoking, and low HDL levels were not associated with risk perceptions. Conclusion Multiple risk factors were predictive of greater perceived diabetes risk, whereas, only family history of heart attack, high blood pressure and increases in BMI significantly contributed to perceived risk of heart attack among ethnically diverse at risk middle-aged adults. It is important that healthcare providers address the discordance between an individual’s risk perceptions and the presence of actual risk factors. PMID:25931282
Robust anonymous authentication scheme for telecare medical information systems.
Xie, Qi; Zhang, Jun; Dong, Na
2013-04-01
Patient can obtain sorts of health-care delivery services via Telecare Medical Information Systems (TMIS). Authentication, security, patient's privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). In 2012, Chen et al. showed that Khan et al.'s dynamic ID-based authentication scheme has some weaknesses and proposed an improved scheme, and they claimed that their scheme is more suitable for TMIS. However, we show that Chen et al.'s scheme also has some weaknesses. In particular, Chen et al.'s scheme does not provide user's privacy protection and perfect forward secrecy, is vulnerable to off-line password guessing attack and impersonation attack once user's smart card is compromised. Further, we propose a secure anonymity authentication scheme to overcome their weaknesses even an adversary can know all information stored in smart card.
Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi; Wang, Chun-Cheng
2015-11-01
To protect patient privacy and ensure authorized access to remote medical services, many remote user authentication schemes for the integrated electronic patient record (EPR) information system have been proposed in the literature. In a recent paper, Das proposed a hash based remote user authentication scheme using passwords and smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various passive and active attacks. However, in this paper, we found that Das's authentication scheme is still vulnerable to modification and user duplication attacks. Thereafter we propose a secure and efficient authentication scheme for the integrated EPR information system based on lightweight hash function and bitwise exclusive-or (XOR) operations. The security proof and performance analysis show our new scheme is well-suited to adoption in remote medical healthcare services.
Lin, Han-Yu
2013-04-01
Telecare medical information systems (TMISs) are increasingly popular technologies for healthcare applications. Using TMISs, physicians and caregivers can monitor the vital signs of patients remotely. Since the database of TMISs stores patients' electronic medical records (EMRs), only authorized users should be granted the access to this information for the privacy concern. To keep the user anonymity, recently, Chen et al. proposed a dynamic ID-based authentication scheme for telecare medical information system. They claimed that their scheme is more secure and robust for use in a TMIS. However, we will demonstrate that their scheme fails to satisfy the user anonymity due to the dictionary attacks. It is also possible to derive a user password in case of smart card loss attacks. Additionally, an improved scheme eliminating these weaknesses is also presented.
Thundercloud: Domain specific information security training for the smart grid
NASA Astrophysics Data System (ADS)
Stites, Joseph
In this paper, we describe a cloud-based virtual smart grid test bed: ThunderCloud, which is intended to be used for domain-specific security training applicable to the smart grid environment. The test bed consists of virtual machines connected using a virtual internal network. ThunderCloud is remotely accessible, allowing students to undergo educational exercises online. We also describe a series of practical exercises that we have developed for providing the domain-specific training using ThunderCloud. The training exercises and attacks are designed to be realistic and to reflect known vulnerabilities and attacks reported in the smart grid environment. We were able to use ThunderCloud to offer practical domain-specific security training for smart grid environment to computer science students at little or no cost to the department and no risk to any real networks or systems.
Countershock: mobilizing resistance to electroshock weapons.
Martin, Brian; Wright, Steve
2003-01-01
Electroshock, stun and restraint technologies are often used for torture and as tools of repression. There is much information available exposing the problems with such technologies, but little about how to be effective in challenging their use. The concept of political ju-jitsu--the process by which an attack on a non-violent resister can backfire on the attackers--is introduced and adapted to examine challenges to electroshock weapons. In order to make these weapons backfire, it is important to emphasize the value of potential targets, to expose secret dealings, to reveal the harm caused by the weapons and to communicate clearly to a wide audience. A longer-term goal is policy change to deny access by torturing states to such repressive tools. Countershock strategies and methodologies are introduced here as potential tools to create ever-expanding torture-technology-free zones.
Analysis of an algorithm for distributed recognition and accountability
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ko, C.; Frincke, D.A.; Goan, T. Jr.
1993-08-01
Computer and network systems are available to attacks. Abandoning the existing huge infrastructure of possibly-insecure computer and network systems is impossible, and replacing them by totally secure systems may not be feasible or cost effective. A common element in many attacks is that a single user will often attempt to intrude upon multiple resources throughout a network. Detecting the attack can become significantly easier by compiling and integrating evidence of such intrusion attempts across the network rather than attempting to assess the situation from the vantage point of only a single host. To solve this problem, we suggest an approachmore » for distributed recognition and accountability (DRA), which consists of algorithms which ``process,`` at a central location, distributed and asynchronous ``reports`` generated by computers (or a subset thereof) throughout the network. Our highest-priority objectives are to observe ways by which an individual moves around in a network of computers, including changing user names to possibly hide his/her true identity, and to associate all activities of multiple instance of the same individual to the same network-wide user. We present the DRA algorithm and a sketch of its proof under an initial set of simplifying albeit realistic assumptions. Later, we relax these assumptions to accommodate pragmatic aspects such as missing or delayed ``reports,`` clock slew, tampered ``reports,`` etc. We believe that such algorithms will have widespread applications in the future, particularly in intrusion-detection system.« less
Brackbill, Robert M.; Cone, James E.; Farfel, Mark R.; Stellman, Steven D.
2014-01-01
Few studies have focused on injuries from the World Trade Center disaster on September 11, 2001. Severe injury has health consequences, including an increased mortality risk 10 years after injury and the risk of mental health problems, such as posttraumatic stress disorder (PTSD). The World Trade Center Health Registry identified 14,087 persons with none of a selected group of preexisting chronic conditions before 2002 who were present during and soon after the World Trade Center attacks, 1,980 of whom reported sustaining 1 or more types of injury (e.g., a broken bone or burn). Survey data obtained during 2003−2004 and 2006−2007 were used to assess the odds of reporting a diagnosis of chronic conditions (heart disease, respiratory disease, diabetes, cancer) up to 5–6 years after the attacks. Number of injury types and probable PTSD were significantly associated with having any chronic conditions diagnosed in 2002–2007. Persons with multiple injuries and PTSD had a 3-fold higher risk of heart disease than did those with no injury and no PTSD, and persons with multiple injuries and with no PTSD had a 2-fold higher risk of respiratory diseases. The present study shows that injured persons with or without comorbid PTSD have a higher risk of developing chronic diseases. Clinicians should be aware of the heightened risk of chronic heart and respiratory conditions among injured persons. PMID:24561992
Brackbill, Robert M; Cone, James E; Farfel, Mark R; Stellman, Steven D
2014-05-01
Few studies have focused on injuries from the World Trade Center disaster on September 11, 2001. Severe injury has health consequences, including an increased mortality risk 10 years after injury and the risk of mental health problems, such as posttraumatic stress disorder (PTSD). The World Trade Center Health Registry identified 14,087 persons with none of a selected group of preexisting chronic conditions before 2002 who were present during and soon after the World Trade Center attacks, 1,980 of whom reported sustaining 1 or more types of injury (e.g., a broken bone or burn). Survey data obtained during 2003-2004 and 2006-2007 were used to assess the odds of reporting a diagnosis of chronic conditions (heart disease, respiratory disease, diabetes, cancer) up to 5-6 years after the attacks. Number of injury types and probable PTSD were significantly associated with having any chronic conditions diagnosed in 2002-2007. Persons with multiple injuries and PTSD had a 3-fold higher risk of heart disease than did those with no injury and no PTSD, and persons with multiple injuries and with no PTSD had a 2-fold higher risk of respiratory diseases. The present study shows that injured persons with or without comorbid PTSD have a higher risk of developing chronic diseases. Clinicians should be aware of the heightened risk of chronic heart and respiratory conditions among injured persons.
New threats to health data privacy.
Li, Fengjun; Zou, Xukai; Liu, Peng; Chen, Jake Y
2011-11-24
Along with the rapid digitalization of health data (e.g. Electronic Health Records), there is an increasing concern on maintaining data privacy while garnering the benefits, especially when the data are required to be published for secondary use. Most of the current research on protecting health data privacy is centered around data de-identification and data anonymization, which removes the identifiable information from the published health data to prevent an adversary from reasoning about the privacy of the patients. However, published health data is not the only source that the adversaries can count on: with a large amount of information that people voluntarily share on the Web, sophisticated attacks that join disparate information pieces from multiple sources against health data privacy become practical. Limited efforts have been devoted to studying these attacks yet. We study how patient privacy could be compromised with the help of today's information technologies. In particular, we show that private healthcare information could be collected by aggregating and associating disparate pieces of information from multiple online data sources including online social networks, public records and search engine results. We demonstrate a real-world case study to show user identity and privacy are highly vulnerable to the attribution, inference and aggregation attacks. We also show that people are highly identifiable to adversaries even with inaccurate information pieces about the target, with real data analysis. We claim that too much information has been made available electronic and available online that people are very vulnerable without effective privacy protection.
New threats to health data privacy
2011-01-01
Background Along with the rapid digitalization of health data (e.g. Electronic Health Records), there is an increasing concern on maintaining data privacy while garnering the benefits, especially when the data are required to be published for secondary use. Most of the current research on protecting health data privacy is centered around data de-identification and data anonymization, which removes the identifiable information from the published health data to prevent an adversary from reasoning about the privacy of the patients. However, published health data is not the only source that the adversaries can count on: with a large amount of information that people voluntarily share on the Web, sophisticated attacks that join disparate information pieces from multiple sources against health data privacy become practical. Limited efforts have been devoted to studying these attacks yet. Results We study how patient privacy could be compromised with the help of today’s information technologies. In particular, we show that private healthcare information could be collected by aggregating and associating disparate pieces of information from multiple online data sources including online social networks, public records and search engine results. We demonstrate a real-world case study to show user identity and privacy are highly vulnerable to the attribution, inference and aggregation attacks. We also show that people are highly identifiable to adversaries even with inaccurate information pieces about the target, with real data analysis. Conclusion We claim that too much information has been made available electronic and available online that people are very vulnerable without effective privacy protection. PMID:22168526
Intelligence-aided multitarget tracking for urban operations - a case study: counter terrorism
NASA Astrophysics Data System (ADS)
Sathyan, T.; Bharadwaj, K.; Sinha, A.; Kirubarajan, T.
2006-05-01
In this paper, we present a framework for tracking multiple mobile targets in an urban environment based on data from multiple sources of information, and for evaluating the threat these targets pose to assets of interest (AOI). The motivating scenario is one where we have to track many targets, each with different (unknown) destinations and/or intents. The tracking algorithm is aided by information about the urban environment (e.g., road maps, buildings, hideouts), and strategic and intelligence data. The tracking algorithm needs to be dynamic in that it has to handle a time-varying number of targets and the ever-changing urban environment depending on the locations of the moving objects and AOI. Our solution uses the variable structure interacting multiple model (VS-IMM) estimator, which has been shown to be effective in tracking targets based on road map information. Intelligence information is represented as target class information and incorporated through a combined likelihood calculation within the VS-IMM estimator. In addition, we develop a model to calculate the probability that a particular target can attack a given AOI. This model for the calculation of the probability of attack is based on the target kinematic and class information. Simulation results are presented to demonstrate the operation of the proposed framework on a representative scenario.
Mof-Tree: A Spatial Access Method To Manipulate Multiple Overlapping Features.
ERIC Educational Resources Information Center
Manolopoulos, Yannis; Nardelli, Enrico; Papadopoulos, Apostolos; Proietti, Guido
1997-01-01
Investigates the manipulation of large sets of two-dimensional data representing multiple overlapping features, and presents a new access method, the MOF-tree. Analyzes storage requirements and time with respect to window query operations involving multiple features. Examines both the pointer-based and pointerless MOF-tree representations.…
Somatotype, Level of Competition, and Performance in Attack in Elite Male Volleyball
Giannopoulos, Nikiforos; Vagenas, George; Noutsos, Konstantinos; Barzouka, Karolina; Bergeles, Nikolaos
2017-01-01
Abstract This study investigated the relationship between somatotype, level of competition, and performance in attack in elite level male volleyball players. The objective was to test for the potential covariation of competition level (Division A1 vs. A2) and playing position (hitters vs. centers vs. opposites) considering performance in attack. Anthropometric, body composition and somatotype variables were measured according to the Heath-Carter method. The attack actions of 144 players from 48 volleyball matches were analyzed and their performance was rated using a 5-point numerical scale. Results showed that players of Division A1 were taller, heavier, more muscular, and less endomorphic compared to those of Division A2. MANOVA and follow-up discriminant function analysis revealed somatotype differences among playing positions with centers and opposites being endomorph-ectomorph and hitters being central. Centers performed constantly better than hitters and opposites regardless of the division and somatotype. Multiple linear regression analysis showed that variables defining ectomorph and endomorph players, centers, and players of Division A1 significantly determined the relative performance superiority and were able to explain the variation in performance by almost 25%. These results could be taken into account by coaches when assigning players to particular playing positions or when designing individualized position-specific training programs. PMID:28828084
Somatotype, Level of Competition, and Performance in Attack in Elite Male Volleyball.
Giannopoulos, Nikiforos; Vagenas, George; Noutsos, Konstantinos; Barzouka, Karolina; Bergeles, Nikolaos
2017-09-01
This study investigated the relationship between somatotype, level of competition, and performance in attack in elite level male volleyball players. The objective was to test for the potential covariation of competition level (Division A1 vs. A2) and playing position (hitters vs. centers vs. opposites) considering performance in attack. Anthropometric, body composition and somatotype variables were measured according to the Heath-Carter method. The attack actions of 144 players from 48 volleyball matches were analyzed and their performance was rated using a 5-point numerical scale. Results showed that players of Division A1 were taller, heavier, more muscular, and less endomorphic compared to those of Division A2. MANOVA and follow-up discriminant function analysis revealed somatotype differences among playing positions with centers and opposites being endomorph-ectomorph and hitters being central. Centers performed constantly better than hitters and opposites regardless of the division and somatotype. Multiple linear regression analysis showed that variables defining ectomorph and endomorph players, centers, and players of Division A1 significantly determined the relative performance superiority and were able to explain the variation in performance by almost 25%. These results could be taken into account by coaches when assigning players to particular playing positions or when designing individualized position-specific training programs.
The use of artificial crabs for testing predatory behavior and health in the octopus.
Amodio, Piero; Andrews, Paul; Salemme, Marinella; Ponte, Giovanna; Fiorito, Graziano
2014-01-01
The willingness of the cephalopod mollusc Octopus vulgaris to attack a live crab is traditionally used as a method to assess the overall health and welfare of octopuses in the laboratory. This method requires placing a crab in the home tank of an animal, measuring the time (latency) taken for the octopus to initiate an attack and withdrawing the crab immediately prior to capture. The same crab is commonly used to assess multiple octopuses as part of daily welfare assessment. Growing concern for the welfare of crustaceans and a review of all laboratory practices for the care and welfare of cephalopods following the inclusion of this taxon in 2010/63/EU prompted a study of the utility of an artificial crab to replace a live crab in the assessment of octopus health. On consecutive days O. vulgaris (N=21) were presented with a live, a dead or an artificial crab, and the latency to attack measured. Despite differences in the predatory performance towards the three different crab alternatives, octopuses readily attacked the artificial (and the dead) crab, showing that they can generalize and respond appropriately towards artificial prey. Researchers should consider using an artificial crab to replace the use of a live crab as part of the routine health assessment of O. vulgaris.
A negative feedback signal that is triggered by peril curbs honey bee recruitment.
Nieh, James C
2010-02-23
Decision making in superorganisms such as honey bee colonies often uses self-organizing behaviors, feedback loops that allow the colony to gather information from multiple individuals and achieve reliable and agile solutions. Honey bees use positive feedback from the waggle dance to allocate colony foraging effort. However, the use of negative feedback signals by superorganisms is poorly understood. I show that conspecific attacks at a food source lead to the production of stop signals, communication that was known to reduce waggle dancing and recruitment but lacked a clear natural trigger. Signalers preferentially targeted nestmates visiting the same food source, on the basis of its odor. During aggressive food competition, attack victims increased signal production by 43 fold. Foragers that attacked competitors or experienced no aggression did not alter signal production. Biting ambush predators also attack foragers at flowers. Simulated biting of foragers or exposure to bee alarm pheromone also elicited signaling (88-fold and 14-fold increases, respectively). This provides the first clear evidence of a negative feedback signal elicited by foraging peril to counteract the positive feedback of the waggle dance. As in intra- and intercellular communication, negative feedback may play an important, though currently underappreciated, role in self-organizing behaviors within superorganisms. Copyright 2010 Elsevier Ltd. All rights reserved.
Suárez-Ortegón, M F; Arbeláez, A; Mosquera, M; Méndez, F; Aguilar-de Plata, C
2012-08-01
Ferritin levels have been associated with metabolic syndrome and insulin resistance. The aim of the present study was to evaluate the prediction of ferritin levels by variables related to cardiometabolic disease risk in a multivariate analysis. For this aim, 123 healthy women (72 premenopausal and 51 posmenopausal) were recruited. Data were collected through procedures of anthropometric measurements, questionnaires for personal/familial antecedents, and dietary intake (24-h recall), and biochemical determinations (ferritin, C reactive protein (CRP), glucose, insulin, and lipid profile) in blood serum samples obtained. Multiple linear regression analysis was used and variables with no normal distribution were log-transformed for this analysis. In premenopausal women, a model to explain log-ferritin levels was found with log-CRP levels, heart attack familial history, and waist circumference as independent predictors. Ferritin behaves as other cardiovascular markers in terms of prediction of its levels by documented predictors of cardiometabolic disease and related disorders. This is the first report of a relationship between heart attack familial history and ferritin levels. Further research is required to evaluate the mechanism to explain the relationship of central body fat and heart attack familial history with body iron stores values.
Stem parasitic plant Cuscuta australis (dodder) transfers herbivory-induced signals among plants.
Hettenhausen, Christian; Li, Juan; Zhuang, Huifu; Sun, Huanhuan; Xu, Yuxing; Qi, Jinfeng; Zhang, Jingxiong; Lei, Yunting; Qin, Yan; Sun, Guiling; Wang, Lei; Baldwin, Ian T; Wu, Jianqiang
2017-08-08
Cuscuta spp. (i.e., dodders) are stem parasites that naturally graft to their host plants to extract water and nutrients; multiple adjacent hosts are often parasitized by one or more Cuscuta plants simultaneously, forming connected plant clusters. Metabolites, proteins, and mRNAs are known to be transferred from hosts to Cuscuta , and Cuscuta bridges even facilitate host-to-host virus movement. Whether Cuscuta bridges transmit ecologically meaningful signals remains unknown. Here we show that, when host plants are connected by Cuscuta bridges, systemic herbivory signals are transmitted from attacked plants to unattacked plants, as revealed by the large transcriptomic changes in the attacked local leaves, undamaged systemic leaves of the attacked plants, and leaves of unattacked but connected hosts. The interplant signaling is largely dependent on the jasmonic acid pathway of the damaged local plants, and can be found among conspecific or heterospecific hosts of different families. Importantly, herbivore attack of one host plant elevates defensive metabolites in the other systemic Cuscuta bridge-connected hosts, resulting in enhanced resistance against insects even in several consecutively Cuscuta -connected host plants over long distances (> 100 cm). By facilitating plant-to-plant signaling, Cuscuta provides an information-based means of countering the resource-based fitness costs to their hosts.
Stem parasitic plant Cuscuta australis (dodder) transfers herbivory-induced signals among plants
Hettenhausen, Christian; Li, Juan; Zhuang, Huifu; Sun, Huanhuan; Xu, Yuxing; Qi, Jinfeng; Zhang, Jingxiong; Lei, Yunting; Qin, Yan; Sun, Guiling; Wang, Lei; Baldwin, Ian T.
2017-01-01
Cuscuta spp. (i.e., dodders) are stem parasites that naturally graft to their host plants to extract water and nutrients; multiple adjacent hosts are often parasitized by one or more Cuscuta plants simultaneously, forming connected plant clusters. Metabolites, proteins, and mRNAs are known to be transferred from hosts to Cuscuta, and Cuscuta bridges even facilitate host-to-host virus movement. Whether Cuscuta bridges transmit ecologically meaningful signals remains unknown. Here we show that, when host plants are connected by Cuscuta bridges, systemic herbivory signals are transmitted from attacked plants to unattacked plants, as revealed by the large transcriptomic changes in the attacked local leaves, undamaged systemic leaves of the attacked plants, and leaves of unattacked but connected hosts. The interplant signaling is largely dependent on the jasmonic acid pathway of the damaged local plants, and can be found among conspecific or heterospecific hosts of different families. Importantly, herbivore attack of one host plant elevates defensive metabolites in the other systemic Cuscuta bridge-connected hosts, resulting in enhanced resistance against insects even in several consecutively Cuscuta-connected host plants over long distances (> 100 cm). By facilitating plant-to-plant signaling, Cuscuta provides an information-based means of countering the resource-based fitness costs to their hosts. PMID:28739895
Face antispoofing based on frame difference and multilevel representation
NASA Astrophysics Data System (ADS)
Benlamoudi, Azeddine; Aiadi, Kamal Eddine; Ouafi, Abdelkrim; Samai, Djamel; Oussalah, Mourad
2017-07-01
Due to advances in technology, today's biometric systems become vulnerable to spoof attacks made by fake faces. These attacks occur when an intruder attempts to fool an established face-based recognition system by presenting a fake face (e.g., print photo or replay attacks) in front of the camera instead of the intruder's genuine face. For this purpose, face antispoofing has become a hot topic in face analysis literature, where several applications with antispoofing task have emerged recently. We propose a solution for distinguishing between real faces and fake ones. Our approach is based on extracting features from the difference between successive frames instead of individual frames. We also used a multilevel representation that divides the frame difference into multiple multiblocks. Different texture descriptors (local binary patterns, local phase quantization, and binarized statistical image features) have then been applied to each block. After the feature extraction step, a Fisher score is applied to sort the features in ascending order according to the associated weights. Finally, a support vector machine is used to differentiate between real and fake faces. We tested our approach on three publicly available databases: CASIA Face Antispoofing database, Replay-Attack database, and MSU Mobile Face Spoofing database. The proposed approach outperforms the other state-of-the-art methods in different media and quality metrics.
A provably-secure ECC-based authentication scheme for wireless sensor networks.
Nam, Junghyun; Kim, Moonseong; Paik, Juryon; Lee, Youngsook; Won, Dongho
2014-11-06
A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme) is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000). Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC), and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure) schemes.
Consciousness in Non-Epileptic Attack Disorder
Reuber, M.; Kurthen, M.
2011-01-01
Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consciousness should not only distinguish between the ‘level’ and ‘content’ of consciousness but also between ‘phenomenal consciousness’ (consciousness of states it somehow “feels to be like”) and ‘access consciousness’ (having certain ‘higher’ cognitive processes at one’s disposal). The existing evidence shows that there is a great intra- and interindividual variability of NEA experience. However, in most NEAs phenomenal experience – and, as a precondition for that experience, vigilance or wakefulness – is reduced to a lesser degree than in those epileptic seizures involving impairment of consciousness. In fact, complete loss of “consciousness” is the exception rather than the rule in NEAs. Patients, as well as external observers, may have a tendency to overestimate impairments of consciousness during the seizures. PMID:21447903
A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks
Nam, Junghyun; Kim, Moonseong; Paik, Juryon; Lee, Youngsook; Won, Dongho
2014-01-01
A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme) is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000). Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC), and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure) schemes. PMID:25384009
Optimal attacks on qubit-based Quantum Key Recycling
NASA Astrophysics Data System (ADS)
Leermakers, Daan; Škorić, Boris
2018-03-01
Quantum Key Recycling (QKR) is a quantum cryptographic primitive that allows one to reuse keys in an unconditionally secure way. By removing the need to repeatedly generate new keys, it improves communication efficiency. Škorić and de Vries recently proposed a QKR scheme based on 8-state encoding (four bases). It does not require quantum computers for encryption/decryption but only single-qubit operations. We provide a missing ingredient in the security analysis of this scheme in the case of noisy channels: accurate upper bounds on the required amount of privacy amplification. We determine optimal attacks against the message and against the key, for 8-state encoding as well as 4-state and 6-state conjugate coding. We provide results in terms of min-entropy loss as well as accessible (Shannon) information. We show that the Shannon entropy analysis for 8-state encoding reduces to the analysis of quantum key distribution, whereas 4-state and 6-state suffer from additional leaks that make them less effective. From the optimal attacks we compute the required amount of privacy amplification and hence the achievable communication rate (useful information per qubit) of qubit-based QKR. Overall, 8-state encoding yields the highest communication rates.
Mishra, Dheerendra
2015-01-01
Telecare medical information systems (TMIS) enable healthcare delivery services. However, access of these services via public channel raises security and privacy issues. In recent years, several smart card based authentication schemes have been introduced to ensure secure and authorized communication between remote entities over the public channel for the (TMIS). We analyze the security of some of the recently proposed authentication schemes of Lin, Xie et al., Cao and Zhai, and Wu and Xu's for TMIS. Unfortunately, we identify that these schemes failed to satisfy desirable security attributes. In this article we briefly discuss four dynamic ID-based authentication schemes and demonstrate their failure to satisfy desirable security attributes. The study is aimed to demonstrate how inefficient password change phase can lead to denial of server scenario for an authorized user, and how an inefficient login phase causes the communication and computational overhead and decrease the performance of the system. Moreover, we show the vulnerability of Cao and Zhai's scheme to known session specific temporary information attack, vulnerability of Wu and Xu's scheme to off-line password guessing attack, and vulnerability of Xie et al.'s scheme to untraceable on-line password guessing attack.
Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Xie, Dong; Yang, Yixian
2015-06-01
The Telecare Medicine Information Systems (TMISs) provide an efficient communicating platform supporting the patients access health-care delivery services via internet or mobile networks. Authentication becomes an essential need when a remote patient logins into the telecare server. Recently, many extended chaotic maps based authentication schemes using smart cards for TMISs have been proposed. Li et al. proposed a secure smart cards based authentication scheme for TMISs using extended chaotic maps based on Lee's and Jiang et al.'s scheme. In this study, we show that Li et al.'s scheme has still some weaknesses such as violation the session key security, vulnerability to user impersonation attack and lack of local verification. To conquer these flaws, we propose a chaotic maps and smart cards based password authentication scheme by applying biometrics technique and hash function operations. Through the informal and formal security analyses, we demonstrate that our scheme is resilient possible known attacks including the attacks found in Li et al.'s scheme. As compared with the previous authentication schemes, the proposed scheme is more secure and efficient and hence more practical for telemedical environments.
Littoral Combat Ship Open Ocean Anti-Submarine Warfare
2014-06-01
maintain stealth and its defense in order to properly conduct an attack on a surface vessel (Sternhell and Thorndike 2014, 102). This statement...its target, the surface combatants can counter by increasing their speed (Sternhell and Thorndike 2014). While the maximum speed of the current...120316_PS.pdf Sternhell, Charles M, and Alan M Thorndike . 2014. “Antisubmarine Warfare in World War II.” CNA Analysis & Solutions. Accessed April 14, 2014
USBeSafe: Applying One Class SVM for Effective USB Event Anomaly Detection
2016-04-25
Directory and File Descriptions . . . . . . . . . . . . . . . . . 64 Bibliography 69 xv List of Figures 2.1 USB Descriptor Hierarchy...countless. One study performed in 2011 found that, in only the two year span prior, 50% of orga- nizations, both public and private, had sensitive...host machine. While ex - isting solutions to the rogue-TD attack paradigm require much in the way of access control maintenance and certificate management
Resilient Control and Intrusion Detection for SCADA Systems
2014-05-01
Control. McGraw-Hill, 1996. [89] L. Greenemeier. Robots arrive at fukushima nuclear site with unclear mission. Scientific American, 2011. [90] M. Grimes...security engineering task. SCADA systems are hard real-time systems [251] because the completion of an operation after its deadline is considered useless and...that the attacker, after gaining unauthenticated access, could change the operator display values so that when an alarm actually goes off, the human
Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering
NASA Astrophysics Data System (ADS)
Li, Fengjun; Luo, Bo; Liu, Peng; Squicciarini, Anna C.; Lee, Dongwon; Chu, Chao-Hsien
Nowadays, increasing needs for information sharing arise due to extensive collaborations among organizations. Organizations desire to provide data access to their collaborators while preserving full control over the data and comprehensive privacy of their users. A number of information systems have been developed to provide efficient and secure information sharing. However, most of the solutions proposed so far are built atop of conventional data warehousing or distributed database technologies.
Preparing for Beslan: Anti-Terrorism Recommendations for an American School
2008-06-13
prepare for a terrorist attack. How could one American school be affected by anti-terrorism measures? Upgrades in materials , equipment, and personnel...be able to access restricted material ; therefore, only open source material was used. Significance This research provides school officials an...these materials were left to help the terrorists since most schools would have cleaned the area up prior to the first school day. To Tomaeva, this is
A CyberCIEGE Traffic Analysis Extension for Teaching Network Security
2011-12-01
Information Technology LAN Local Area Network MAADNET Military Academy Attack/Defense Network MAC Media Access Control MMORPG Massively...ready to launch its latest massively multiplayer online role-playing game ( MMORPG ) “SyberSIEGE”! The product is currently in the final stages of...achieve his goal, this approach will still allow Tina to meet her goals and avoid disruptions to existing operations, which is also what would have
Assessing the Use of Tactical Clouds to Enhance Warfighter Effectiveness
2014-04-01
operating while compromised environment” (attackers with access to communications network); Big Data – Since 9/11 the amount of surveillance data ...unanalyzed. The big data problem is unlikely to improve as it is projected that sensor data volume could potentially be measured in yottabytes (1024...www.forbes.com/sites/techonomy/2012/03/12/military-intelligence-redefined- big - data -in-the- battlefield/ 5 Data Analysis Challenges [Reference 5] DRDC-RDDC
On Cybersecurity, Crowdsourcing, and Social Cyber-Attack
2013-01-01
gahran_1_android- app - android -phone-apple-s- app - store?_s=PM:TECH. Accessed January 9, 2013. DR. REBECCA GOOLSBY is a Program Officer with the Office of Naval...legitimate messages, and understand how quickly mobile apps and text services can disseminate false information. Authorities and volunteers must develop...inflammatory information and disinfor- mation. Like the conflicts sparked by Guttenberg’s invention, significant real-world impacts of a more troubled
NASA Astrophysics Data System (ADS)
Kang, Soo-Min; Kim, Chang-Hun; Han, Sang-Kook
2016-02-01
In passive optical network (PON), orthogonal frequency division multiplexing (OFDM) has been studied actively due to its advantages such as high spectra efficiency (SE), dynamic resource allocation in time or frequency domain, and dispersion robustness. However, orthogonal frequency division multiple access (OFDMA)-PON requires tight synchronization among multiple access signals. If not, frequency orthogonality could not be maintained. Also its sidelobe causes inter-channel interference (ICI) to adjacent channel. To prevent ICI caused by high sidelobes, guard band (GB) is usually used which degrades SE. Thus, OFDMA-PON is not suitable for asynchronous uplink transmission in optical access network. In this paper, we propose intensity modulation/direct detection (IM/DD) based universal filtered multi-carrier (UFMC) PON for asynchronous multiple access. The UFMC uses subband filtering to subsets of subcarriers. Since it reduces sidelobe of each subband by applying subband filtering, it could achieve better performance compared to OFDM. For the experimental demonstration, different sample delay was applied to subbands to implement asynchronous transmission condition. As a result, time synchronization robustness of UFMC was verified in asynchronous multiple access system.
Security challenge to using smartphones for SHM
NASA Astrophysics Data System (ADS)
Abueh, Yeka; Liu, Hong
2016-04-01
Pervasive smartphones have demonstrated great potential in structural health monitoring (SHM) of civil infrastructures. Their sensing, processing, and communication capabilities along with crowdsourcing facility ease technical difficulties and reduce financial burdens of instrumentation and monitoring for SHM in civil infrastructures. However, smartphones are vulnerable to unintentional misuses and malicious attacks. This paper analyzes the vulnerabilities of smartphones in performing SHM and reveals the exploitation of those vulnerabilities. The work probes the attack surface of both devices and data. Device attack scenarios include hacking individual smartphones to modify the data stored on them and orchestrating smartphones to launch a distributed denial-of-service attack. Specifically, experiments are conducted to remotely access an Android smartphone and modify the sensing data of structural health stored on it. The work also presents a case study that reveals the sensitivity of a popular perturbation analysis method to faulty data delivered by a smartphone. The paper provides the direction of meeting the security challenge to using smartphones for SHM. As the first line of defense, device authentication is implemented in the smartphone to stop spoofing. Subsequently, message authentication is devised to maintain data integrity. There is a need to apply data science for the SHM immunity system against the sensitivity to data inaccuracy. The work also evaluates the cost-effectiveness of the proposed security measures, recommending varying levels of security to mitigate the adversaries to smartphones used in SHM systems. It calls for security solutions at the design stage of SHM systems rather than patching up after their implementations.
Facelock: familiarity-based graphical authentication.
Jenkins, Rob; McLachlan, Jane L; Renaud, Karen
2014-01-01
Authentication codes such as passwords and PIN numbers are widely used to control access to resources. One major drawback of these codes is that they are difficult to remember. Account holders are often faced with a choice between forgetting a code, which can be inconvenient, or writing it down, which compromises security. In two studies, we test a new knowledge-based authentication method that does not impose memory load on the user. Psychological research on face recognition has revealed an important distinction between familiar and unfamiliar face perception: When a face is familiar to the observer, it can be identified across a wide range of images. However, when the face is unfamiliar, generalisation across images is poor. This contrast can be used as the basis for a personalised 'facelock', in which authentication succeeds or fails based on image-invariant recognition of faces that are familiar to the account holder. In Study 1, account holders authenticated easily by detecting familiar targets among other faces (97.5% success rate), even after a one-year delay (86.1% success rate). Zero-acquaintance attackers were reduced to guessing (<1% success rate). Even personal attackers who knew the account holder well were rarely able to authenticate (6.6% success rate). In Study 2, we found that shoulder-surfing attacks by strangers could be defeated by presenting different photos of the same target faces in observed and attacked grids (1.9% success rate). Our findings suggest that the contrast between familiar and unfamiliar face recognition may be useful for developers of graphical authentication systems.
Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho
2016-01-01
In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.’s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.’s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes. PMID:27537890
USDA-ARS?s Scientific Manuscript database
Signaling networks among multiple phytohormones fine-tune plant defense responses to insect herbivore attack. Previously, it was reported that the synergistic combination of ethylene (ET) and jasmonic acid (JA) was required for providing maize insect resistance1 (mir1), a key endogenous defense sign...
Infants, Toddlers, and Terror: Supporting Parents, Helping Children.
ERIC Educational Resources Information Center
Fenichel, Emily, Ed.
2002-01-01
"Zero to Three" is a single-focus bulletin of the National Center for Infants, Toddlers, and Families providing insight from multiple disciplines on the development of infants, toddlers, and their families. Responding to family needs in the wake of September 11, 2001 terrorist attacks, this issue focuses on infants, toddlers, and terror.…
USDA-ARS?s Scientific Manuscript database
Plants are attacked by pathogens representing diverse taxonomic groups, such that genes providing multiple disease resistance (MDR) would likely be under positive selection pressure. We examined the novel proposition that naturally occurring allelic variants may confer MDR. To do so, we applied a ...
Mark Spencer; Kevin O' Hara
2007-01-01
Phytophthora ramorum attacks tanoak (Lithocarpus densiflorus) in California and Oregon. We present a stand-level study examining the presence of disease symptoms in individual stems. Working with data from four plots in redwood (Sequoia sempervirens)/tanoak forests in Marin County, and three plots in Mendocino...
J.-H. Park; J. Juzwik; J. Cavender-Bares
2013-01-01
Hundreds of cankers caused by Ceratocystis smalleyi are associated with hickory bark beetle-attacked bitternut hickory exhibiting rapid crown decline in the north-central and northeastern United States. Discolored sapwood colonized by the fungus commonly underlies the cankers. Field studies were conducted to test the hypothesis that C....
Viswanathan, P; Krishna, P Venkata
2014-05-01
Teleradiology allows transmission of medical images for clinical data interpretation to provide improved e-health care access, delivery, and standards. The remote transmission raises various ethical and legal issues like image retention, fraud, privacy, malpractice liability, etc. A joint FED watermarking system means a joint fingerprint/encryption/dual watermarking system is proposed for addressing these issues. The system combines a region based substitution dual watermarking algorithm using spatial fusion, stream cipher algorithm using symmetric key, and fingerprint verification algorithm using invariants. This paper aims to give access to the outcomes of medical images with confidentiality, availability, integrity, and its origin. The watermarking, encryption, and fingerprint enrollment are conducted jointly in protection stage such that the extraction, decryption, and verification can be applied independently. The dual watermarking system, introducing two different embedding schemes, one used for patient data and other for fingerprint features, reduces the difficulty in maintenance of multiple documents like authentication data, personnel and diagnosis data, and medical images. The spatial fusion algorithm, which determines the region of embedding using threshold from the image to embed the encrypted patient data, follows the exact rules of fusion resulting in better quality than other fusion techniques. The four step stream cipher algorithm using symmetric key for encrypting the patient data with fingerprint verification system using algebraic invariants improves the robustness of the medical information. The experiment result of proposed scheme is evaluated for security and quality analysis in DICOM medical images resulted well in terms of attacks, quality index, and imperceptibility.
Anti-Immune Strategies of Pathogenic Fungi
Marcos, Caroline M.; de Oliveira, Haroldo C.; de Melo, Wanessa de Cássia M. Antunes; da Silva, Julhiany de Fátima; Assato, Patrícia A.; Scorzoni, Liliana; Rossi, Suélen A.; de Paula e Silva, Ana C. A.; Mendes-Giannini, Maria J. S.; Fusco-Almeida, Ana M.
2016-01-01
Pathogenic fungi have developed many strategies to evade the host immune system. Multiple escape mechanisms appear to function together to inhibit attack by the various stages of both the adaptive and the innate immune response. Thus, after entering the host, such pathogens fight to overcome the immune system to allow their survival, colonization and spread to different sites of infection. Consequently, the establishment of a successful infectious process is closely related to the ability of the pathogen to modulate attack by the immune system. Most strategies employed to subvert or exploit the immune system are shared among different species of fungi. In this review, we summarize the main strategies employed for immune evasion by some of the major pathogenic fungi. PMID:27896220
Giavina-Bianchi, Pedro; Arruda, Luisa Karla; Aun, Marcelo V; Campos, Regis A; Chong-Neto, Herberto J; Constantino-Silva, Rosemeire N; Fernandes, Fátima R; Ferraro, Maria F; Ferriani, Mariana P L; França, Alfeu T; Fusaro, Gustavo; Garcia, Juliana F B; Komninakis, Shirley; Maia, Luana S M; Mansour, Eli; Moreno, Adriana S; Motta, Antonio A; Pesquero, João B; Portilho, Nathalia; Rosário, Nelson A; Serpa, Faradiba S; Solé, Dirceu; Takejima, Priscila; Toledo, Eliana; Valle, Solange O.R; Veronez, Camila L; Grumach, Anete S
2018-01-01
Hereditary angioedema is an autosomal dominant disease characterized by recurrent angioedema attacks with the involvement of multiple organs. The disease is unknown to many health professionals and is therefore underdiagnosed. Patients who are not adequately diagnosed and treated have an estimated mortality rate ranging from 25% to 40% due to asphyxiation by laryngeal angioedema. Intestinal angioedema is another important and incapacitating presentation that may be the main or only manifestation during an attack. In this article, a group of experts from the "Associação Brasileira de Alergia e Imunologia (ASBAI)" and the "Grupo de Estudos Brasileiro em Angioedema Hereditário (GEBRAEH)" has updated the Brazilian guidelines for the diagnosis and treatment of hereditary angioedema.
Firoozabadi, Mohammad Dehghani; Navabzadeh, Maryam; Roudsari, Mohammad Khodashenas; Zahmatkash, Mohsen
2014-12-01
Migraine headaches are the most common acute and recurrent headaches. Current treatment of a migraine headache consists of multiple medications for control and prevention of recurrent attacks. Global emergence of alternative medicine led us to examine the efficacy of cupping therapy plus serkangabin syrup in the treatment of migraine headaches. This study was a randomized, controlled, open-label, comparative efficacy trial. We randomly assigned patients with migraine into cupping therapy plus serkangabin group (30 patients) and conventional treatment group (30 patients). An investigator assessed the severity of headache, frequency of attacks in a week and duration of attacks per hour in 5 visits (at the end of 2 weeks, 1, 3 and 6 months). Generalized estimating equations approach was used to analyze repeated measures data to compare outcomes in both groups. Average age for cupping therapy group and conventional treatment group were 31.7 (±7.6) and 32.6 (±12.7) years, respectively (P = 0.45). After treatment for 2 weeks; and 1, 3 and 6 months, severity of headache (P = 0.80), frequency of migraine attacks (P = 0.63) and duration of attacks per hours (P = 0.48) were similar in conventional and cupping groups but these symptoms were decreased in each group during the study (P < 0.001). There was no significant difference between cupping plus serkangabin therapy and conventional treatment in the treatment and prophylaxis of migraine. The alternative therapy may be used in cases of drug intolerance, no medication response, and in primary care.
Firoozabadi, Mohammad Dehghani; Navabzadeh, Maryam; Roudsari, Mohammad Khodashenas; Zahmatkash, Mohsen
2014-01-01
Background: Migraine headaches are the most common acute and recurrent headaches. Current treatment of a migraine headache consists of multiple medications for control and prevention of recurrent attacks. Global emergence of alternative medicine led us to examine the efficacy of cupping therapy plus serkangabin syrup in the treatment of migraine headaches. Materials and Methods: This study was a randomized, controlled, open-label, comparative efficacy trial. We randomly assigned patients with migraine into cupping therapy plus serkangabin group (30 patients) and conventional treatment group (30 patients). An investigator assessed the severity of headache, frequency of attacks in a week and duration of attacks per hour in 5 visits (at the end of 2 weeks, 1, 3 and 6 months). Generalized estimating equations approach was used to analyze repeated measures data to compare outcomes in both groups. Results: Average age for cupping therapy group and conventional treatment group were 31.7 (±7.6) and 32.6 (±12.7) years, respectively (P = 0.45). After treatment for 2 weeks; and 1, 3 and 6 months, severity of headache (P = 0.80), frequency of migraine attacks (P = 0.63) and duration of attacks per hours (P = 0.48) were similar in conventional and cupping groups but these symptoms were decreased in each group during the study (P < 0.001). Conclusion: There was no significant difference between cupping plus serkangabin therapy and conventional treatment in the treatment and prophylaxis of migraine. The alternative therapy may be used in cases of drug intolerance, no medication response, and in primary care. PMID:25709653
Nature plus nurture: the triggering of multiple sclerosis.
Wekerle, Hartmut
2015-01-01
Recent clinical and experimental studies indicate that multiple sclerosis develops as consequence of a failed interplay between genetic ("nature") and environmental ("nurture") factors. A large number of risk genes favour an autoimmune response against the body's own brain matter. New experimental data indicate that the actual trigger of this attack is however provided by an interaction of brain-specific immune cells with components of the regular commensal gut flora, the intestinal microbiota. This concept opens the way for new therapeutic approaches involving modulation of the microbiota by dietary or antibiotic regimens.
Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi
2013-07-24
Wireless sensor networks (WSNs) can be quickly and randomly deployed in any harsh and unattended environment and only authorized users are allowed to access reliable sensor nodes in WSNs with the aid of gateways (GWNs). Secure authentication models among the users, the sensor nodes and GWN are important research issues for ensuring communication security and data privacy in WSNs. In 2013, Xue et al. proposed a temporal-credential-based mutual authentication and key agreement scheme for WSNs. However, in this paper, we point out that Xue et al.'s scheme cannot resist stolen-verifier, insider, off-line password guessing, smart card lost problem and many logged-in users' attacks and these security weaknesses make the scheme inapplicable to practical WSN applications. To tackle these problems, we suggest a simple countermeasure to prevent proposed attacks while the other merits of Xue et al.'s authentication scheme are left unchanged.
Lee, Im-Yeong
2014-01-01
Data outsourcing services have emerged with the increasing use of digital information. They can be used to store data from various devices via networks that are easy to access. Unlike existing removable storage systems, storage outsourcing is available to many users because it has no storage limit and does not require a local storage medium. However, the reliability of storage outsourcing has become an important topic because many users employ it to store large volumes of data. To protect against unethical administrators and attackers, a variety of cryptography systems are used, such as searchable encryption and proxy reencryption. However, existing searchable encryption technology is inconvenient for use in storage outsourcing environments where users upload their data to be shared with others as necessary. In addition, some existing schemes are vulnerable to collusion attacks and have computing cost inefficiencies. In this paper, we analyze existing proxy re-encryption with keyword search. PMID:24693240
Lee, Sun-Ho; Lee, Im-Yeong
2014-01-01
Data outsourcing services have emerged with the increasing use of digital information. They can be used to store data from various devices via networks that are easy to access. Unlike existing removable storage systems, storage outsourcing is available to many users because it has no storage limit and does not require a local storage medium. However, the reliability of storage outsourcing has become an important topic because many users employ it to store large volumes of data. To protect against unethical administrators and attackers, a variety of cryptography systems are used, such as searchable encryption and proxy reencryption. However, existing searchable encryption technology is inconvenient for use in storage outsourcing environments where users upload their data to be shared with others as necessary. In addition, some existing schemes are vulnerable to collusion attacks and have computing cost inefficiencies. In this paper, we analyze existing proxy re-encryption with keyword search.
Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi
2013-01-01
Wireless sensor networks (WSNs) can be quickly and randomly deployed in any harsh and unattended environment and only authorized users are allowed to access reliable sensor nodes in WSNs with the aid of gateways (GWNs). Secure authentication models among the users, the sensor nodes and GWN are important research issues for ensuring communication security and data privacy in WSNs. In 2013, Xue et al. proposed a temporal-credential-based mutual authentication and key agreement scheme for WSNs. However, in this paper, we point out that Xue et al.'s scheme cannot resist stolen-verifier, insider, off-line password guessing, smart card lost problem and many logged-in users' attacks and these security weaknesses make the scheme inapplicable to practical WSN applications. To tackle these problems, we suggest a simple countermeasure to prevent proposed attacks while the other merits of Xue et al.'s authentication scheme are left unchanged. PMID:23887085
Chaudhry, Shehzad Ashraf; Naqvi, Husnain; Shon, Taeshik; Sher, Muhammad; Farash, Mohammad Sabzinejad
2015-06-01
Telecare medical information systems (TMIS) provides rapid and convenient health care services remotely. Efficient authentication is a prerequisite to guarantee the security and privacy of patients in TMIS. Authentication is used to verify the legality of the patients and TMIS server during remote access. Very recently Islam et al. (J. Med. Syst. 38(10):135, 2014) proposed a two factor authentication protocol for TMIS using elliptic curve cryptography (ECC) to improve Xu et al.'s (J. Med. Syst. 38(1):9994, 2014) protocol. They claimed their improved protocol to be efficient and provides all security requirements. However our analysis reveals that Islam et al.'s protocol suffers from user impersonation and server impersonation attacks. Furthermore we proposed an enhanced protocol. The proposed protocol while delivering all the virtues of Islam et al.'s protocol resists all known attacks.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-21
...The U.S. Department of Commerce and U.S. Department of Homeland Security are requesting information on the requirements of, and possible approaches to creating, a voluntary industry code of conduct to address the detection, notification and mitigation of botnets.\\1\\ Over the past several years, botnets have increasingly put computer owners at risk. A botnet infection can lead to the monitoring of a consumer's personal information and communication, and exploitation of that consumer's computing power and Internet access. Networks of these compromised computers are often used to disseminate spam, to store and transfer illegal content, and to attack the servers of government and private entities with massive, distributed denial of service attacks. The Departments seek public comment from all Internet stakeholders, including the commercial, academic, and civil society sectors, on potential models for detection, notification, prevention, and mitigation of botnets' illicit use of computer equipment. ---------------------------------------------------------------------------
Security solutions: strategy and architecture
NASA Astrophysics Data System (ADS)
Seto, Myron W. L.
2002-04-01
Producers of banknotes, other documents of value and brand name goods are being presented constantly with new challenges due to the ever increasing sophistication of easily-accessible desktop publishing and color copying machines, which can be used for counterfeiting. Large crime syndicates have also shown that they have the means and the willingness to invest large sums of money to mimic security features. To ensure sufficient and appropriate protection, a coherent security strategy has to be put into place. The feature has to be appropriately geared to fight against the different types of attacks and attackers, and to have the right degree of sophistication or ease of authentication depending upon by whom or where a check is made. Furthermore, the degree of protection can be considerably increased by taking a multi-layered approach and using an open platform architecture. Features can be stratified to encompass overt, semi-covert, covert and forensic features.
Living within stories: Exploring the experiences of people with transient ischemic attack.
Crowfoot, Gary Mitchell; van der Riet, Pamela Jane; Maguire, Jane Margaret
2016-03-01
A transient ischemic attack (TIA) significantly increases a person's risk of ischemic stroke. However, little is known about the experiences of these people or what influences their decision to access care. This article explores the stories of three people who experienced a TIA. All participants were interviewed after receiving a diagnosis of TIA by a specialist neurologist. By utilizing a framework of narrative inquiry, several storylines were revealed across temporal, social, and geographical landscapes. The main storylines include: bodily disruption, time stasis, altered temporal perceptions, the roles of others, and help-seeking behavior. The primary author also reflects upon his own origin and explores how this inquiry has influenced his perceptions, career, and nursing practice. This inquiry may assist healthcare workers to gain insight into the experiences of people with TIA and suggests how involvement of significant others is beneficial when educating people at risk of TIA. © 2015 Wiley Publishing Asia Pty Ltd.
Ding, Ling; Zhu, Daojuan; Peng, Donghong; Zhao, Yao
2017-01-01
Data on particulate matter of diameter <2.5 μm (PM 2.5 ) in the city of Chongqing were first announced in 2013. We wished to assess the effects of pollutants on asthmatic children in Chongqing, China. Daily numbers of hospital visits because of asthma attacks in children aged 0-18 years in 2013 were collected from the Children's Hospital of Chongqing Medical University. Data on pollutants were accessed from the nine air quality-monitoring stations in Chongqing. A time-stratified case-crossover design was applied and conditional logistic regression was undertaken to analyze the data. We found that short-term exposure to PM 10 , PM 2.5 , sodium dioxide, nitrogen and carbon monoxide could trigger hospital visits for asthma in children. Nitrogen dioxide had an important role, whereas ozone had no effect. Copyright © 2016 Elsevier Ltd. All rights reserved.
Severe Mental Illness, Somatic Delusions, and Attempted Mass Murder.
Sarteschi, Christine M
2016-01-01
A case of an attempted mass shooting at a large psychiatric hospital in the United States by a 30-year-old male with severe mental illness, somatic delusions, and exceptional access to healthcare professionals is reported. Six persons were shot, one died at the scene, and the shooter was then killed by the police. Data were gathered from court documents and media accounts. An analysis of the shooter's psychiatric history, his interactions with healthcare professionals, and communications prior to the shooting suggest a rare form of mass murder, a random attack by a documented psychotic and delusional individual suffering with somatic delusions. Despite his being psychotic, the killer planned the attack and made a direct threat 1 month prior to the shootings. This case highlights problems with the healthcare system, indicating that it might be ill equipped to appropriately deal with severe mental illness. © 2015 American Academy of Forensic Sciences.
The DTIC Review. Information Terrorism. Volume 5, Number 1
2000-03-01
ABSTRACT: (U) This document describes a PERSONAL AUTHORS: Llinas, James; proposed program of research into theories, Bisantz, Ann; Drury , Colin ; Seong...management computer. Before he finished he transferred more than $12 million to other banks and had access to the $500 billion daily transfer account . 3 By the...modem. The General Accounting Office recently estimated that Pentagon computers experience some 250,000 hacker attacks per year and 5 that 65 percent
Federated Access to Cyber Observables for Detection of Targeted Attacks
2014-10-01
each manages. The DQNs also utilize an intelligent information ex- traction capability for automatically suggesting mappings from text found in audit ...Harmelen, and others, “OWL web ontology language overview,” W3C Recomm., vol. 10, no. 2004–03, p. 10, 2004. [4] D. Miller and B. Pearson , Security...Online]. Available: http://www.disa.mil/Services/Information- Assurance /HBS/HBSS. [21] S. Zanikolas and R. Sakellariou, “A taxonomy of grid
Effect of Air Power on Military Operations, Western Europe
1945-07-15
AVAILABILITY CODES DIST AVAIL AND/OR SPECIAL DATE ACCESSIONED UNANNOUNCED Original contains color plates. All DTIC reproduct- DISTRIBUTION STAMP i ons will be...positions of these less massive structures, direct hits were rare. Demorali- zation, neutralization and disruption were an immediate after- effectof the bom...attack and making feints at the DEVELOPED enemy to keep him down while our infantry closed in, marking the target by colored smoke and other details not
Post-Attack Economic Stabilization Issues for Federal, State, and Local Governments
1985-02-01
workers being transfered from large urban areas to production facilities in areas of lower risk . In another case, rent control staff should be quickly...food supermarkets , which do not universally accept bank cards. 3 0 A requirement will still exist for a large number of credit cards. While there is some...separate system is required for rationing. For example, the increasingly popular automatic teller machine ( ATM ) debit card routinely accesses both a
2013-03-01
Congressional Research Service, U.S. International Borders: Brief Facts, Janice Cheryl Beaver , RS21729 (Washington, DC: Government Printing Office, November 9...and the opportunity to utilize the breadth of smuggling options for transportation. The commercial prevalence of radiological material and the...Janice Cheryl Beaver . RS21729. Washington, DC: Government Printing Office November 9, 2006. http://www.fas.org/sgp/crs/misc/RS21729.pdf (accessed
Evaluating and Mitigating Software Supply Chain Security Risks
2010-05-01
is returned for all employees. The risk associated with this defect is high; variants of it have been used in attacks that caused credit card data to...via Common Access Card (CAC) readers). 29 | CMU/SEI-2010-TN-016 4.2.1 Supplier Capability Because the project is already in development, the...ClearCase, Windows, Linux and Solaris, network administration, TCP/IP, X/Motif, DII COE, Simple Net- work Management Protocol (SNMP), Agent Technology